SlideShare uma empresa Scribd logo
1 de 5
Baixar para ler offline
ACEEE International Journal on Network Security, Vol 1, No. 1, Jan 2010




    A New Approach to Improve the Efficiency of
    Distributed Scheduling in IEEE 802.16 Mesh
                     Networks
                                     S. Lakani1, M. Fathy2, and H. Ghaffarian2
     1
         Department of Computer Engineering, Science and Research Branch, Islamic Azad University, Tehran, Iran
                                             Email: s.lakani@srbiau.ac.ir
                2
                  Computer Engineering School, Iran University of Science and Technology, Tehran, Iran
                                      Email: {mahFathy, Ghaffarian}@iust.ac.ir


Abstract— The recent standard for broadband wireless               mesh, two different coordination modes are defined:
access networks, IEEE 802.16, which resulted in the                centralized and distributed. In the centralized mode the
development of metropolitan area wireless networks,                BS is responsible for defining the schedule of
includes two network organization modes: Point to Multi            transmissions in the entire network [2]. In the distributed
Point and Mesh. The mesh mode provides distributed
channel access operations of peering nodes and uses TDMA
                                                                   mode transmissions are scheduled in a fully distributed
technique for channel access modulation. According to              fashion without requiring any interaction with the BS. In
IEEE 802.16 MAC protocol, there are two scheduling                 this paper the focus is on the distributed mode, which is
algorithms for assigning TDMA slots to each network node:          much more flexible and responsive than the centralized
centralized and distributed. In distributed scheduling             mode, since decisions are taken locally by SSs according
algorithm, network nodes have to transmit scheduling               to their current traffic load and physical channel status.
message in order to inform other nodes about their transfer        The bandwidth modulation in IEEE 802.16 mesh mode is
schedule. In this paper a new approach is proposed to              based on TDMA in which bandwidth is divided into
improve distributed scheduling efficiency in IEEE 802.16           frames of fixed duration and each frame is partitioned
mesh mode, with respect to network condition in every
transferring opportunity. For evaluating the proposed
                                                                   into two subframes: control subframe and data subframe
algorithm efficiency, several extensive simulations are            and each subframe is divided into equal size time slots.
performed in various network configurations and the most           The number of control slots is ranging from 2 to 16 and
important system parameters which affect the network               data slots’ number is up to 256 depending on the physical
performance are analyzed.                                          layer profile and employed system parameters. Every
                                                                   node who is ready for data transfer, initially, broadcasts
Index Terms— IEEE 802.16, WiMAX, Wireless Mesh                     bandwidth allocation messages into the control slots.
Networks, MAC protocol, Time Division Multiple Access,             Therefore two types of bandwidth allocation message are
Distributed scheduling procedure.                                  used in this process: Mesh Network Configuration and
                                                                   Mesh Distributed Scheduling message. The latter is used
                     I. INTRODUCTION                               to identify the nodes which are waiting to access control
   The IEEE 802.16 standard [1], also known as                     slots. Therewith, the procedure used by nodes to access
Worldwide Interoperability for Microwave Access                    the control slots and transmit control messages is named
(WiMAX), is a recently developed standard for                      the mesh distributed scheduling procedure. The mesh
Broadband Wireless Access (BWA) in fixed and mobile                distributed scheduling procedure is a distributed
networks. The IEEE 802.16 specifies two different modes            algorithm which provides a collision-free access to
of sharing the wireless medium: Point-to-Multipoint                control slots.
(PMP) and mesh. In PMP mode, the network                              In Ref. [3] the authors analyzed the performance of the
organization operations are performed by a node namely             mesh distributed scheduling procedure through a
Base Station (BS) that has to coordinate Subscriber                stochastic model. This allowed the estimation of the time
Stations (SSs). On the other hand, in mesh mode the SSs            interval between two consecutive accesses to the control
can communicate with each other directly. This mode has            sub-frame, i.e. the access interval. Then the model is
been designed to be employed as a technology for                   validated through simulation, and can be used to gain
Wireless Mesh Networks (WMNs) and can accommodate                  insights into the properties of the mesh distributed
longer distance coverage than the PMP mode by                      scheduling procedure, in terms of the mean access
exploiting cooperative packet relaying. The interest in            interval. However, the model is unable to capture all the
WMN is rapidly increasing due to the growing potential             details of the mesh scheduling procedure due to its
of its recently envisaged applications[1].In IEEE 802.16           simplifying assumptions, which are nonetheless

                                                              26
© 2010 ACEEE
DOI: 01.ijns.01.01.06
ACEEE International Journal on Network Security, Vol 1, No. 1, Jan 2010



indispensable to reduce the complexity of the problem so           one-hop neighbor but are not linked directly, are called
that it can be solved. Afzali et al. [4] have improved             two-hop or extended neighbors.
scalability problems of stochastic model which were                   As already introduced, the distributed scheduling
introduced in [3]. Bayer et al. carried out a preliminary          procedure is applied to coordinate the access to the
investigation of the mesh distributed scheduling                   control slots in a distributed collision-free manner. For
procedure through simulation[6]. Wei et al. [7] suggested          this reason a node cannot transmit into a control slot that
a load-aware and interference aware scheduling algorithm           is reserved by one- or two-hop neighbors which are
for IEEE 802.16 mesh mode. Their simulation results                referred to as competitors of that node. Specifically, each
show that the provided schemes effectively improve the             node performs a virtual contention by propagating the
network throughput performance in IEEE 802.16 mesh                 control information of its neighbors which is sent during
networks and achieve high spectral utilization. Tao et al.         previous control slots. This contention based procedure
[8] proposed a concurrent transmission algorithm to                enforces a strict precedence among competitors. While
promote spatial resource reuse, which increases the                every node contends until it wins; only one competitor
overall end-to-end throughput. Simulation results indicate         can win and access a specific control slot. The procedure
that different constructions of routing tree impact the            of performing this contention is described in [1] and isn’t
performance of the concurrent algorithm. Fu et al. [9]             the matter of interest in this paper. The major concern in
used the concept of collision metric to model the                  this article is the delay time after which a node contends
interference level and prepared a novel routing algorithm          again since last access to a control slot.
to increase the degree of spatial reuse in wireless mesh              Every node must defer its transmission by a holdoff
networks. Both the scheduling and routing schemes are              time, namely Hx (referring to node x) in units of time
based on IEEE 802.16 mesh mode. In Ref. [10] a linear              slots. Waiting for a period of Hx, guarantees a collision
programming model for optimum routing and scheduling               free access to time slots.
of flows in a wireless mesh network that include the                  As specified by the IEEE 802.16 standard, the holdoff
effect of interference and allow for variable-rate                 time Hx is calculated as (1):
transmissions was propounded. Cicconetti et al. [11]
investigated network scalability and tried to minimize the                                   H x = 2 4+ E x .                (1)
end to end delay problems by means of performance
analysis. Due to the importance of an efficient distributed           Where Ex        [0, 7] is a system parameter called
scheduling algorithm in IEEE 802.16 network                        XmtHoldoffExponent which can be configured on a per
performance, in this paper a heuristic scheduling                  node basis. Thus, two consecutive slot accesses by the
algorithm is proposed that can reduce transmission delay.          same node are separated by at least 16 slots according to
The performance of the mesh distributed scheduling                 formula (1), when Ex=0. The challenge is whether the
procedure is evaluated, using extensive simulations in a           delay of 16 slots is efficient or not?
wide variety of scenarios. Our analysis covers some
aspects of the mesh distributed scheduling procedure that                        III. THE HEURISTIC APPROACH
have not been yet thoroughly addressed in the literature.
                                                                      As mentioned in previous section, when Ex=0, a node
    The remainder of the paper is organized as follows. In
                                                                   has to wait for at least 16 slots to access next slot for its
Section II we describe the IEEE 802.16 mesh distributed
                                                                   transmission. But waiting for 16 slot isn't efficient,
scheduling procedure in details. The novel approach is
                                                                   particularly when there is not even one competitor node
discussed in section III. The performance of the new
                                                                   for using these 16 empty slots. For example consider a
approach of mesh distributed scheduling procedure is
                                                                   typical WiMAX mesh network (Fig.1 section IV.B) that
analyzed in Section IV, with respect to relevant factors,
                                                                   each node has two one-hop neighbors. Therefore, at max,
such as the network topology and system configuration
                                                                   every node can have up to four neighbors and extended
parameters. We conclude the paper in Section V.
                                                                   neighbors. If we divided sixteen into four, in average we
                                                                   obtain 4 slots per each neighbor for transmission. What
    II. MESH DISTRIBUTED SCHEDULING PROCEDURE
                                                                   happens if some of those nodes do not want to use their
   Hereafter in the mesh distributed scheduling procedure          opportunity to send any data?
node x is assumed as a generic node of the network which              Therefore the standard scheduling mechanism does
is referred to both BS and SSs. Additionally the common            not perform well and causes a significant delay on data
name for mesh BS and SSs in the literature of WMNs is              packets. On this point of view, we focus on the constant
node.                                                              value 4 and make this value adaptive with the number of
   In IEEE 802.16, a logical link is set up between each           competitor nodes i.e. nodes competing to access the same
couple of nodes, so the directly linked nodes are called           slot.
one-hop neighbors also they called simply neighbors. On               The basic method of IEEE 802.16 standard for
the other hand, nodes which have at least one common               calculating hold off time is obtained from (1). The new
                                                                   approach is computing the logarithm of number of
                                                              27
© 2010 ACEEE
DOI: 01.ijns.01.01.06
ACEEE International Journal on Network Security, Vol 1, No. 1, Jan 2010



