SlideShare uma empresa Scribd logo
1 de 8
Baixar para ler offline
ACEEE Int. J. on Network Security, Vol. 01, No. 03, Dec 2010




 A Dynamic MAC Protocol for WCDMA Wireless
            Multimedia Networks
                           S.P.V.Subba Rao1 Dr.S. Venkata Chalam 2 Dr.D.Sreenivasa Rao3
               1
               Sreenidhi Institute of Science and Technology/ Electronics and Communication Engineering,
                                            Hyderabad, Andhra Pradesh, India
       2
         ACE Engineering College/ Electronics and Communication Engineering, Hyderabad, Andhra Pradesh, India
              3
                JNTU CE/ Electronics and Communication Engineering, Hyderabad, Andhra Pradesh, India
                                           Email: spvsubbaraophd@gmail.com


Abstract—Existing MAC protocols like TDMA and 802.11                           technology description of different wideband
have many disadvantages for scheduling multimedia traffic in                   CDMA schemes can be found.
CDMA wireless networks. Our objective is to develop a                     The key features related to W-CDMA are [4]
dynamic MAC protocol for WCDMA networks to avoid
                                                                           • Supports both FDD (frequency division duplex)
congestion and improve the channel utilization and
throughput of the bulky real-time flows. In this paper, we                     and TDD (time division duplex) modes
propose to develop a dynamic MAC protocol for wireless                     • Inter-cell asynchronous operation
multimedia networks. In the design, we combine the merits of               • Employs coherent detection on uplink and
the CSMA, TDMA MAC protocols with WCDMA systems to                             downlink based on the use of pilot symbols
improve the throughput of the multimedia WLAN in a                         • To increase capacity and coverage, Multi user
cellular environment. We use these MAC protocols                               detection and smart antennas can be used.
adaptively, to handle both the low and high data traffics of the
mobile users. It uses multiple slots per frame allowing
                                                                           • Multi code transmission and variable mission: on
multiple users to transmit simultaneously using their own                      a 10 ms frame basis
CDMA codes. By simulation results, we show that our                        • Uses adaptive power control based on Signal to
proposed MAC protocol achieves high channel utilization and                    interference ratio.
improved throughput with reduced average delay under low                   • Multiple types of handoffs between different cells
and high data traffic.                                                         including soft handoff, softer handoff and hard
                                                                               handoff.
Index Terms— Wideband Code Division Multiple Access (W-
CDMA), MAC protocol, Direct Sequence Spread Spectrum                    B. WCDMA Vs CDMA
(DSSS), Time division multiple access (TDMA), Carrier Sense                CDMA is a technique for spread spectrum multiple
Multiple Access (CSMA)
                                                                        access. In CDMA, locally generated code runs at a much
                                                                        higher rate than the data to be transmitted. Data to be
                      I. INTRODUCTION                                   broadcasted is simply logically XOR (exclusive OR) added
                                                                        with the faster code.[5] At the contrary, the wide-band
A. Wideband Code Division Multiple Access (W-CDMA)                      CDMA (W-CDMA) technology has been appeared as the
   W-CDMA is 3G mobile telecommunications networks                      major air interface for 3G wireless systems which provides
which have now turned into an air interface standard. This              a transmission rate of 144Kbps to 2Mbps. These have
has become the basis of Japan's NTT DoCoMo's FOMA                       enabled multimedia services like the broadband wired
service. W-CDMA has turned out to be the most-                          networks. The technology can support services with higher
commonly used member of the UMTS family and many of                     rate when is measured up with the narrow-band CDMA.
the times used as an alternative for UMTS. [1]. It is a direct          W-CDMA is also flexible to distribute multimedia traffic
sequence spread spectrum (DSSS) system. The bandwidth                   but a new medium access control protocol (MAC) is
of any data is spread to a much wider bandwidth and this                needed in order to manage packet access resourcefully in
reduces the power spectral density. There are two main                  wideband CDMA wireless networks. [6]
types of wideband CDMA schemes: network asynchronous
and network synchronous. [2, 3]                                         C. Issues in W-CDMA
     1. Network asynchronous schemes - In network                          As per [7], the issues related in W-CDMA can be given
         synchronous schemes, the base stations are                     as the following;
         synchronized to each other within a few                             • Pilot Pollution – It is a scenario in which a mobile
         microseconds. There are three network                                    station receives numerous pilot signals with strong
         asynchronous proposals: W-CDMA1 in ETSI and                              reception levels, but none of them is dominant
         ARIB, and TTA II wideband CDMA in Korea.                                 enough that the mobile can track it. The signals
     2. Network synchronous scheme – This scheme                                  are on the similar frequency and thus interface
         proposed by TR45.5 (cdma2000) is considered by                           with one hand.
         Korea (TTA I). The ITU radio transmission
                                                                   57
© 2010 ACEEE
DOI: 01.IJNS.01.03.18
ACEEE Int. J. on Network Security, Vol. 01, No. 03, Jan 2011



    •    HO problem – Inter-frequency of HO consists of                 In our research work, we propose to develop dynamic
         compressed mode. But the problem with                       MAC protocol for wireless multimedia networks. In the
         compressed mode for the network is the lower                design, we have combined the merits of the CSMA, TDMA
         spreading ratio. A spreading code with a low                MAC protocols with WCDMA systems to improve the
         spreading ratio openly uses more capacity from              throughput of the multimedia WLAN in a cellular
         the corresponding cells. Thus increase in                   environment. We have used these MAC protocols
         compressed slots, wastes the capacity of these              adaptively, to handle both the low and high data traffics of
         cells.                                                      the mobile users. It uses multiple slots per frame allowing
    •    SHO Parameter - SHO parameter may increase the              multiple users to transmit simultaneously using their own
         overall system interference level, but in the same          CDMA codes.
         way it decreases the system capacity. A SHO also
         consumes more data transmission capacity in the                                 II. RELATED WORKS
         network.
                                                                        V.Sumalatha et al [10] proposed a congestion control
    •    Hierarchical cells - Hierarchical arrangements in           mechanism for CDMA based IP-RAN networks. Here they
         the W-CDMA is to assign each hierarchy level on             implement congestion avoidance using the mechanism of
         a divergent frequency. This produces adjacent               router control. An AQM-RED is implemented to realize
         channel interference (ACI). This also proposes a            Router control mechanism to maximize network capability
         mobility effects along with capacity requirements           while maintaining good voice quality. The performance of
         of mobile station.                                          implementing system using AQM-RED is evaluated with
D. MAC Layer of WCDMA                                                Drop tail AQM method. CDMA is implemented with AQM
   The channel structure of W-CDMA consists of logical,              RED and has seen how the congestion is avoided and the
transport and physical channels. The physical layer                  throughput is increased.
proposes services to the medium access control (MAC)                    Uthman Baroudi et al [11] proposed an adaptive call
layer via transport channels. Transport channels are                 admission/congestion control policy. The policy is based
depicted by “How” and “With what” characteristics the                on window measurement, by assessment of the status of the
data can be transferred. The key characteristic of the MAC           buffer at the base station under the hybrid TDMA/CDMA
layer is to select suitable transport format to be used as a         access scheme. The window- measurement effectively
function of the data rate. [8] The MAC layer consists of             maintains the required QoS, particularly the blocking
three logical entities; MAC-b, MAC-c/sh and MAC-d. The               probability, call establishment delay and cell error rate.
MAC-b handles the broadcast channel (BCH). The MAC-                  They inter-relate the physical limitations of the base
c/sh handles the common channels and shared channels:                station, instantaneous buffer conditions call and burst level
paging channel (PCH), forward link access channel                    traffic and end to end bit error performance in one queuing
(FACH), Random access channel (RACH), uplink common                  problem.
packet channel (CPCH) and downlink shared channel                       Hai Jiang et al [12] proposed MAC scheme which can
(DSCH). The MAC-d is responsible for handling dedicated              achieve bit-level QoS, low overhead, accurate channel and
channels (DCH) allocated to a UE in connected mode [9].              interference estimation along with high bandwidth
   The main feature of the MAC layer includes [9]:                   efficiency. The scheme also has the potential to support
                                                                     packet-level QoS and service differentiation. They also
     • Mac layer forms Mapping between logical
                                                                     proposed a distributed MAC scheme to address these
          channels and transport channels.
                                                                     limitations, where active receivers determine whether a
     • The ciphering and the traffic volume monitoring
                                                                     candidate transmitter should transmit its traffic or defer its
          are done by MAC Layer.
                                                                     transmission to a later time.
     • Selection of appropriate Transport format (TF) for               Junshan Zhang et al [13] proposed a multi-access
          each transport channel, depending on the                   interference (MAI) process in CDMA networks which
          instantaneous source rate.                                 estimates time-varying channel conditions and the bursty-
     • Executing of the switching between common and                 ness of data traffic and opened a new dimension to
          dedicated transport channel is based on a                  understand the corresponding MAI temporal correlation
          switching decision derived by Radio resource               structure. The predictive MAI temporal structure is
          control (RRC).                                             exploitable for adaptive resource allocation to achieve
     • MAC handles service multiplexing for common                   efficient interference management, which is the key to
          transport channels and also for dedicated channels.        achieve high spectral efficiency in CDMA systems.
     • Priority handling between data flows of one User                 Liang Xu et al [14] proposed a class of dynamic fair
          equipments (UEs) as well as between UE. The                scheduling schemes based on the generalized processor
          former is achieved by selecting 'high bit rate' and        sharing (GPS) fair service discipline, under the generic
          'low bit rate' Terminal equipments (TEs) for               name code-division GPS (CDGPS). The CDGPS scheduler
          different data flows.                                      uses both the traffic characteristics in the link layer as well
     • Priority handling between UEs by means of                     as the wideband CDMA physical layer to perform fair
          dynamic scheduling for common and shared                   scheduling on a time-slot basis, by using a dynamic rate-
          downlink transport channels FACH and DSCH.                 scheduling approach other than the conventional time-
                                                                58
© 2011 ACEEE
DOI: 01.IJNS.01.03.18
ACEEE Int. J. on Network Security, Vol. 01, No. 03, Jan 2011