competitor nodes and using the result instead of constant             replications are run. The duration of each simulation run
4 in (1). So the new formula is introduced as follows:                varied depending on how the specific system was
                                                                      configured.
                        H x = 2(log2 cm+ Ex ) .            (2)
                                                                      B. Chain
   where cm is the number of competing nodes.                            In order to decrease the number of idle slots and
   By computing the number of competing nodes, it is                  improve the network performance, in this scenario a spars
evaluated that how many nodes want to transmit                        and narrow topology i.e. chain is considered. Fig.1 shows
message(s) in the current competitive slot. So every node             the connections between nodes in chain topology.
that wins the competition, after sending data in regarded
slot, has to wait as long as hold off time (Hx). This
mechanism guarantees the efficient use of channel by
reducing idle slots in control subframe. Simulations in the
following section show that the adoption of this                      Figure 1. Schematic representation of nodes connection in chain
                                                                      topology
mechanism       reduces     the    transmission   interval.
Furthermore the delay on data packets caused by the                      To obtain the network performance parameters, six
MAC layer is reduced significantly.                                   simulations are run with respectively 4, 9, 16, 25, 36, 49
                                                                      number of network nodes. To be compatible with grid-
             IV. PERFORMANCE EVALUATION                               full, in chain topology, numbers are selected complete
                                                                      squared. Fig.2 shows the average frame intervals between
   In this section, the settings under which the simulation           two consecutive mesh distributed scheduling messages, in
analysis is carried out and the used performance metrics              basic standard IEEE 802.16 and heuristic method. There
are defined. Then the performance of the mesh distributed             is an obvious drop in access interval that is originated by
scheduling procedure is evaluated in several scenarios                decrement of idle slots with applying proposed method.
with varied network configurations. The analysis is aimed             Additionally, in the heuristic method, the average access
at identifying the effect of applying this solution in IEEE           interval rises with the number of nodes increasing, while
802.16 based WMN. The preliminary information on                      in basic method this metric is almost constant. This
network configuration for evaluation setting is provided              implies that the average number of nodes competing to
in Part A. Specifically, the simulation are run, with the             access a certain slot increases while network being more
following network topologies: a spars and narrow                      populated.
network topology i.e. chain in Part B, a complicated and
dense network topology i.e. grid-full in Part C.
A. Evaluation Setting
   The parameters used in the simulations are compliant
with the IEEE 802.16 standard [1]. Specifically, the
frame duration is 10 ms and the channel bandwidth is 10
MHz According to the standard, only one channel is used
to transmit control information, thus the use of multiple
channels is not considered. Furthermore, the traffic
considered is of Voice over IP (VOIP) and Video on
Demand (VOD) type; however, they did not have any
impact on the transmission in control slots.
   We now define the performance indices that have been
considered in order to assess the distributed scheduling              Figure 2. Average frame intervals between two consecutive mesh
procedure performance in new approach. First metric is                distributed scheduling messages for chain
average interval (in slot units) between two consecutive                 The comparison of end-to-end one-way delay between
mesh distributed scheduling messages sent by a node.                  the standard and heuristic method is shown in Fig.3. The
Second one is the average end-to-end one-way delay (in                chart implies that delay increases with the network
seconds). Third metric is the average number of                       extension. It can be observed that the proposed algorithm
competitors per slot during virtual contention and the last           has smaller end-to-end one-way delay as a result of
one is average of end-to-end throughput per flow (in                  reducing Hold off time and unused control slots.
bytes/seconds).
   The patch program [12] of coordinated distributed
mode of IEEE 802.16 mesh is used in NS2 simulator
[13]. The simulation output analysis is carried out using
the method of independent replications. Specifically, for
each scenario a variable number of independent
                                                                 28
© 2010 ACEEE
DOI: 01.ijns.01.01.06
ACEEE International Journal on Network Security, Vol 1, No. 1, Jan 2010



                                                                        frame intervals become smaller in heuristic method
                                                                        because the nodes can sooner return to competition
                                                                        situation. Additionally, the average access interval
                                                                        growth in grid-full topology is more than in chain. The
                                                                        reason is that the average number of competitors of every
                                                                        node at each slot increases because in grid-full there are
                                                                        more neighbors than chain.




Figure 3. Average end-to-end one-way delay for chain




                                                                        Figure 6. Average frame intervals between two consecutive mesh
                                                                        distributed scheduling messages in grid-full

                                                                           The comparison of end-to-end one-way delay is shown
                                                                        in Fig.7. As expected, the heuristic algorithm has smaller
                                                                        end-to-end one-way delay, caused by reduction of Hold
                                                                        off time due to decreasing the empty control slots. In
                                                                        other hand in grid-full topology, the value of delay is less
Figure 4. Average end-to-end throughput for chain                       than chain topology as number of nodes in the network
   Fig.4 indicates the average of end-to-end throughput.                becomes greater. Because of dense nature of grid-full
As expected, the network throughput in proposed                         topology, with the number of nodes increasing the hop
algorithm is better than basic standard scheduler. This                 distance between nodes do not increase significantly.
improved result is due to the fact that nodes can quickly                  The average of end-to-end throughput is indicated in
return to the competition state, thus the usage of network              Fig.8. It can be seen that the network throughput in
free opportunities become more efficient.                               proposed algorithm has an improvement comparing to the
                                                                        basic standard scheduler. The reason is the same as
C. Grid-Full                                                            explained for the chain in part B and This can be
   Another simulation scenario is using a dense network                 explained by a decreased network contention and thus a
topology i.e. grid-full as Fig.5 shows the nodes                        decreased MSH-DSCH transmission interval.
connection in a schematic way.                                             The remarkable point in two recent charts is optimum
                                                                        values in grid-full topology with 9 nodes. As it can be
                                                                        seen, the lowest delay as well as the highest throughput is
                                                                        obtained in network with 9 nodes. That can be the result
                                                                        of the most efficient use of network resources in this
                                                                        specific situation. Therefore we can say this is the
                                                                        optimum network configuration among studied networks
                                                                        in which the highest value of about 140000 bytes per
                                                                        second of throughput and the least delay of about 0.063
                                                                        seconds are computed.
Figure 5. Scheme of nodes connection in grid-full topology

   In such networks, every node has more than two
neighbors that affect the performance of network
transmission scheduling. The simulations with grid-full
topology are run with respectively 4, 9, 16, 25, 36, 49
number of network nodes. Fig.6 shows the distinction
between average frame intervals in basic IEEE 802.16
standard and heuristic method. It can be seen that the
                                                                   29
© 2010 ACEEE
DOI: 01.ijns.01.01.06
ACEEE International Journal on Network Security, Vol 1, No. 1, Jan 2010



                                                                                                     REFERENCES
                                                                            [1] IEEE 802.16-2004. “IEEE standard for Local and
                                                                                 Metropolitan Area Networks – Part 16: Air interface for
                                                                                 Fixed Broadband Wireless Access systems,” Oct. 2004.
                                                                            [2] R. Bruno, M. Conti and E. Gregori, “Mesh networks:
                                                                                 Commodity multihop ad hoc networks,” IEEE
                                                                                 Communications, vol. 43, no. 3, Mar. 2005, pp. 23–131.
                                                                            [3] M. Cao, V. Raghunathan and P. R. Kumar, “A tractable
                                                                                 algorithm for fair and efficient uplink scheduling of multi-
                                                                                 hop WiMax mesh networks,” Proc. WiMesh 2006, Reston
                                                                                 (VA), USA, Sep. 25, 2006, pp. 101–108.
                                                                            [4] M. Cao, W. Ma, Q. Zhang, X. Wang and W. Zhu,
                                                                                 “Modeling and performance analysis of the distributed
                                                                                 scheduler in IEEE 802.16 mesh mode,” Proc. ACM
Figure 7. Average end-to-end one-way delay for grid-full                         MobiHoc 2005, Urbana-Champaign (IL), USA, May 25–
                                                                                 28, 2005, pp. 78–89.
                                                                            [5] M. Afzali, H. Ghaffarian and M. Fathy, “Maximum
                                                                                 utilization of channel bandwidth using maximum
                                                                                 likelihood in concurrent communication in WIMAX,”
                                                                                 Proc. The 13th CSI international computer conference,
                                                                                 Kish Island, Persian Gulf, Iran, 9-11 March, 2008.
                                                                            [6] N. Bayer, D. Sivchenko, B. Xu, V. Rakocevic and J.
                                                                                 Habermann, “Transmission timing of signaling messages
                                                                                 in IEEE 802.16 based mesh networks,” Proc. European
                                                                                 Wireless 2006, Athens, Greece, Apr. 2–5, 2006.
                                                                            [7] H. Wei, S. Ganguly, R. Izmailove and Z. Haas,
                                                                                 “Interference-Aware IEEE 802.16 WiMax Mesh
                                                                                 Networks,” The 61st IEEE Vehicular Technology
                                                                                 Conference, vol 5, pp 3102-3106, May 2005.
                                                                            [8] J. Tao, F. Liu, Z. Zeng and Z. Lin, “Throughput
Figure 8. Average of end-to-end throughput for grid-full
                                                                                 Enhancement in WiMax Mesh Networks Using Concurrent
                                                                                 Transmission,” International conference on Wireless
                       V. CONCLUSIONS                                            Communications, Networking and Mobile Computing, pp
                                                                                 871-874, September 2005.
   For solving the scheduling problems of wireless                          [9] L. Fu, Z. Cao and P. Fan, “Spatial Reuse in IEEE 802.16
metropolitan area networks, a new approach in IEEE                               Based Wireless Mesh Networks,” IEEE International
802.16 distributed scheduling algorithm in mesh mode is                          Symposium on Communications and Information
proposed and the method of calculating hold off time                             Technology, pp 1311-1314, October 2005.
between two consecutive channel accesses is improved.                       [10] H. Viswanathan and S. Mukherjee, “Throughput-Rang
                                                                                 Tradeoff of Wireless Mesh Backhaul Networks,” IEEE
Simulations with various network configuration and                               journal on selected areas in communications, vol 24, no 3,
scenarios show that, applying this solution, inefficient use                     pp 593-602, march 2006.
of channel is effectively decreased. It is observed that the                [11] C. Cicconetti, A. Erta and L. Lenzini, “Performance
proposed method provides efficient use of network                                Evaluation of the Mesh Election Procedure of IEEE
resources and decreases end-to-end delay. Thus, the                              802.16/WiMAX,” Proc. 10th ACM Symposium on
proposed distributed scheduling method improves the                              Modeling, analysis, and simulation of wireless and mobile
performance of IEEE 802.16 networks, comparing to the                            systems, pp 323-327, October 2007.
basic standard scheduling.                                                  [12] IEEE 802.16d Wireless Mesh Networks patch for NS2,
    The utilization of IEEE 802.16 scheduler with respect                        http://info.iet.unipi.it/~cng/ns2mesh80216
                                                                            [13] http://www.isi.edu/nsnam/ns/, last version 2.31, Mar. 2007.
to accumulated network load is considered as future
work.