scheduling approach. A credit-based CDGPS (C-CDGPS)                  There are two fundamental types of SS: Direct Sequence
scheme is proposed to further enhance the utilization of the         Spread Spectrum (DS-SS) and Frequency Hopping Spread
soft capacity by trading off the short-term fairness.                Spectrum (FH-SS). In DS-SS, the user’s data is spread
   Jennifer Price et al [15] proposed a cross-layer approach         using a Pseudo-Random sequence code (PN code) and
to optimal rate assignment in multi sector CDMA                      further modulated and then transmitted. The received signal
networks. The algorithm was a “one-shot” algorithm;                  after despreading, resolves into multiple signals with
which implies that it combines the MAC and transport                 different time delays. A RAKE receiver can recover the
layer protocols to control interference and congestion               multiple time-delayed signals and can combine them into
simultaneously. They investigated the dual-based algorithm           one signal, providing an inherent time diversity receiver
in which the delay associated with addition of intermediate          with lower frequency of deep fades. When many mobile
queues at each wireless source provides the necessary                users transmit data to a common base station, then each
information for coordinating MAC and transport layers.               user will use a unique PN code to spread his data for
                                                                     transmission. The PN codes of all users are orthogonal. It is
              III. DYNAMIC MAC PROTOCOL                              this correlation property of the codes that makes it possible
                                                                     for the extraction of the desired signal at the receiver. By
A. Existing Protocols                                                multiplying the information-bearing signal b(t ) by the
   A channel-access scheme is related with a multiple                spreading code c(t ) , each information bit is chopped into a
access protocol and control mechanism, known as media                number of small time increments commonly called as
access control (MAC). This protocol deals with issues such           chips. Thus transmitted signal m(t ) , may be expressed as:
as addressing, assigning multiplex channels to different
users and avoiding collisions. [16] There are many                                                 m(t ) = c(t ) . b(t )                             (1)
proposed multiple access protocols for wireless networks
as well as many MAC protocols that have been developed                   which is a wideband signal. The received signal
for wireless voice and data communication networks.                   r (t ) contains the transmitted signal m(t ) plus the additive
Typical examples include the time division multiple access           interference i (t ) . The interference signal contains MAI
(TDMA), code division multiple access (CDMA), and                    (Multiple Access Interference) and fading and any other
contention-based protocols like IEEE 802.11 [17]. There              external interference signals. Therefore,
are four basic types of channel access schemes namely;
Frequency division multiple access (FDMA), Time                         r (t ) = m(t ) + i (t ) + n(t ) = c(t ). b(t ) + i (t ) + n(t )              (2)
division multiple access (TDMA), Code division multiple
access (CDMA), Space division multiple access (SDMA).                  where, n(t ) is Additive White Gaussian Noise (AWGN)
There are many works which are based on the above                    in the receiver. To receive the original signal b(t ) , the
schemes and many hybrid approaches among them. Most                  received signal r (t ) is multiplied by the code which was
of the hybrid approaches like [18, 19] are based on CSMA
                                                                     used in the transmitter. Therefore, the demodulated output
and TDMA. But they have many disadvantages like;
                                                                      z (t ) at the receiver is given by
   The disadvantages of CSMA are:
         Even though there are many advances in                         z (t ) = c(t ) . r (t ) = c 2(t ) . b(t ) + c(t ) . i (t ) + c(t ) . n(t )   (3)
         technology, carrier sensing is still a vital problem
         for radio networks due to the hidden terminal                 Since, c 2(t ) = 1 (the autocorrelation property of the PN
         problem. Due to severe channel fading in indoor             code),
         environments and the utilization of directional
         antennas, dependable carrier sensing is extremely                                 z (t ) = b(t ) + c(t ) . i (t ) + c(t ) . n(t )           (4)
         difficult.
         According to many research works, CSMA                      C. Hybrid Approach
         protocol is unstable                                           As per the above statement, these have many
   The disadvantages of TDMA are:                                    disadvantages using either CSMA or TDMA singularly
         Since TDMA on the uplink demands high peak                  with WCDMA systems. In our approach, we propose to
         power in transmit mode, it shortens battery life for        develop an dynamic MAC protocol for wireless multimedia
         the mobile handsets.                                        networks. In our technique, the merits of the CSMA,
         For matched filtering and correlation detection for         TDMA MAC protocols are combined with WCDMA
         synchronizing with a time slot,                             systems for enhancing the throughput of the multimedia
        TDMA requires a significant amount of signal                 WLAN in a cellular environment. In order to handle low
processing.                                                          and high data traffics of the mobile users, we considered
B. DS-SS (CDMA) Based MAC Scheme                                     MAC protocols adaptively. For allowing multiple users to
   In wideband system, the entire system bandwidth is                transmit with the help of their own CDMA codes, multiple
made available to each user and is many times larger than            slots per frame are used by them. Taking all these merits
the bandwidth required for transmitting information. Such            into consideration in our approach, we develop a dynamic
systems are known as”Spread Spectrum” (SS) systems.                  MAC protocol for WCDMA networks for avoiding

                                                                59
© 2011 ACEEE
DOI: 01.IJNS.01.03.18
ACEEE Int. J. on Network Security, Vol. 01, No. 03, Jan 2011



congestion and to enhance the channel utilization and                 utilized in the downlink. The REP mini slots are modified
throughput of the bulky real-time flows.                              to a matrix of data slots and CDMA codes (refer Figure 1).
   While describing the access system we take only one                The data slot and CDMA for a user are assigned by a
mobile cell into account in which there are M active                  scheduling algorithm (explained in section III.D) and this
nodes(or users) that generates messages to be transmitted to          data is send to the user as a REP signal by the BS.
another node. This type of network is termed as an                       A REQ signal along with some control information’s is
infrastructure networks as per the IEEE 802.11 standards              send to BS by the user which is ready for transmission. The
where the base station controls all the nodes within the cell.        scheduling algorithm of BS enables the user to get a REP
Two kinds of links are possible in this model.                        signal about the data slots and CDMA codes. Enabling the
     1. Uplink: this demonstrates data transmission from              user to transmit the data together with the processing of the
          mobile station MS to BS.                                    requests of the nodes and the scheduling is done with the
     2. Downlink: this describes the data transmission                help of the REP signal. In our dynamic work, each terminal
          from BS to MS.                                              transmits at the time slots during which it is allowed to
   In a topological aspect, the base station is positioned for        transmit using its own code sequences. Hence some
good propagation condition. The location of the portables             terminals are allowed to transmit in a simultaneous manner
is uncertain and varying. The wireless propagation                    at the time slot with acceptable Bit Error Rate (BER).
conditions have a strong impact on a choice of a suitable                The REP is divided into mini slots, each holding
multiple access protocol.                                             information of the corresponding data slot in the next
                                                                      frame. Each mini slot is further divided into grid, where
                                                                      grid is equal to the maximum number of nodes that can
1) WCDMA Scheduling
                                                                      transmit data simultaneously in a data slot. Each of these
                                                                      grids is initialized with a code which the scheduler
                                                                      allocates to the node which succeeded in getting a
                                                                      reservation for that slot. We assume that each node
                                                                      generates messages with an arrival rate λ which is Poisson
                                                                      distributed. The message length of each node is
                                                                      exponentially distributed. A node cannot generate a new
                                                                      message until all packets of the current message are
Where,                                                                transmitted completely. A node which has generated a
                   REQ –Request                                       message in the current frame cannot try to access the data
                   REP - Response                                     slots in the same frame.