                                                                       30
© 2010 ACEEE
DOI: 01.ijns.01.01.06

Mais conteúdo relacionado

Mais procurados

Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...IOSR Journals
 
Priority based bandwidth allocation in wireless sensor networks
Priority based bandwidth allocation in wireless sensor networksPriority based bandwidth allocation in wireless sensor networks
Priority based bandwidth allocation in wireless sensor networksIJCNCJournal
 
Dcn data link_layer
Dcn data link_layerDcn data link_layer
Dcn data link_layermangal das
 
A New Paradigm for Load Balancing in WMNs
A New Paradigm for Load Balancing in WMNsA New Paradigm for Load Balancing in WMNs
A New Paradigm for Load Balancing in WMNsCSCJournals
 
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...IJCNCJournal
 
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHMY-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHMIJNSA Journal
 
TransparentInterconnectionsofLotofLinks
TransparentInterconnectionsofLotofLinksTransparentInterconnectionsofLotofLinks
TransparentInterconnectionsofLotofLinksSwapnil Raut
 
Three dimension hamiltonian broadcast
Three dimension hamiltonian broadcastThree dimension hamiltonian broadcast
Three dimension hamiltonian broadcastIJCNCJournal
 
A cross layer optimized reliable multicast routing protocol in wireless mesh ...
A cross layer optimized reliable multicast routing protocol in wireless mesh ...A cross layer optimized reliable multicast routing protocol in wireless mesh ...
A cross layer optimized reliable multicast routing protocol in wireless mesh ...ijdpsjournal
 
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3ijwmn
 
Wired and Wireless Computer Network Performance Evaluation Using OMNeT++ Simu...
Wired and Wireless Computer Network Performance Evaluation Using OMNeT++ Simu...Wired and Wireless Computer Network Performance Evaluation Using OMNeT++ Simu...
Wired and Wireless Computer Network Performance Evaluation Using OMNeT++ Simu...Jaipal Dhobale
 
Broadcast wormhole routed 3-d mesh
Broadcast wormhole routed 3-d meshBroadcast wormhole routed 3-d mesh
Broadcast wormhole routed 3-d meshIJCNCJournal
 
ENERGY EFFICIENT MULTICAST ROUTING IN MANET
ENERGY EFFICIENT MULTICAST ROUTING IN MANET ENERGY EFFICIENT MULTICAST ROUTING IN MANET
ENERGY EFFICIENT MULTICAST ROUTING IN MANET ijac journal
 

Mais procurados (20)

Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Priority based bandwidth allocation in wireless sensor networks
Priority based bandwidth allocation in wireless sensor networksPriority based bandwidth allocation in wireless sensor networks
Priority based bandwidth allocation in wireless sensor networks
 
Dcn data link_layer
Dcn data link_layerDcn data link_layer
Dcn data link_layer
 
A New Paradigm for Load Balancing in WMNs
A New Paradigm for Load Balancing in WMNsA New Paradigm for Load Balancing in WMNs
A New Paradigm for Load Balancing in WMNs
 
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
 
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHMY-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
 
TransparentInterconnectionsofLotofLinks
TransparentInterconnectionsofLotofLinksTransparentInterconnectionsofLotofLinks
TransparentInterconnectionsofLotofLinks
 
Chap 1 introduction
Chap 1 introductionChap 1 introduction
Chap 1 introduction
 
Three dimension hamiltonian broadcast
Three dimension hamiltonian broadcastThree dimension hamiltonian broadcast
Three dimension hamiltonian broadcast
 
Osi(1)
Osi(1)Osi(1)
Osi(1)
 
[IJCT-V3I2P21] Authors: Swati Govil, Dr.Paramjeet Rawat
[IJCT-V3I2P21] Authors: Swati Govil, Dr.Paramjeet Rawat[IJCT-V3I2P21] Authors: Swati Govil, Dr.Paramjeet Rawat
[IJCT-V3I2P21] Authors: Swati Govil, Dr.Paramjeet Rawat
 
A cross layer optimized reliable multicast routing protocol in wireless mesh ...
A cross layer optimized reliable multicast routing protocol in wireless mesh ...A cross layer optimized reliable multicast routing protocol in wireless mesh ...
A cross layer optimized reliable multicast routing protocol in wireless mesh ...
 
Types of topology
Types of topologyTypes of topology
Types of topology
 
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3
 
Wired and Wireless Computer Network Performance Evaluation Using OMNeT++ Simu...
Wired and Wireless Computer Network Performance Evaluation Using OMNeT++ Simu...Wired and Wireless Computer Network Performance Evaluation Using OMNeT++ Simu...
Wired and Wireless Computer Network Performance Evaluation Using OMNeT++ Simu...
 
Broadcast wormhole routed 3-d mesh
Broadcast wormhole routed 3-d meshBroadcast wormhole routed 3-d mesh
Broadcast wormhole routed 3-d mesh
 
ENERGY EFFICIENT MULTICAST ROUTING IN MANET
ENERGY EFFICIENT MULTICAST ROUTING IN MANET ENERGY EFFICIENT MULTICAST ROUTING IN MANET
ENERGY EFFICIENT MULTICAST ROUTING IN MANET
 

Destaque

Comparison of Normal and Ventricular Tachyarrhythmic Electrocardiograms using...
Comparison of Normal and Ventricular Tachyarrhythmic Electrocardiograms using...Comparison of Normal and Ventricular Tachyarrhythmic Electrocardiograms using...
Comparison of Normal and Ventricular Tachyarrhythmic Electrocardiograms using...IDES Editor
 
The Effect of Network Topology on Geographic Routing Performance in Localized...
The Effect of Network Topology on Geographic Routing Performance in Localized...The Effect of Network Topology on Geographic Routing Performance in Localized...
The Effect of Network Topology on Geographic Routing Performance in Localized...IDES Editor
 
Performance Improvement Technique in Column-Store
Performance Improvement Technique in Column-StorePerformance Improvement Technique in Column-Store
Performance Improvement Technique in Column-StoreIDES Editor
 
Intuition – Based Teaching Mathematics for Engineers
Intuition – Based Teaching Mathematics for EngineersIntuition – Based Teaching Mathematics for Engineers
Intuition – Based Teaching Mathematics for EngineersIDES Editor
 
A New Method to Stop Spam Emails in Sender Side
A New Method to Stop Spam Emails in Sender SideA New Method to Stop Spam Emails in Sender Side
A New Method to Stop Spam Emails in Sender SideIDES Editor
 
Despeckling of Ultrasound Imaging using Median Regularized Coupled Pde
Despeckling of Ultrasound Imaging using Median Regularized Coupled PdeDespeckling of Ultrasound Imaging using Median Regularized Coupled Pde
Despeckling of Ultrasound Imaging using Median Regularized Coupled PdeIDES Editor
 
An RSS Based Localization Algorithm in Cellular Networks
An RSS Based Localization Algorithm in Cellular NetworksAn RSS Based Localization Algorithm in Cellular Networks
An RSS Based Localization Algorithm in Cellular NetworksIDES Editor
 
AGPM: An Authenticated Secure Group Communication Protocol for MANETs
AGPM: An Authenticated Secure Group Communication Protocol for MANETsAGPM: An Authenticated Secure Group Communication Protocol for MANETs
AGPM: An Authenticated Secure Group Communication Protocol for MANETsIDES Editor
 

Destaque (8)

Comparison of Normal and Ventricular Tachyarrhythmic Electrocardiograms using...
Comparison of Normal and Ventricular Tachyarrhythmic Electrocardiograms using...Comparison of Normal and Ventricular Tachyarrhythmic Electrocardiograms using...
Comparison of Normal and Ventricular Tachyarrhythmic Electrocardiograms using...
 
The Effect of Network Topology on Geographic Routing Performance in Localized...
The Effect of Network Topology on Geographic Routing Performance in Localized...The Effect of Network Topology on Geographic Routing Performance in Localized...
The Effect of Network Topology on Geographic Routing Performance in Localized...
 
Performance Improvement Technique in Column-Store
Performance Improvement Technique in Column-StorePerformance Improvement Technique in Column-Store
Performance Improvement Technique in Column-Store
 
Intuition – Based Teaching Mathematics for Engineers
Intuition – Based Teaching Mathematics for EngineersIntuition – Based Teaching Mathematics for Engineers
Intuition – Based Teaching Mathematics for Engineers
 
A New Method to Stop Spam Emails in Sender Side
A New Method to Stop Spam Emails in Sender SideA New Method to Stop Spam Emails in Sender Side
A New Method to Stop Spam Emails in Sender Side
 
Despeckling of Ultrasound Imaging using Median Regularized Coupled Pde
Despeckling of Ultrasound Imaging using Median Regularized Coupled PdeDespeckling of Ultrasound Imaging using Median Regularized Coupled Pde
Despeckling of Ultrasound Imaging using Median Regularized Coupled Pde
 
An RSS Based Localization Algorithm in Cellular Networks
An RSS Based Localization Algorithm in Cellular NetworksAn RSS Based Localization Algorithm in Cellular Networks
An RSS Based Localization Algorithm in Cellular Networks
 
AGPM: An Authenticated Secure Group Communication Protocol for MANETs
AGPM: An Authenticated Secure Group Communication Protocol for MANETsAGPM: An Authenticated Secure Group Communication Protocol for MANETs
AGPM: An Authenticated Secure Group Communication Protocol for MANETs
 

Semelhante a A New Approach to Improve the Efficiency of Distributed Scheduling in IEEE 802.16 Mesh Networks

7 satishkumar final_paper--75-84
7 satishkumar final_paper--75-847 satishkumar final_paper--75-84
7 satishkumar final_paper--75-84Alexander Decker
 
Handover Behaviour of Transparent Relay in WiMAX Networks
Handover Behaviour of Transparent Relay in WiMAX NetworksHandover Behaviour of Transparent Relay in WiMAX Networks
Handover Behaviour of Transparent Relay in WiMAX NetworksIDES Editor
 
Achieving Transmission Fairness in Distributed Medium Access Wireless Mesh Ne...
Achieving Transmission Fairness in Distributed Medium Access Wireless Mesh Ne...Achieving Transmission Fairness in Distributed Medium Access Wireless Mesh Ne...
Achieving Transmission Fairness in Distributed Medium Access Wireless Mesh Ne...ijwmn
 
Performance Analysis of MAC Layer Protocols for WSN with Considering the Effe...
Performance Analysis of MAC Layer Protocols for WSN with Considering the Effe...Performance Analysis of MAC Layer Protocols for WSN with Considering the Effe...
Performance Analysis of MAC Layer Protocols for WSN with Considering the Effe...BRNSSPublicationHubI
 
Design And Evaluation of Time Slot Assignment Algorithm For IEEE 802.16j Rela...
Design And Evaluation of Time Slot Assignment Algorithm For IEEE 802.16j Rela...Design And Evaluation of Time Slot Assignment Algorithm For IEEE 802.16j Rela...
Design And Evaluation of Time Slot Assignment Algorithm For IEEE 802.16j Rela...CSCJournals
 
DYNAMIC HYBRID CHANNEL (WMN) FOR BANDWIDTH GUARANTEES IN AD_HOC NETWORKS
DYNAMIC HYBRID CHANNEL (WMN) FOR BANDWIDTH GUARANTEES IN AD_HOC NETWORKSDYNAMIC HYBRID CHANNEL (WMN) FOR BANDWIDTH GUARANTEES IN AD_HOC NETWORKS
DYNAMIC HYBRID CHANNEL (WMN) FOR BANDWIDTH GUARANTEES IN AD_HOC NETWORKSpharmaindexing
 
WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF
WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF
WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF ijwmn
 
A20345606_Shah_Bonus_Report
A20345606_Shah_Bonus_ReportA20345606_Shah_Bonus_Report
A20345606_Shah_Bonus_ReportPanth Shah
 
Traffic Engineering in Metro Ethernet
Traffic Engineering in Metro EthernetTraffic Engineering in Metro Ethernet
Traffic Engineering in Metro EthernetCSCJournals
 
A CROSS-LAYER BASED SCALABLE CHANNEL SLOT RE-UTILIZATION TECHNIQUE FOR WIRELE...
A CROSS-LAYER BASED SCALABLE CHANNEL SLOT RE-UTILIZATION TECHNIQUE FOR WIRELE...A CROSS-LAYER BASED SCALABLE CHANNEL SLOT RE-UTILIZATION TECHNIQUE FOR WIRELE...
A CROSS-LAYER BASED SCALABLE CHANNEL SLOT RE-UTILIZATION TECHNIQUE FOR WIRELE...cscpconf
 
A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...
A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...
A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...csandit
 
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless NetworksEfficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless NetworksCSCJournals
 
Channel Allocation and Routing in Wireless Mesh Networks: A survey and qualit...
Channel Allocation and Routing in Wireless Mesh Networks: A survey and qualit...Channel Allocation and Routing in Wireless Mesh Networks: A survey and qualit...
Channel Allocation and Routing in Wireless Mesh Networks: A survey and qualit...ijwmn
 
5113jgraph01
5113jgraph015113jgraph01
5113jgraph01graphhoc
 
Modified q aware scheduling algorithm for improved fairness in 802.16 j networks
Modified q aware scheduling algorithm for improved fairness in 802.16 j networksModified q aware scheduling algorithm for improved fairness in 802.16 j networks
Modified q aware scheduling algorithm for improved fairness in 802.16 j networksIJCNCJournal
 

Semelhante a A New Approach to Improve the Efficiency of Distributed Scheduling in IEEE 802.16 Mesh Networks (20)

7 satishkumar final_paper--75-84
7 satishkumar final_paper--75-847 satishkumar final_paper--75-84
7 satishkumar final_paper--75-84
 
Handover Behaviour of Transparent Relay in WiMAX Networks
Handover Behaviour of Transparent Relay in WiMAX NetworksHandover Behaviour of Transparent Relay in WiMAX Networks
Handover Behaviour of Transparent Relay in WiMAX Networks
 
Achieving Transmission Fairness in Distributed Medium Access Wireless Mesh Ne...
Achieving Transmission Fairness in Distributed Medium Access Wireless Mesh Ne...Achieving Transmission Fairness in Distributed Medium Access Wireless Mesh Ne...
Achieving Transmission Fairness in Distributed Medium Access Wireless Mesh Ne...
 
Performance Analysis of MAC Layer Protocols for WSN with Considering the Effe...
Performance Analysis of MAC Layer Protocols for WSN with Considering the Effe...Performance Analysis of MAC Layer Protocols for WSN with Considering the Effe...
Performance Analysis of MAC Layer Protocols for WSN with Considering the Effe...
 
Design And Evaluation of Time Slot Assignment Algorithm For IEEE 802.16j Rela...
Design And Evaluation of Time Slot Assignment Algorithm For IEEE 802.16j Rela...Design And Evaluation of Time Slot Assignment Algorithm For IEEE 802.16j Rela...
Design And Evaluation of Time Slot Assignment Algorithm For IEEE 802.16j Rela...
 