M1    M2 M3        ………….. MN                                          2) WCDMA Contention
                                                                         In this dynamic MAC, traffic is classified as Real time
                                                                      (RT) and Non Real time (NRT) and prioritized as High and
                                                                      low, respectively. For the high priority data traffic, a node
                                                                      can be in one of two modes: low data traffic (LDT) or high
                                                                      data traffic (HDT). A node is in HDT only when it
                                                                      receives a High Contention (HC) Message (HCM) from a
                                                                      two-hop neighbor within the last T period. Otherwise, the
                                                                      node is in LDT. A node sends an HCM when it experiences
                                                                      high contention due to high data traffic. Each node
                                                                      calculates the data traffic (DT) (to be explained in section
                                                                      III.D) to calculate the contention. If DT is more than a
                                                                      threshold value DTth , then the nodes will send a HCM. In
                                                                      LDT, any node can compete to transmit in any slot, but in
                                                                      HDT, only the owners of the current slot and their one-hop
                                                                      neighbors are allowed to compete for the channel access. In
                                                                      both modes, the owners have higher priority over non-
              Figure 1. Hybrid WCDMA Scheduling                       owners. If a slot does not contain an owner or its owner
Where,                                                                does not have data to send, non-owners can transmit their
             C1, C2….CK: CDMA Codes                                   data in this slot.
             M1, M2…MN: Mini Slots                                    D. Scheduling Algorithm
   The time is divided into fixed size frames in the                    For the random access protocol, we use the M/M/n/n/K
proposed protocol. A frame has N time slots for the
                                                                      Markov model by obtaining the steady state equation as:
purpose of communication. The two special types of slots
in each frame are the Request (REQ) and the Reply (REP)                                       →
slots which are separated into mini slots. The mini slots of                                   x A=O                           (5)
REQ are used in the uplink and mini slots of REP are
                                                                 60
© 2011 ACEEE
DOI: 01.IJNS.01.03.18
ACEEE Int. J. on Network Security, Vol. 01, No. 03, Jan 2011



    where A is the generator matrix, O is a null matrix and              E. Data Traffic Calculation
→                                                                           Each node calculates the traffic by using the traditional
 x is a steady state probability vector and it is equal to               way to calculate the system capacity for data traffic (DT ) ,
                     →                                                   which is given by;
                     x = {x0 , x1 , x 2 L x n }               (6)
                                                                                     ⎡ βp ⎤    1        1
  For this Markov chain, the recurrent non-null and the                         DT = ⎢     ⎥×      × P × × βa                    (12)
                                                                                     ⎣ SIR ⎦ 1 + κ      Φ
absorbing properties are satisfied. ' K ' is the number of
users and the number of data slots are ' n' . The average                Where,
number of packets served by the system is calculated as:                 βp and βa = the processing gain by spectrum spreading
                                                                         and gain due to sector antenna respectively.
                                  n −1⎛ K − 1⎞ i
                    ( K Τ)   ∑i = 0 ⎜
                                    ⎜
                                    ⎝    i ⎟
                                           ⎠
                                             ⎟T                          SIR
                                                                         κ
                                                                                     = Signal to interference ratio
                                                                                   = The interference from other nodes
             PA =                                             (7)
                               n ⎛K⎞ i                                               = The power control factor
                           ∑
                                                                         P
                                    ⎜ ⎟T                                 Φ
                               i =0 ⎜ i ⎟
                                    ⎝ ⎠
                                                                                   = The voice/data activity factor.
                                                                           Every neighbor calculates the traffic to deduce the
   Here, T is the offered traffic to the system with the                 contention.
arrival rate and T is given by;
                                                                                        IV. EXPERIMENTAL RESULTS
                                   λ
                             T=                               (8)
                                   μ                                     A. Simulation Setup
Where, λ is Poisson distribution and the service rate and                   In this section, we simulate the proposed dynamic MAC
μ is the exponential distribution.                                       (DMAC) protocol for WCDMA cellular networks. The
                                                                         simulation tool used is NS2 [20] which is a general-
   The probability of the packet success rate PSR is                     purpose simulation tool that provides discrete event
calculated as ;                                                          simulation of user defined networks. In the simulation,
                       c      n                                          mobile nodes move in a 600 meter x 600 meter region for
             PSR =   ∑ ∑ (1 − xj)(1 − Berr(k ))               (9)        50 seconds simulation time. Initial locations and
                                                                         movements of the nodes are obtained using the random
                     k =0 j =0
                                                                         waypoint (RWP) model of NS2. All nodes have the same
here ' ' c' ' is the active number of CDMA codes allocated to            transmission range of 250 meters. The simulation
the active users in a data slot and the steady state                     parameters are given in table I.
probabilities are given as;                                                             TABLE I. SIMULATION PARAMETERS

                           1                                                       Area Size                600 X 600
            x0 =                          and                (10)
                       n ⎛K⎞ i                                                  Number of Cells                   2
                   ∑        ⎜ ⎟T
                       i =0 ⎜ i ⎟
                            ⎝ ⎠
                                                                                 Users Per Cell                  20
                                                                                 Slot Duration                2 msec
                                                                                  Radio Range                  250m
                    ⎛K⎞                                                          Frame Length               2 to 8 slots
               xj = ⎜ ⎟ T j x0
                    ⎜ j⎟                                     (11)
                    ⎝ ⎠                                                         Frame Duration               1 second
                                                                                 CDMA codes                    2 to 5
    and Berr (k ) is the BER value, which is given by the                       Simulation Time                50 sec
relationship as;                                                               Routing Protocol               AODV
                            ⎛                  ⎞                                 Traffic Source             CBR, VBR
                            ⎜                  ⎟                                  Video Trace           JurassikH263-256k
                       1    ⎜          Eb      ⎟
           Berr(k) = erfc⎜                                                        Packet Size                512 bytes
                       2             2    k −1 ⎟
                            ⎜ No + Eb(
                            ⎜                 )⎟                                    MSDU                        2132
                            ⎝        3     βp ⎟⎠                               Transmission Rate         1Mb,2Mb,…5Mb
Where,                                                                            No. of Users            2,4,6,8 and 10
 k = Number of active user.
 β p = Processing gain of the spectrum.
 Eb = Energy per bit in joules
 No = The two-sided psd in Watts/Hz




                                                                    61
© 2011 ACEEE
DOI: 01.IJNS.01.03.18
ACEEE Int. J. on Network Security, Vol. 01, No. 03, Jan 2011


         TABLE II. WCDMA SYSTEM PARAMETERS FOR DATA USERS
                                                                                                                                        Delay Vs Rate


                                                                                                                    0.3
                                                                                                                   0.25




                                                                                             Delay (s)
                                                                                                                    0.2                                              DMAC
                                                                                                                   0.15                                              TDMA
                                                                                                                    0.1                                              802.11
                                                                                                                   0.05
                                                                                                                      0
                                                                                                                             1      2       3      4    5
                                                                                                                                        Rate(Mb)

B. Performance Metrics
   We compare our proposed DMAC protocol against the                                                                              Figure 4. Delay Vs Rate
normal TDMA and 802.11 MAC protocols.                                                      When the traffic rate is increased, more traffic flows will
   The performance is mainly evaluated according to the                                 contend and hence fair utilization of channel will be
following metrics:                                                                      decreased. It can be seen that from Figure.2, the channel
   Channel Utilization: It is the ratio of bandwidth                                    utilization gradually decreases a little when the rate is
received into total available bandwidth for a traffic flow.                             increased. Figure.1 shows the channel utilization obtained
   Throughput: It is the throughput received successfully,                              for various rates. It shows that DMAC has better utilization
measured in Mb/s.                                                                       than the TDMA and 802.11 protocols.
   Average End-to-End Delay: The end-to-end-delay is                                       Figure.3 shows the throughput obtained with the
averaged over all surviving data packets from the sources                               proposed DMAC protocol compared with TDMA and
to the destinations.                                                                    802.11 protocols. From the figure, it can be seen that the
   The performance results are presented in the next                                    throughput for all the protocols are drastically decreased,
section.                                                                                when the rate is increased. It shows that the throughput of
C. Results                                                                              DMAC is more than the TDMA and 802.11, as rate
                                                                                        increases.
A. Effect of Varying Transmission Rates                                                    Figure.4 shows the delay occurred for various rates.
   In the first experiment, the transmission rates are varied                           From the figures, it can be observed that the delay
as 1,2,3,4 and 5Mb and measured the channel utilization,                                increases gradually when the rate is increased. It shows that
end-to-end delay and throughput.                                                        the delay of DMAC is significantly less than the WTTP
                                       Channel Utilization Vs Rate                      scheme TDMA and 802.11 protocols, since it has the
                                                                                        adaptive contention resolution mechanism.
     Channel Utilization




                           0.6
                           0.5                                                          B. Effect of Varying Sources
                           0.4                                            DMAC
                                                                                           In the second experiment, the number of sources is
                           0.3                                            TDMA
                           0.2                                                          varied as 2, 4, 6, 8 and 10 and measure the channel
                                                                          802.11
                           0.1                                                          utilization, throughput and end-to-end delay.
                             0
                                  1        2       3       4   5
                                                                                                                            Channel Utilization Vs Sources
                                               Rate (Mb)

                                                                                                                   0.6
                                                                                             Channel Utilization




                                  Figure 2. Channel Utilization Vs Rate                                            0.5
                                                                                                                   0.4                                               DMAC
                                          Throughput Vs Rate                                                       0.3                                               TDMA
                                                                                                                   0.2                                               802.11
                            0.3                                                                                    0.1
     Throughput(Mb/s)




                           0.25                                                                                      0
                            0.2                                           DMAC                                              2      4       6       8    10
                           0.15                                           TDMA
                            0.1
                                                                                                                                        Sources
                                                                          802.11
                           0.05
                              0
                                   1       2       3       4   5                                                          Figure 5. Channel Utilization Vs Sources

                                               Rate (Mb)



                                       Figure 3. Throughput Vs Rate

                                                                                   62
© 2011 ACEEE
DOI: 01.IJNS.01.03.18
ACEEE Int. J. on Network Security, Vol. 01, No. 03, Jan 2011



                                                                                     channel utilization and throughput of the bulky real-time
                                         Throughput Vs Sources
                                                                                     flows. By simulation results, we have shown that our
                                                                                     proposed MAC protocol achieves high channel utilization
                        0.2
                                                                                     and improved throughput with reduced average delay under
      Throughput(Mb)


                       0.15                                            DMAC          low and high data traffic. As a future work, we will
                        0.1                                            TDMA          include a power control mechanism to this protocol.
                       0.05                                            802.11
                                                                                                              REFERENCES
                             0
                                     2      4      6      8    10                    [1] “Wideband CDMA” from http://en.wikipedia.org/wiki/W-
                                                                                          CDMA_(UMTS)
                                                Sources                              [2] Rajamani Ganesh, Kaveh Pahlavan and Zoran Zvonar,
                                                                                          “Wireless multimedia network technologies”, Kluwer
                                                                                          academic publishers, 2000,
                                     Figure 6. Throughput Vs Sources
                                                                                     [3] R. Prasad, An overview of CDMA evolution toward
                                                                                          wideband CDMA, IEEE Commun. Surveys, Vol .1 (1), 1998.
                                            Delay Vs Sources                         [4] “Wideband                      CDMA”                   from
                                                                                          http://www.mobileisgood.com/WhatIsWCDMA.php
                       0.5                                                           [5] Peter jung , Paul walter Baier and Andreas steil “Advantages
                       0.4
                                                                                          of CDMA and Spread Spectrum Techniques over FDMA and
                                                                       DMAC               TDMA in cellular Mobile Radio Applications” IEEE
     Delay (s)




                       0.3                                                                Transactions on Vehicular Technology, Vol 42 ,No.3,
                                                                       TDMA
                       0.2                                                                August 1993.
                                                                       802.11
                       0.1                                                           [6] N. Mohan and T. Ravichandran “An Efficient Multiclass
                        0                                                                 Call Admission Control and Adaptive Scheduling for
                                 2         4       6      8    10                         WCDMA Wireless Network” Euro Journals Publishing, Inc.
                                                                                          2009.
                                                Sources                              [7] Juha       Korhonen,     “Introduction     to    3G   mobile
                                                                                          communications”, 2nd edition, mobile communication series,
                                                                                          2003.
                                          Figure 7. Delay Vs Rate                    [8] Sudhir Dixit and Tao Wu, “Content networking in the mobile
   When the traffic sources are increased, more stations                                  Internet” john wiley and son publication, 2004,
will contend for the channel and hence fair utilization of                           [9] Harri Holma and Antti Toskala, “WCDMA for UMTS: HSPA
                                                                                          evolution and LTE” , 4th edition, wiley publication, 2007,
channel will be decreased. It can be seen from Figure.5, the                              ISBN 978-0-470-31933-8
channel utilization gradually decreases a little when the                            [10] V.Sumalatha and T.Satya Savithri “Router control
number of sources is increased. It shows that DMAC has                                    mechanism for congestion avoidance in cdma based ip
better utilization than the TDMA and 802.11 protocols.                                    network”, International Journal of Information Technology
   Figure.6 shows the throughput obtained with the                                        and Knowledge Management July-December 2010, Volume
proposed DMAC protocol and other MAC protocols. From                                      2.
the figure, it can be seen that, the throughput of both                              [11] Uthman Baroudi and Ahmed Elhakeem “Adaptive
TDMA and 802.11 are decreased, when the sources are                                       Admission/Congestion Control Policy for Hybrid TDMA
                                                                                          /MC-CDMA Integrated Networks with Guaranteed QOS”
increased. But it shows that the throughput is more and
                                                                                          ICECS 2003.
increases for DMAC, because it supports multiple users.                              [12] Hai Jiang , Weihua Zhuang, and Xuemin (Sherman) Shen
   Figure.7 shows the delay of traffic occurred, when the                                 “Distributed Medium Access Control for Next Generation
sources are varied. . From the figure, it can be observed                                 CDMA Wireless Networks”                      IEEE Wireless
that the delay increases gradually when the sources are                                   Communications, Special Issue on Next Generation CDMA
increased It shows that the delay of DMAC is significantly                                vs. OFDMA for 4G Wireless Applications, vol. 14, no. 3,
less than other protocols.                                                                pp.25-31, June 2007.
                                                                                     [13] Junshan Zhang, Ming Hu and Ness B. Shroff “Bursty traffic
                                            V. CONCLUSION                                 over CDMA: predictive MAI temporal structure, rate control
                                                                                          and admission control” Elsevier 2002-2003.
   In this paper, we have developed a dynamic MAC                                    [14] Liang Xu , Xuemin (Sherman) Shen and Jon W. Mark
protocol for WCDMA wireless multimedia networks. In                                       “Dynamic Fair Scheduling With QoS Constraints in
this design, we have combined the merits of the CSMA,                                     Multimedia Wideband CDMA Cellular Networks” IEEE
TDMA MAC protocols with WCDMA systems to improve                                          Transactions on wireless communications, Vol. 3, No. 1,
                                                                                          January 2004.
the throughput of the multimedia WLAN in a cellular
                                                                                     [15] Jennifer Price and Tara Javidi “Distributed Rate
environment. We have used these MAC protocols                                             Assignments for Simultaneous Interference and Congestion
adaptively, to handle both the low and high data traffics of                              Control in CDMA-Based Wireless Networks” UW Electrical
the mobile users. It uses multiple slots per frame allowing                               Engineering Technical Report, 2004.
multiple users to transmit simultaneously using their own                            [16] “Channel             access           method”         from
CDMA codes. Hence our dynamic MAC protocol for                                            http://en.wikipedia.org/wiki/Channel_access_method
WCDMA networks avoids congestion and improves the
                                                                                63
© 2011 ACEEE
DOI: 01.IJNS.01.03.18
ACEEE Int. J. on Network Security, Vol. 01, No. 03, Jan 2011