Aj32242252
Aj32242252Aj32242252
Aj32242252
 
International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)
 
DYNAMIC HYBRID CHANNEL (WMN) FOR BANDWIDTH GUARANTEES IN AD_HOC NETWORKS
DYNAMIC HYBRID CHANNEL (WMN) FOR BANDWIDTH GUARANTEES IN AD_HOC NETWORKSDYNAMIC HYBRID CHANNEL (WMN) FOR BANDWIDTH GUARANTEES IN AD_HOC NETWORKS
DYNAMIC HYBRID CHANNEL (WMN) FOR BANDWIDTH GUARANTEES IN AD_HOC NETWORKS
 
WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF
WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF
WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF
 
A20345606_Shah_Bonus_Report
A20345606_Shah_Bonus_ReportA20345606_Shah_Bonus_Report
A20345606_Shah_Bonus_Report
 
Energy-efficient routing protocol for wireless sensor networks based on prog...
Energy-efficient routing protocol for wireless sensor networks  based on prog...Energy-efficient routing protocol for wireless sensor networks  based on prog...
Energy-efficient routing protocol for wireless sensor networks based on prog...
 
A secure and service oriented
A secure and service orientedA secure and service oriented
A secure and service oriented
 
Traffic Engineering in Metro Ethernet
Traffic Engineering in Metro EthernetTraffic Engineering in Metro Ethernet
Traffic Engineering in Metro Ethernet
 
A CROSS-LAYER BASED SCALABLE CHANNEL SLOT RE-UTILIZATION TECHNIQUE FOR WIRELE...
A CROSS-LAYER BASED SCALABLE CHANNEL SLOT RE-UTILIZATION TECHNIQUE FOR WIRELE...A CROSS-LAYER BASED SCALABLE CHANNEL SLOT RE-UTILIZATION TECHNIQUE FOR WIRELE...
A CROSS-LAYER BASED SCALABLE CHANNEL SLOT RE-UTILIZATION TECHNIQUE FOR WIRELE...
 
A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...
A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...
A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...
 
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless NetworksEfficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
 
Channel Allocation and Routing in Wireless Mesh Networks: A survey and qualit...
Channel Allocation and Routing in Wireless Mesh Networks: A survey and qualit...Channel Allocation and Routing in Wireless Mesh Networks: A survey and qualit...
Channel Allocation and Routing in Wireless Mesh Networks: A survey and qualit...
 
5113jgraph01
5113jgraph015113jgraph01
5113jgraph01
 
Modified q aware scheduling algorithm for improved fairness in 802.16 j networks
Modified q aware scheduling algorithm for improved fairness in 802.16 j networksModified q aware scheduling algorithm for improved fairness in 802.16 j networks
Modified q aware scheduling algorithm for improved fairness in 802.16 j networks
 
Mq3624532158
Mq3624532158Mq3624532158
Mq3624532158
 

Mais de IDES Editor

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A ReviewIDES Editor
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...IDES Editor
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...IDES Editor
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...IDES Editor
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCIDES Editor
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...IDES Editor
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingIDES Editor
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...IDES Editor
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsIDES Editor
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...IDES Editor
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...IDES Editor
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkIDES Editor
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetIDES Editor
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’sIDES Editor
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...IDES Editor
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance AnalysisIDES Editor
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesIDES Editor
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...IDES Editor
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...IDES Editor
 

Mais de IDES Editor (20)

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A Review
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFC
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive Thresholds
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability Framework
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’s
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance Analysis
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
 

Último

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 

Último (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 

A New Approach to Improve the Efficiency of Distributed Scheduling in IEEE 802.16 Mesh Networks