[17] W. Ye, J. Heidemann, and D. Estrin, “An energy-efficient                                 Dr.S.Venkata Chalam is graduated in
     MAC protocol for wireless sensor networks,” in Proceedings                              B.Tech (Electronics and Communication
     the 21st Annual Joint Conference of the IEEE Computer and                               Engineering) in 1987 from the University
     Communications Societies (INFOCOM '02), pp. 1567–1576,                                  College JNTU College of Engineering
     New York, NY, USA, June 2002.                                                           Anantapur. He did his M.Tech in
[18] Nuwan Gajaweera and Dileeka Dias, “FAMA/TDMA                                            Microprocessor and application from M S
     Hybrid MAC for Wireless Sensor Networks”, In proceeding                                 University, Baroda during 1992.He was
     of the 4th International Conference on Information and                                  awarded Doctorate in ECE in 2004 from
     Automation for Sustainability, Colombo, Sri Lanka, 12-14                                Jawaharlal Nehru Technological University,
     December 2008                                                      Hyderabad. His research area of interest includes Wireless
[19] T. van Dam, and K. Langendoen, "An adaptive energy                 Multimedia Networks, Embedded systems and Digital signal
     efficient MAC protocol for wireless sensor networks," ACM          processing. He is presently guiding 10 research students of JNT
     SenSys 2003, pp. 171-180, November 2003.                           University, Hyderabad. He has 32 publications in various
[20] Network Simulator , http://www.isi.edu/nsnam                       National, International Conferences and Journals. Presently he is
                                                                        working as the principal of ACE Engineering College,
                                                                        Hyderabad, and Andhra Pradesh, India.
                   S.P.V Subba Rao is graduated in B.Tech
                   (Electronics      and       Communication                                    Dr.D.Sreenivasa Rao is graduated in
                   Engineering) in 2000 from the JNT                                           B.Tech (Electronics and Communication
                   University, Hyderabad. He did his M.Tech                                    Engineering) in 1986 from Nagarjuna
                   in Communications and signal processing                                     University. He did his M.Tech in digital
                   from S.K University, Anantapur during                                       systems from Osmania University during
                   2005.He is pursuing PHD from Jawaharlal                                     1994.He was awarded Doctorate in ECE in
Nehru Technological University, Hyderabad .His areas of interest                               2004 from University of Hyderabad .His
includes WCDMA based Wireless Multimedia Networks and                   research interest are in the area of communications and computer
Cellular Mobile Communications .He is Presently working as an           networks ,Wireless Multimedia Networks. Presently 12 research
Associate Professor in ECE dept, Sreenidhi Institute of Science         students are working under his guidance. He has 22 publications
and Technology, Hyderabad Andhra Pradesh ,India.                        in various National, International Conferences and Journals.
                                                                        Presently he is working as Professor in ECE Dept. of JNTU CE,
                                                                        Hyderabad,andAndhraPradesh,India.




                                                                   64
© 2011 ACEEE
DOI: 01.IJNS.01.03.18

Mais conteúdo relacionado

Mais procurados

Comparative Performance Assessment of V-Blast Encoded 8×8 MIMO MC-CDMA Wirele...
Comparative Performance Assessment of V-Blast Encoded 8×8 MIMO MC-CDMA Wirele...Comparative Performance Assessment of V-Blast Encoded 8×8 MIMO MC-CDMA Wirele...
Comparative Performance Assessment of V-Blast Encoded 8×8 MIMO MC-CDMA Wirele...pijans
 
A bi scheduler algorithm for frame aggregation in ieee 802.11 n
A bi scheduler algorithm for frame aggregation in ieee 802.11 nA bi scheduler algorithm for frame aggregation in ieee 802.11 n
A bi scheduler algorithm for frame aggregation in ieee 802.11 nijwmn
 
Iaetsd ber performance of cdma, wcdma, ieee802.11g in awgn
Iaetsd ber performance of cdma, wcdma, ieee802.11g in awgnIaetsd ber performance of cdma, wcdma, ieee802.11g in awgn
Iaetsd ber performance of cdma, wcdma, ieee802.11g in awgnIaetsd Iaetsd
 
Multiplexing in mobile computing
Multiplexing in mobile computingMultiplexing in mobile computing
Multiplexing in mobile computingZituSahu
 
01 introduction new
01 introduction new01 introduction new
01 introduction newJamesChueh
 
Performance Evaluation of QoS parameters in UMTS Network Using Qualnet
Performance Evaluation of QoS parameters in UMTS Network Using QualnetPerformance Evaluation of QoS parameters in UMTS Network Using Qualnet
Performance Evaluation of QoS parameters in UMTS Network Using Qualnetijdpsjournal
 
Lecture 1 mobile and adhoc network- introduction
Lecture 1  mobile and adhoc network- introductionLecture 1  mobile and adhoc network- introduction
Lecture 1 mobile and adhoc network- introductionChandra Meena
 
Multiplexing,LAN Cabling,Routers,Core and Distribution Networks
Multiplexing,LAN Cabling,Routers,Core and Distribution NetworksMultiplexing,LAN Cabling,Routers,Core and Distribution Networks
Multiplexing,LAN Cabling,Routers,Core and Distribution NetworksPanimalar Engineering College
 
Analysis of Handoff techniques used for hybrid networks: cellular/WLAN
Analysis of Handoff techniques used for hybrid networks: cellular/WLAN  Analysis of Handoff techniques used for hybrid networks: cellular/WLAN
Analysis of Handoff techniques used for hybrid networks: cellular/WLAN IJORCS
 
Improving quality of service using ofdm technique for 4 th generation network
Improving quality of service using ofdm technique for 4 th generation networkImproving quality of service using ofdm technique for 4 th generation network
Improving quality of service using ofdm technique for 4 th generation networkeSAT Publishing House
 
Cy31439446
Cy31439446Cy31439446
Cy31439446IJMER
 
Cognitive Radio for Public Safety Applications September 2012
Cognitive Radio for Public Safety Applications September 2012Cognitive Radio for Public Safety Applications September 2012
Cognitive Radio for Public Safety Applications September 2012xG Technology, Inc.
 

Mais procurados (20)

Comparative Performance Assessment of V-Blast Encoded 8×8 MIMO MC-CDMA Wirele...
Comparative Performance Assessment of V-Blast Encoded 8×8 MIMO MC-CDMA Wirele...Comparative Performance Assessment of V-Blast Encoded 8×8 MIMO MC-CDMA Wirele...
Comparative Performance Assessment of V-Blast Encoded 8×8 MIMO MC-CDMA Wirele...
 
4G Mobile Communications
4G Mobile Communications4G Mobile Communications
4G Mobile Communications
 
A bi scheduler algorithm for frame aggregation in ieee 802.11 n
A bi scheduler algorithm for frame aggregation in ieee 802.11 nA bi scheduler algorithm for frame aggregation in ieee 802.11 n
A bi scheduler algorithm for frame aggregation in ieee 802.11 n
 
2004121
20041212004121
2004121
 
Iaetsd ber performance of cdma, wcdma, ieee802.11g in awgn
Iaetsd ber performance of cdma, wcdma, ieee802.11g in awgnIaetsd ber performance of cdma, wcdma, ieee802.11g in awgn
Iaetsd ber performance of cdma, wcdma, ieee802.11g in awgn
 
Multiplexing in mobile computing
Multiplexing in mobile computingMultiplexing in mobile computing
Multiplexing in mobile computing
 
01 introduction new
01 introduction new01 introduction new
01 introduction new
 
Seminar on x-max technology ppt
Seminar on x-max technology  pptSeminar on x-max technology  ppt
Seminar on x-max technology ppt
 
Performance Evaluation of QoS parameters in UMTS Network Using Qualnet
Performance Evaluation of QoS parameters in UMTS Network Using QualnetPerformance Evaluation of QoS parameters in UMTS Network Using Qualnet
Performance Evaluation of QoS parameters in UMTS Network Using Qualnet
 
Tdma technology
Tdma technologyTdma technology
Tdma technology
 
Lecture 1 mobile and adhoc network- introduction
Lecture 1  mobile and adhoc network- introductionLecture 1  mobile and adhoc network- introduction
Lecture 1 mobile and adhoc network- introduction
 
Wireless Networks
Wireless NetworksWireless Networks
Wireless Networks
 
29 88-96
29 88-9629 88-96
29 88-96
 
Multiplexing,LAN Cabling,Routers,Core and Distribution Networks
Multiplexing,LAN Cabling,Routers,Core and Distribution NetworksMultiplexing,LAN Cabling,Routers,Core and Distribution Networks
Multiplexing,LAN Cabling,Routers,Core and Distribution Networks
 
Analysis of Handoff techniques used for hybrid networks: cellular/WLAN
Analysis of Handoff techniques used for hybrid networks: cellular/WLAN  Analysis of Handoff techniques used for hybrid networks: cellular/WLAN
Analysis of Handoff techniques used for hybrid networks: cellular/WLAN
 
Improving quality of service using ofdm technique for 4 th generation network
Improving quality of service using ofdm technique for 4 th generation networkImproving quality of service using ofdm technique for 4 th generation network
Improving quality of service using ofdm technique for 4 th generation network
 
Cy31439446
Cy31439446Cy31439446
Cy31439446
 
Cognitive Radio for Public Safety Applications September 2012
Cognitive Radio for Public Safety Applications September 2012Cognitive Radio for Public Safety Applications September 2012
Cognitive Radio for Public Safety Applications September 2012
 