  • 1. ACEEE International Journal on Network Security, Vol 1, No. 1, Jan 2010 A New Approach to Improve the Efficiency of Distributed Scheduling in IEEE 802.16 Mesh Networks S. Lakani1, M. Fathy2, and H. Ghaffarian2 1 Department of Computer Engineering, Science and Research Branch, Islamic Azad University, Tehran, Iran Email: s.lakani@srbiau.ac.ir 2 Computer Engineering School, Iran University of Science and Technology, Tehran, Iran Email: {mahFathy, Ghaffarian}@iust.ac.ir Abstract— The recent standard for broadband wireless mesh, two different coordination modes are defined: access networks, IEEE 802.16, which resulted in the centralized and distributed. In the centralized mode the development of metropolitan area wireless networks, BS is responsible for defining the schedule of includes two network organization modes: Point to Multi transmissions in the entire network [2]. In the distributed Point and Mesh. The mesh mode provides distributed channel access operations of peering nodes and uses TDMA mode transmissions are scheduled in a fully distributed technique for channel access modulation. According to fashion without requiring any interaction with the BS. In IEEE 802.16 MAC protocol, there are two scheduling this paper the focus is on the distributed mode, which is algorithms for assigning TDMA slots to each network node: much more flexible and responsive than the centralized centralized and distributed. In distributed scheduling mode, since decisions are taken locally by SSs according algorithm, network nodes have to transmit scheduling to their current traffic load and physical channel status. message in order to inform other nodes about their transfer The bandwidth modulation in IEEE 802.16 mesh mode is schedule. In this paper a new approach is proposed to based on TDMA in which bandwidth is divided into improve distributed scheduling efficiency in IEEE 802.16 frames of fixed duration and each frame is partitioned mesh mode, with respect to network condition in every transferring opportunity. For evaluating the proposed into two subframes: control subframe and data subframe algorithm efficiency, several extensive simulations are and each subframe is divided into equal size time slots. performed in various network configurations and the most The number of control slots is ranging from 2 to 16 and important system parameters which affect the network data slots’ number is up to 256 depending on the physical performance are analyzed. layer profile and employed system parameters. Every node who is ready for data transfer, initially, broadcasts Index Terms— IEEE 802.16, WiMAX, Wireless Mesh bandwidth allocation messages into the control slots. Networks, MAC protocol, Time Division Multiple Access, Therefore two types of bandwidth allocation message are Distributed scheduling procedure. used in this process: Mesh Network Configuration and Mesh Distributed Scheduling message. The latter is used I. INTRODUCTION to identify the nodes which are waiting to access control The IEEE 802.16 standard [1], also known as slots. Therewith, the procedure used by nodes to access Worldwide Interoperability for Microwave Access the control slots and transmit control messages is named (WiMAX), is a recently developed standard for the mesh distributed scheduling procedure. The mesh Broadband Wireless Access (BWA) in fixed and mobile distributed scheduling procedure is a distributed networks. The IEEE 802.16 specifies two different modes algorithm which provides a collision-free access to of sharing the wireless medium: Point-to-Multipoint control slots. (PMP) and mesh. In PMP mode, the network In Ref. [3] the authors analyzed the performance of the organization operations are performed by a node namely mesh distributed scheduling procedure through a Base Station (BS) that has to coordinate Subscriber stochastic model. This allowed the estimation of the time Stations (SSs). On the other hand, in mesh mode the SSs interval between two consecutive accesses to the control can communicate with each other directly. This mode has sub-frame, i.e. the access interval. Then the model is been designed to be employed as a technology for validated through simulation, and can be used to gain Wireless Mesh Networks (WMNs) and can accommodate insights into the properties of the mesh distributed longer distance coverage than the PMP mode by scheduling procedure, in terms of the mean access exploiting cooperative packet relaying. The interest in interval. However, the model is unable to capture all the WMN is rapidly increasing due to the growing potential details of the mesh scheduling procedure due to its of its recently envisaged applications[1].In IEEE 802.16 simplifying assumptions, which are nonetheless 26 © 2010 ACEEE DOI: 01.ijns.01.01.06
  • 2. ACEEE International Journal on Network Security, Vol 1, No. 1, Jan 2010 indispensable to reduce the complexity of the problem so one-hop neighbor but are not linked directly, are called that it can be solved. Afzali et al. [4] have improved two-hop or extended neighbors. scalability problems of stochastic model which were As already introduced, the distributed scheduling introduced in [3]. Bayer et al. carried out a preliminary procedure is applied to coordinate the access to the investigation of the mesh distributed scheduling control slots in a distributed collision-free manner. For procedure through simulation[6]. Wei et al. [7] suggested this reason a node cannot transmit into a control slot that a load-aware and interference aware scheduling algorithm is reserved by one- or two-hop neighbors which are for IEEE 802.16 mesh mode. Their simulation results referred to as competitors of that node. Specifically, each show that the provided schemes effectively improve the node performs a virtual contention by propagating the network throughput performance in IEEE 802.16 mesh control information of its neighbors which is sent during networks and achieve high spectral utilization. Tao et al. previous control slots. This contention based procedure [8] proposed a concurrent transmission algorithm to enforces a strict precedence among competitors. While promote spatial resource reuse, which increases the every node contends until it wins; only one competitor overall end-to-end throughput. Simulation results indicate can win and access a specific control slot. The procedure that different constructions of routing tree impact the of performing this contention is described in [1] and isn’t performance of the concurrent algorithm. Fu et al. [9] the matter of interest in this paper. The major concern in used the concept of collision metric to model the this article is the delay time after which a node contends interference level and prepared a novel routing algorithm again since last access to a control slot. to increase the degree of spatial reuse in wireless mesh Every node must defer its transmission by a holdoff networks. Both the scheduling and routing schemes are time, namely Hx (referring to node x) in units of time based on IEEE 802.16 mesh mode. In Ref. [10] a linear slots. Waiting for a period of Hx, guarantees a collision programming model for optimum routing and scheduling free access to time slots. of flows in a wireless mesh network that include the As specified by the IEEE 802.16 standard, the holdoff effect of interference and allow for variable-rate time Hx is calculated as (1): transmissions was propounded. Cicconetti et al. [11] investigated network scalability and tried to minimize the H x = 2 4+ E x . (1) end to end delay problems by means of performance analysis. Due to the importance of an efficient distributed Where Ex [0, 7] is a system parameter called scheduling algorithm in IEEE 802.16 network XmtHoldoffExponent which can be configured on a per performance, in this paper a heuristic scheduling node basis. Thus, two consecutive slot accesses by the algorithm is proposed that can reduce transmission delay. same node are separated by at least 16 slots according to The performance of the mesh distributed scheduling formula (1), when Ex=0. The challenge is whether the procedure is evaluated, using extensive simulations in a delay of 16 slots is efficient or not? wide variety of scenarios. Our analysis covers some aspects of the mesh distributed scheduling procedure that III. THE HEURISTIC APPROACH have not been yet thoroughly addressed in the literature. As mentioned in previous section, when Ex=0, a node The remainder of the paper is organized as follows. In has to wait for at least 16 slots to access next slot for its Section II we describe the IEEE 802.16 mesh distributed transmission. But waiting for 16 slot isn't efficient, scheduling procedure in details. The novel approach is particularly when there is not even one competitor node discussed in section III. The performance of the new for using these 16 empty slots. For example consider a approach of mesh distributed scheduling procedure is typical WiMAX mesh network (Fig.1 section IV.B) that analyzed in Section IV, with respect to relevant factors, each node has two one-hop neighbors. Therefore, at max, such as the network topology and system configuration every node can have up to four neighbors and extended parameters. We conclude the paper in Section V. neighbors. If we divided sixteen into four, in average we obtain 4 slots per each neighbor for transmission. What II. MESH DISTRIBUTED SCHEDULING PROCEDURE happens if some of those nodes do not want to use their Hereafter in the mesh distributed scheduling procedure opportunity to send any data? node x is assumed as a generic node of the network which Therefore the standard scheduling mechanism does is referred to both BS and SSs. Additionally the common not perform well and causes a significant delay on data name for mesh BS and SSs in the literature of WMNs is packets. On this point of view, we focus on the constant node. value 4 and make this value adaptive with the number of In IEEE 802.16, a logical link is set up between each competitor nodes i.e. nodes competing to access the same couple of nodes, so the directly linked nodes are called slot. one-hop neighbors also they called simply neighbors. On The basic method of IEEE 802.16 standard for the other hand, nodes which have at least one common calculating hold off time is obtained from (1). The new approach is computing the logarithm of number of 27 © 2010 ACEEE DOI: 01.ijns.01.01.06