1V DSP IN WIRELESS COMMUNICATION SYSTEMS
1V DSP IN WIRELESS COMMUNICATION SYSTEMS1V DSP IN WIRELESS COMMUNICATION SYSTEMS
1V DSP IN WIRELESS COMMUNICATION SYSTEMS
 
LTE_D2D
LTE_D2DLTE_D2D
LTE_D2D
 

Semelhante a A Dynamic MAC Protocol for WCDMA Wireless Multimedia Networks

Multiple access techniques for wireless communication
Multiple access techniques for wireless communicationMultiple access techniques for wireless communication
Multiple access techniques for wireless communicationDr.Umadevi V
 
A QoS Based MAC Protocol For Wireless Ad-hoc Network
A QoS Based MAC Protocol For Wireless Ad-hoc NetworkA QoS Based MAC Protocol For Wireless Ad-hoc Network
A QoS Based MAC Protocol For Wireless Ad-hoc NetworkIJNSA Journal
 
CDMA Transmitter and Receiver Implementation Using FPGA
CDMA Transmitter and Receiver Implementation Using FPGACDMA Transmitter and Receiver Implementation Using FPGA
CDMA Transmitter and Receiver Implementation Using FPGAIOSR Journals
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor networkA. Shamel
 
Cellular network presentation
Cellular network presentationCellular network presentation
Cellular network presentationAditya Pandey
 
A CROSS-LAYER BASED SCALABLE CHANNEL SLOT RE-UTILIZATION TECHNIQUE FOR WIRELE...
A CROSS-LAYER BASED SCALABLE CHANNEL SLOT RE-UTILIZATION TECHNIQUE FOR WIRELE...A CROSS-LAYER BASED SCALABLE CHANNEL SLOT RE-UTILIZATION TECHNIQUE FOR WIRELE...
A CROSS-LAYER BASED SCALABLE CHANNEL SLOT RE-UTILIZATION TECHNIQUE FOR WIRELE...cscpconf
 
A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...
A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...
A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...csandit
 
Iaetsd comparative study mimo ofdm, cdma-sdma
Iaetsd comparative study mimo ofdm, cdma-sdmaIaetsd comparative study mimo ofdm, cdma-sdma
Iaetsd comparative study mimo ofdm, cdma-sdmaIaetsd Iaetsd
 
Survey on energy efficiency in wireless sensor network using mac protocol wit...
Survey on energy efficiency in wireless sensor network using mac protocol wit...Survey on energy efficiency in wireless sensor network using mac protocol wit...
Survey on energy efficiency in wireless sensor network using mac protocol wit...Editor Jacotech
 
rohvjhgggghhgggggdtyffttyg_46218827462.pdf
rohvjhgggghhgggggdtyffttyg_46218827462.pdfrohvjhgggghhgggggdtyffttyg_46218827462.pdf
rohvjhgggghhgggggdtyffttyg_46218827462.pdfRobinKumar260480
 
Optical code division multiple access
Optical code division multiple accessOptical code division multiple access
Optical code division multiple accessMurtadha ali shukur
 
Finalpresentation 130222143702-phpapp02
Finalpresentation 130222143702-phpapp02Finalpresentation 130222143702-phpapp02
Finalpresentation 130222143702-phpapp02moussaCoulibaly22
 

Semelhante a A Dynamic MAC Protocol for WCDMA Wireless Multimedia Networks (20)

Multiple access techniques for wireless communication
Multiple access techniques for wireless communicationMultiple access techniques for wireless communication
Multiple access techniques for wireless communication
 
4G technology
4G technology4G technology
4G technology
 
A QoS Based MAC Protocol For Wireless Ad-hoc Network
A QoS Based MAC Protocol For Wireless Ad-hoc NetworkA QoS Based MAC Protocol For Wireless Ad-hoc Network
A QoS Based MAC Protocol For Wireless Ad-hoc Network
 
Wide band cdma
Wide band cdmaWide band cdma
Wide band cdma
 
CDMA Transmitter and Receiver Implementation Using FPGA
CDMA Transmitter and Receiver Implementation Using FPGACDMA Transmitter and Receiver Implementation Using FPGA
CDMA Transmitter and Receiver Implementation Using FPGA
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor network
 
3 g training by luca
3 g training by luca3 g training by luca
3 g training by luca
 
3g and 4g
3g and 4g3g and 4g
3g and 4g
 
W cdma
W cdmaW cdma
W cdma
 
Cellular network presentation
Cellular network presentationCellular network presentation
Cellular network presentation
 
A CROSS-LAYER BASED SCALABLE CHANNEL SLOT RE-UTILIZATION TECHNIQUE FOR WIRELE...
A CROSS-LAYER BASED SCALABLE CHANNEL SLOT RE-UTILIZATION TECHNIQUE FOR WIRELE...A CROSS-LAYER BASED SCALABLE CHANNEL SLOT RE-UTILIZATION TECHNIQUE FOR WIRELE...
A CROSS-LAYER BASED SCALABLE CHANNEL SLOT RE-UTILIZATION TECHNIQUE FOR WIRELE...
 
A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...
A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...
A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...
 
Iaetsd comparative study mimo ofdm, cdma-sdma
Iaetsd comparative study mimo ofdm, cdma-sdmaIaetsd comparative study mimo ofdm, cdma-sdma
Iaetsd comparative study mimo ofdm, cdma-sdma
 
Survey on energy efficiency in wireless sensor network using mac protocol wit...
Survey on energy efficiency in wireless sensor network using mac protocol wit...Survey on energy efficiency in wireless sensor network using mac protocol wit...
Survey on energy efficiency in wireless sensor network using mac protocol wit...
 
Cs6003 ahsn-add-qb
Cs6003 ahsn-add-qbCs6003 ahsn-add-qb
Cs6003 ahsn-add-qb
 
rohvjhgggghhgggggdtyffttyg_46218827462.pdf
rohvjhgggghhgggggdtyffttyg_46218827462.pdfrohvjhgggghhgggggdtyffttyg_46218827462.pdf
rohvjhgggghhgggggdtyffttyg_46218827462.pdf
 
Optical code division multiple access
Optical code division multiple accessOptical code division multiple access
Optical code division multiple access
 
Aj32242252
Aj32242252Aj32242252
Aj32242252
 
Finalpresentation 130222143702-phpapp02
Finalpresentation 130222143702-phpapp02Finalpresentation 130222143702-phpapp02
Finalpresentation 130222143702-phpapp02
 
Aa
AaAa
Aa
 

Mais de IDES Editor

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A ReviewIDES Editor
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...IDES Editor
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...IDES Editor
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...IDES Editor
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCIDES Editor
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...IDES Editor
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingIDES Editor
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...IDES Editor
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsIDES Editor
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...IDES Editor
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...IDES Editor
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkIDES Editor
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetIDES Editor
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’sIDES Editor
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...IDES Editor
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance AnalysisIDES Editor
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesIDES Editor
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...IDES Editor
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...IDES Editor
 

Mais de IDES Editor (20)

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A Review
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFC
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive Thresholds
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability Framework
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’s
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance Analysis
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
 

Último

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 

Último (20)