  • 3. ACEEE International Journal on Network Security, Vol 1, No. 1, Jan 2010 competitor nodes and using the result instead of constant replications are run. The duration of each simulation run 4 in (1). So the new formula is introduced as follows: varied depending on how the specific system was configured. H x = 2(log2 cm+ Ex ) . (2) B. Chain where cm is the number of competing nodes. In order to decrease the number of idle slots and By computing the number of competing nodes, it is improve the network performance, in this scenario a spars evaluated that how many nodes want to transmit and narrow topology i.e. chain is considered. Fig.1 shows message(s) in the current competitive slot. So every node the connections between nodes in chain topology. that wins the competition, after sending data in regarded slot, has to wait as long as hold off time (Hx). This mechanism guarantees the efficient use of channel by reducing idle slots in control subframe. Simulations in the following section show that the adoption of this Figure 1. Schematic representation of nodes connection in chain topology mechanism reduces the transmission interval. Furthermore the delay on data packets caused by the To obtain the network performance parameters, six MAC layer is reduced significantly. simulations are run with respectively 4, 9, 16, 25, 36, 49 number of network nodes. To be compatible with grid- IV. PERFORMANCE EVALUATION full, in chain topology, numbers are selected complete squared. Fig.2 shows the average frame intervals between In this section, the settings under which the simulation two consecutive mesh distributed scheduling messages, in analysis is carried out and the used performance metrics basic standard IEEE 802.16 and heuristic method. There are defined. Then the performance of the mesh distributed is an obvious drop in access interval that is originated by scheduling procedure is evaluated in several scenarios decrement of idle slots with applying proposed method. with varied network configurations. The analysis is aimed Additionally, in the heuristic method, the average access at identifying the effect of applying this solution in IEEE interval rises with the number of nodes increasing, while 802.16 based WMN. The preliminary information on in basic method this metric is almost constant. This network configuration for evaluation setting is provided implies that the average number of nodes competing to in Part A. Specifically, the simulation are run, with the access a certain slot increases while network being more following network topologies: a spars and narrow populated. network topology i.e. chain in Part B, a complicated and dense network topology i.e. grid-full in Part C. A. Evaluation Setting The parameters used in the simulations are compliant with the IEEE 802.16 standard [1]. Specifically, the frame duration is 10 ms and the channel bandwidth is 10 MHz According to the standard, only one channel is used to transmit control information, thus the use of multiple channels is not considered. Furthermore, the traffic considered is of Voice over IP (VOIP) and Video on Demand (VOD) type; however, they did not have any impact on the transmission in control slots. We now define the performance indices that have been considered in order to assess the distributed scheduling Figure 2. Average frame intervals between two consecutive mesh procedure performance in new approach. First metric is distributed scheduling messages for chain average interval (in slot units) between two consecutive The comparison of end-to-end one-way delay between mesh distributed scheduling messages sent by a node. the standard and heuristic method is shown in Fig.3. The Second one is the average end-to-end one-way delay (in chart implies that delay increases with the network seconds). Third metric is the average number of extension. It can be observed that the proposed algorithm competitors per slot during virtual contention and the last has smaller end-to-end one-way delay as a result of one is average of end-to-end throughput per flow (in reducing Hold off time and unused control slots. bytes/seconds). The patch program [12] of coordinated distributed mode of IEEE 802.16 mesh is used in NS2 simulator [13]. The simulation output analysis is carried out using the method of independent replications. Specifically, for each scenario a variable number of independent 28 © 2010 ACEEE DOI: 01.ijns.01.01.06
  • 4. ACEEE International Journal on Network Security, Vol 1, No. 1, Jan 2010 frame intervals become smaller in heuristic method because the nodes can sooner return to competition situation. Additionally, the average access interval growth in grid-full topology is more than in chain. The reason is that the average number of competitors of every node at each slot increases because in grid-full there are more neighbors than chain. Figure 3. Average end-to-end one-way delay for chain Figure 6. Average frame intervals between two consecutive mesh distributed scheduling messages in grid-full The comparison of end-to-end one-way delay is shown in Fig.7. As expected, the heuristic algorithm has smaller end-to-end one-way delay, caused by reduction of Hold off time due to decreasing the empty control slots. In other hand in grid-full topology, the value of delay is less Figure 4. Average end-to-end throughput for chain than chain topology as number of nodes in the network Fig.4 indicates the average of end-to-end throughput. becomes greater. Because of dense nature of grid-full As expected, the network throughput in proposed topology, with the number of nodes increasing the hop algorithm is better than basic standard scheduler. This distance between nodes do not increase significantly. improved result is due to the fact that nodes can quickly The average of end-to-end throughput is indicated in return to the competition state, thus the usage of network Fig.8. It can be seen that the network throughput in free opportunities become more efficient. proposed algorithm has an improvement comparing to the basic standard scheduler. The reason is the same as C. Grid-Full explained for the chain in part B and This can be Another simulation scenario is using a dense network explained by a decreased network contention and thus a topology i.e. grid-full as Fig.5 shows the nodes decreased MSH-DSCH transmission interval. connection in a schematic way. The remarkable point in two recent charts is optimum values in grid-full topology with 9 nodes. As it can be seen, the lowest delay as well as the highest throughput is   obtained in network with 9 nodes. That can be the result of the most efficient use of network resources in this specific situation. Therefore we can say this is the optimum network configuration among studied networks in which the highest value of about 140000 bytes per second of throughput and the least delay of about 0.063 seconds are computed. Figure 5. Scheme of nodes connection in grid-full topology In such networks, every node has more than two neighbors that affect the performance of network transmission scheduling. The simulations with grid-full topology are run with respectively 4, 9, 16, 25, 36, 49 number of network nodes. Fig.6 shows the distinction between average frame intervals in basic IEEE 802.16 standard and heuristic method. It can be seen that the 29 © 2010 ACEEE DOI: 01.ijns.01.01.06
  • 5. ACEEE International Journal on Network Security, Vol 1, No. 1, Jan 2010 REFERENCES [1] IEEE 802.16-2004. “IEEE standard for Local and Metropolitan Area Networks – Part 16: Air interface for Fixed Broadband Wireless Access systems,” Oct. 2004. [2] R. Bruno, M. Conti and E. Gregori, “Mesh networks: Commodity multihop ad hoc networks,” IEEE Communications, vol. 43, no. 3, Mar. 2005, pp. 23–131. [3] M. Cao, V. Raghunathan and P. R. Kumar, “A tractable algorithm for fair and efficient uplink scheduling of multi- hop WiMax mesh networks,” Proc. WiMesh 2006, Reston (VA), USA, Sep. 25, 2006, pp. 101–108. [4] M. Cao, W. Ma, Q. Zhang, X. Wang and W. Zhu, “Modeling and performance analysis of the distributed scheduler in IEEE 802.16 mesh mode,” Proc. ACM Figure 7. Average end-to-end one-way delay for grid-full MobiHoc 2005, Urbana-Champaign (IL), USA, May 25– 28, 2005, pp. 78–89. [5] M. Afzali, H. Ghaffarian and M. Fathy, “Maximum utilization of channel bandwidth using maximum likelihood in concurrent communication in WIMAX,” Proc. The 13th CSI international computer conference, Kish Island, Persian Gulf, Iran, 9-11 March, 2008. [6] N. Bayer, D. Sivchenko, B. Xu, V. Rakocevic and J. Habermann, “Transmission timing of signaling messages in IEEE 802.16 based mesh networks,” Proc. European Wireless 2006, Athens, Greece, Apr. 2–5, 2006. [7] H. Wei, S. Ganguly, R. Izmailove and Z. Haas, “Interference-Aware IEEE 802.16 WiMax Mesh Networks,” The 61st IEEE Vehicular Technology Conference, vol 5, pp 3102-3106, May 2005. [8] J. Tao, F. Liu, Z. Zeng and Z. Lin, “Throughput Figure 8. Average of end-to-end throughput for grid-full Enhancement in WiMax Mesh Networks Using Concurrent Transmission,” International conference on Wireless V. CONCLUSIONS Communications, Networking and Mobile Computing, pp 871-874, September 2005. For solving the scheduling problems of wireless [9] L. Fu, Z. Cao and P. Fan, “Spatial Reuse in IEEE 802.16 metropolitan area networks, a new approach in IEEE Based Wireless Mesh Networks,” IEEE International 802.16 distributed scheduling algorithm in mesh mode is Symposium on Communications and Information proposed and the method of calculating hold off time Technology, pp 1311-1314, October 2005. between two consecutive channel accesses is improved. [10] H. Viswanathan and S. Mukherjee, “Throughput-Rang Tradeoff of Wireless Mesh Backhaul Networks,” IEEE Simulations with various network configuration and journal on selected areas in communications, vol 24, no 3, scenarios show that, applying this solution, inefficient use pp 593-602, march 2006. of channel is effectively decreased. It is observed that the [11] C. Cicconetti, A. Erta and L. Lenzini, “Performance proposed method provides efficient use of network Evaluation of the Mesh Election Procedure of IEEE resources and decreases end-to-end delay. Thus, the 802.16/WiMAX,” Proc. 10th ACM Symposium on proposed distributed scheduling method improves the Modeling, analysis, and simulation of wireless and mobile performance of IEEE 802.16 networks, comparing to the systems, pp 323-327, October 2007. basic standard scheduling. [12] IEEE 802.16d Wireless Mesh Networks patch for NS2, The utilization of IEEE 802.16 scheduler with respect http://info.iet.unipi.it/~cng/ns2mesh80216 [13] http://www.isi.edu/nsnam/ns/, last version 2.31, Mar. 2007. to accumulated network load is considered as future work. 30 © 2010 ACEEE DOI: 01.ijns.01.01.06