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

A Dynamic MAC Protocol for WCDMA Wireless Multimedia Networks

  • 1. ACEEE Int. J. on Network Security, Vol. 01, No. 03, Dec 2010 A Dynamic MAC Protocol for WCDMA Wireless Multimedia Networks S.P.V.Subba Rao1 Dr.S. Venkata Chalam 2 Dr.D.Sreenivasa Rao3 1 Sreenidhi Institute of Science and Technology/ Electronics and Communication Engineering, Hyderabad, Andhra Pradesh, India 2 ACE Engineering College/ Electronics and Communication Engineering, Hyderabad, Andhra Pradesh, India 3 JNTU CE/ Electronics and Communication Engineering, Hyderabad, Andhra Pradesh, India Email: spvsubbaraophd@gmail.com Abstract—Existing MAC protocols like TDMA and 802.11 technology description of different wideband have many disadvantages for scheduling multimedia traffic in CDMA schemes can be found. CDMA wireless networks. Our objective is to develop a The key features related to W-CDMA are [4] dynamic MAC protocol for WCDMA networks to avoid • Supports both FDD (frequency division duplex) congestion and improve the channel utilization and throughput of the bulky real-time flows. In this paper, we and TDD (time division duplex) modes propose to develop a dynamic MAC protocol for wireless • Inter-cell asynchronous operation multimedia networks. In the design, we combine the merits of • Employs coherent detection on uplink and the CSMA, TDMA MAC protocols with WCDMA systems to downlink based on the use of pilot symbols improve the throughput of the multimedia WLAN in a • To increase capacity and coverage, Multi user cellular environment. We use these MAC protocols detection and smart antennas can be used. adaptively, to handle both the low and high data traffics of the mobile users. It uses multiple slots per frame allowing • Multi code transmission and variable mission: on multiple users to transmit simultaneously using their own a 10 ms frame basis CDMA codes. By simulation results, we show that our • Uses adaptive power control based on Signal to proposed MAC protocol achieves high channel utilization and interference ratio. improved throughput with reduced average delay under low • Multiple types of handoffs between different cells and high data traffic. including soft handoff, softer handoff and hard handoff. Index Terms— Wideband Code Division Multiple Access (W- CDMA), MAC protocol, Direct Sequence Spread Spectrum B. WCDMA Vs CDMA (DSSS), Time division multiple access (TDMA), Carrier Sense CDMA is a technique for spread spectrum multiple Multiple Access (CSMA) access. In CDMA, locally generated code runs at a much higher rate than the data to be transmitted. Data to be I. INTRODUCTION broadcasted is simply logically XOR (exclusive OR) added with the faster code.[5] At the contrary, the wide-band A. Wideband Code Division Multiple Access (W-CDMA) CDMA (W-CDMA) technology has been appeared as the W-CDMA is 3G mobile telecommunications networks major air interface for 3G wireless systems which provides which have now turned into an air interface standard. This a transmission rate of 144Kbps to 2Mbps. These have has become the basis of Japan's NTT DoCoMo's FOMA enabled multimedia services like the broadband wired service. W-CDMA has turned out to be the most- networks. The technology can support services with higher commonly used member of the UMTS family and many of rate when is measured up with the narrow-band CDMA. the times used as an alternative for UMTS. [1]. It is a direct W-CDMA is also flexible to distribute multimedia traffic sequence spread spectrum (DSSS) system. The bandwidth but a new medium access control protocol (MAC) is of any data is spread to a much wider bandwidth and this needed in order to manage packet access resourcefully in reduces the power spectral density. There are two main wideband CDMA wireless networks. [6] types of wideband CDMA schemes: network asynchronous and network synchronous. [2, 3] C. Issues in W-CDMA 1. Network asynchronous schemes - In network As per [7], the issues related in W-CDMA can be given synchronous schemes, the base stations are as the following; synchronized to each other within a few • Pilot Pollution – It is a scenario in which a mobile microseconds. There are three network station receives numerous pilot signals with strong asynchronous proposals: W-CDMA1 in ETSI and reception levels, but none of them is dominant ARIB, and TTA II wideband CDMA in Korea. enough that the mobile can track it. The signals 2. Network synchronous scheme – This scheme are on the similar frequency and thus interface proposed by TR45.5 (cdma2000) is considered by with one hand. Korea (TTA I). The ITU radio transmission 57 © 2010 ACEEE DOI: 01.IJNS.01.03.18
  • 2. ACEEE Int. J. on Network Security, Vol. 01, No. 03, Jan 2011 • HO problem – Inter-frequency of HO consists of In our research work, we propose to develop dynamic compressed mode. But the problem with MAC protocol for wireless multimedia networks. In the compressed mode for the network is the lower design, we have combined the merits of the CSMA, TDMA spreading ratio. A spreading code with a low MAC protocols with WCDMA systems to improve the spreading ratio openly uses more capacity from throughput of the multimedia WLAN in a cellular the corresponding cells. Thus increase in environment. We have used these MAC protocols compressed slots, wastes the capacity of these adaptively, to handle both the low and high data traffics of cells. the mobile users. It uses multiple slots per frame allowing • SHO Parameter - SHO parameter may increase the multiple users to transmit simultaneously using their own overall system interference level, but in the same CDMA codes. way it decreases the system capacity. A SHO also consumes more data transmission capacity in the II. RELATED WORKS network. V.Sumalatha et al [10] proposed a congestion control • Hierarchical cells - Hierarchical arrangements in mechanism for CDMA based IP-RAN networks. Here they the W-CDMA is to assign each hierarchy level on implement congestion avoidance using the mechanism of a divergent frequency. This produces adjacent router control. An AQM-RED is implemented to realize channel interference (ACI). This also proposes a Router control mechanism to maximize network capability mobility effects along with capacity requirements while maintaining good voice quality. The performance of of mobile station. implementing system using AQM-RED is evaluated with D. MAC Layer of WCDMA Drop tail AQM method. CDMA is implemented with AQM The channel structure of W-CDMA consists of logical, RED and has seen how the congestion is avoided and the transport and physical channels. The physical layer throughput is increased. proposes services to the medium access control (MAC) Uthman Baroudi et al [11] proposed an adaptive call layer via transport channels. Transport channels are admission/congestion control policy. The policy is based depicted by “How” and “With what” characteristics the on window measurement, by assessment of the status of the data can be transferred. The key characteristic of the MAC buffer at the base station under the hybrid TDMA/CDMA layer is to select suitable transport format to be used as a access scheme. The window- measurement effectively function of the data rate. [8] The MAC layer consists of maintains the required QoS, particularly the blocking three logical entities; MAC-b, MAC-c/sh and MAC-d. The probability, call establishment delay and cell error rate. MAC-b handles the broadcast channel (BCH). The MAC- They inter-relate the physical limitations of the base c/sh handles the common channels and shared channels: station, instantaneous buffer conditions call and burst level paging channel (PCH), forward link access channel traffic and end to end bit error performance in one queuing (FACH), Random access channel (RACH), uplink common problem. packet channel (CPCH) and downlink shared channel Hai Jiang et al [12] proposed MAC scheme which can (DSCH). The MAC-d is responsible for handling dedicated achieve bit-level QoS, low overhead, accurate channel and channels (DCH) allocated to a UE in connected mode [9]. interference estimation along with high bandwidth The main feature of the MAC layer includes [9]: efficiency. The scheme also has the potential to support packet-level QoS and service differentiation. They also • Mac layer forms Mapping between logical proposed a distributed MAC scheme to address these channels and transport channels. limitations, where active receivers determine whether a • The ciphering and the traffic volume monitoring candidate transmitter should transmit its traffic or defer its are done by MAC Layer. transmission to a later time. • Selection of appropriate Transport format (TF) for Junshan Zhang et al [13] proposed a multi-access each transport channel, depending on the interference (MAI) process in CDMA networks which instantaneous source rate. estimates time-varying channel conditions and the bursty- • Executing of the switching between common and ness of data traffic and opened a new dimension to dedicated transport channel is based on a understand the corresponding MAI temporal correlation switching decision derived by Radio resource structure. The predictive MAI temporal structure is control (RRC). exploitable for adaptive resource allocation to achieve • MAC handles service multiplexing for common efficient interference management, which is the key to transport channels and also for dedicated channels. achieve high spectral efficiency in CDMA systems. • Priority handling between data flows of one User Liang Xu et al [14] proposed a class of dynamic fair equipments (UEs) as well as between UE. The scheduling schemes based on the generalized processor former is achieved by selecting 'high bit rate' and sharing (GPS) fair service discipline, under the generic 'low bit rate' Terminal equipments (TEs) for name code-division GPS (CDGPS). The CDGPS scheduler different data flows. uses both the traffic characteristics in the link layer as well • Priority handling between UEs by means of as the wideband CDMA physical layer to perform fair dynamic scheduling for common and shared scheduling on a time-slot basis, by using a dynamic rate- downlink transport channels FACH and DSCH. scheduling approach other than the conventional time- 58 © 2011 ACEEE DOI: 01.IJNS.01.03.18
  • 3. ACEEE Int. J. on Network Security, Vol. 01, No. 03, Jan 2011 scheduling approach. A credit-based CDGPS (C-CDGPS) There are two fundamental types of SS: Direct Sequence scheme is proposed to further enhance the utilization of the Spread Spectrum (DS-SS) and Frequency Hopping Spread soft capacity by trading off the short-term fairness. Spectrum (FH-SS). In DS-SS, the user’s data is spread Jennifer Price et al [15] proposed a cross-layer approach using a Pseudo-Random sequence code (PN code) and to optimal rate assignment in multi sector CDMA further modulated and then transmitted. The received signal networks. The algorithm was a “one-shot” algorithm; after despreading, resolves into multiple signals with which implies that it combines the MAC and transport different time delays. A RAKE receiver can recover the layer protocols to control interference and congestion multiple time-delayed signals and can combine them into simultaneously. They investigated the dual-based algorithm one signal, providing an inherent time diversity receiver in which the delay associated with addition of intermediate with lower frequency of deep fades. When many mobile queues at each wireless source provides the necessary users transmit data to a common base station, then each information for coordinating MAC and transport layers. user will use a unique PN code to spread his data for transmission. The PN codes of all users are orthogonal. It is III. DYNAMIC MAC PROTOCOL this correlation property of the codes that makes it possible for the extraction of the desired signal at the receiver. By A. Existing Protocols multiplying the information-bearing signal b(t ) by the A channel-access scheme is related with a multiple spreading code c(t ) , each information bit is chopped into a access protocol and control mechanism, known as media number of small time increments commonly called as access control (MAC). This protocol deals with issues such chips. Thus transmitted signal m(t ) , may be expressed as: as addressing, assigning multiplex channels to different users and avoiding collisions. [16] There are many m(t ) = c(t ) . b(t ) (1) proposed multiple access protocols for wireless networks as well as many MAC protocols that have been developed which is a wideband signal. The received signal for wireless voice and data communication networks. r (t ) contains the transmitted signal m(t ) plus the additive Typical examples include the time division multiple access interference i (t ) . The interference signal contains MAI (TDMA), code division multiple access (CDMA), and (Multiple Access Interference) and fading and any other contention-based protocols like IEEE 802.11 [17]. There external interference signals. Therefore, are four basic types of channel access schemes namely; Frequency division multiple access (FDMA), Time r (t ) = m(t ) + i (t ) + n(t ) = c(t ). b(t ) + i (t ) + n(t ) (2) division multiple access (TDMA), Code division multiple access (CDMA), Space division multiple access (SDMA). where, n(t ) is Additive White Gaussian Noise (AWGN) There are many works which are based on the above in the receiver. To receive the original signal b(t ) , the schemes and many hybrid approaches among them. Most received signal r (t ) is multiplied by the code which was of the hybrid approaches like [18, 19] are based on CSMA used in the transmitter. Therefore, the demodulated output and TDMA. But they have many disadvantages like; z (t ) at the receiver is given by The disadvantages of CSMA are: Even though there are many advances in z (t ) = c(t ) . r (t ) = c 2(t ) . b(t ) + c(t ) . i (t ) + c(t ) . n(t ) (3) technology, carrier sensing is still a vital problem for radio networks due to the hidden terminal Since, c 2(t ) = 1 (the autocorrelation property of the PN problem. Due to severe channel fading in indoor code), environments and the utilization of directional antennas, dependable carrier sensing is extremely z (t ) = b(t ) + c(t ) . i (t ) + c(t ) . n(t ) (4) difficult. According to many research works, CSMA C. Hybrid Approach protocol is unstable As per the above statement, these have many The disadvantages of TDMA are: disadvantages using either CSMA or TDMA singularly Since TDMA on the uplink demands high peak with WCDMA systems. In our approach, we propose to power in transmit mode, it shortens battery life for develop an dynamic MAC protocol for wireless multimedia the mobile handsets. networks. In our technique, the merits of the CSMA, For matched filtering and correlation detection for TDMA MAC protocols are combined with WCDMA synchronizing with a time slot, systems for enhancing the throughput of the multimedia TDMA requires a significant amount of signal WLAN in a cellular environment. In order to handle low processing. and high data traffics of the mobile users, we considered B. DS-SS (CDMA) Based MAC Scheme MAC protocols adaptively. For allowing multiple users to In wideband system, the entire system bandwidth is transmit with the help of their own CDMA codes, multiple made available to each user and is many times larger than slots per frame are used by them. Taking all these merits the bandwidth required for transmitting information. Such into consideration in our approach, we develop a dynamic systems are known as”Spread Spectrum” (SS) systems. MAC protocol for WCDMA networks for avoiding 59 © 2011 ACEEE DOI: 01.IJNS.01.03.18
  • 4. ACEEE Int. J. on Network Security, Vol. 01, No. 03, Jan 2011 congestion and to enhance the channel utilization and utilized in the downlink. The REP mini slots are modified throughput of the bulky real-time flows. to a matrix of data slots and CDMA codes (refer Figure 1). While describing the access system we take only one The data slot and CDMA for a user are assigned by a mobile cell into account in which there are M active scheduling algorithm (explained in section III.D) and this nodes(or users) that generates messages to be transmitted to data is send to the user as a REP signal by the BS. another node. This type of network is termed as an A REQ signal along with some control information’s is infrastructure networks as per the IEEE 802.11 standards send to BS by the user which is ready for transmission. The where the base station controls all the nodes within the cell. scheduling algorithm of BS enables the user to get a REP Two kinds of links are possible in this model. signal about the data slots and CDMA codes. Enabling the 1. Uplink: this demonstrates data transmission from user to transmit the data together with the processing of the mobile station MS to BS. requests of the nodes and the scheduling is done with the 2. Downlink: this describes the data transmission help of the REP signal. In our dynamic work, each terminal from BS to MS. transmits at the time slots during which it is allowed to In a topological aspect, the base station is positioned for transmit using its own code sequences. Hence some good propagation condition. The location of the portables terminals are allowed to transmit in a simultaneous manner is uncertain and varying. The wireless propagation at the time slot with acceptable Bit Error Rate (BER). conditions have a strong impact on a choice of a suitable The REP is divided into mini slots, each holding multiple access protocol. information of the corresponding data slot in the next frame. Each mini slot is further divided into grid, where grid is equal to the maximum number of nodes that can 1) WCDMA Scheduling transmit data simultaneously in a data slot. Each of these grids is initialized with a code which the scheduler allocates to the node which succeeded in getting a reservation for that slot. We assume that each node generates messages with an arrival rate λ which is Poisson distributed. The message length of each node is exponentially distributed. A node cannot generate a new message until all packets of the current message are Where, transmitted completely. A node which has generated a REQ –Request message in the current frame cannot try to access the data REP - Response slots in the same frame. M1 M2 M3 ………….. MN 2) WCDMA Contention In this dynamic MAC, traffic is classified as Real time (RT) and Non Real time (NRT) and prioritized as High and low, respectively. For the high priority data traffic, a node can be in one of two modes: low data traffic (LDT) or high data traffic (HDT). A node is in HDT only when it receives a High Contention (HC) Message (HCM) from a two-hop neighbor within the last T period. Otherwise, the node is in LDT. A node sends an HCM when it experiences high contention due to high data traffic. Each node calculates the data traffic (DT) (to be explained in section III.D) to calculate the contention. If DT is more than a threshold value DTth , then the nodes will send a HCM. In LDT, any node can compete to transmit in any slot, but in HDT, only the owners of the current slot and their one-hop neighbors are allowed to compete for the channel access. In both modes, the owners have higher priority over non- Figure 1. Hybrid WCDMA Scheduling owners. If a slot does not contain an owner or its owner Where, does not have data to send, non-owners can transmit their C1, C2….CK: CDMA Codes data in this slot. M1, M2…MN: Mini Slots D. Scheduling Algorithm The time is divided into fixed size frames in the For the random access protocol, we use the M/M/n/n/K proposed protocol. A frame has N time slots for the Markov model by obtaining the steady state equation as: purpose of communication. The two special types of slots in each frame are the Request (REQ) and the Reply (REP) → slots which are separated into mini slots. The mini slots of x A=O (5) REQ are used in the uplink and mini slots of REP are 60 © 2011 ACEEE DOI: 01.IJNS.01.03.18
  • 5. ACEEE Int. J. on Network Security, Vol. 01, No. 03, Jan 2011 where A is the generator matrix, O is a null matrix and E. Data Traffic Calculation → Each node calculates the traffic by using the traditional x is a steady state probability vector and it is equal to way to calculate the system capacity for data traffic (DT ) , → which is given by; x = {x0 , x1 , x 2 L x n } (6) ⎡ βp ⎤ 1 1 For this Markov chain, the recurrent non-null and the DT = ⎢ ⎥× × P × × βa (12) ⎣ SIR ⎦ 1 + κ Φ absorbing properties are satisfied. ' K ' is the number of users and the number of data slots are ' n' . The average Where, number of packets served by the system is calculated as: βp and βa = the processing gain by spectrum spreading and gain due to sector antenna respectively. n −1⎛ K − 1⎞ i ( K Τ) ∑i = 0 ⎜ ⎜ ⎝ i ⎟ ⎠ ⎟T SIR κ = Signal to interference ratio = The interference from other nodes PA = (7) n ⎛K⎞ i = The power control factor ∑ P ⎜ ⎟T Φ i =0 ⎜ i ⎟ ⎝ ⎠ = The voice/data activity factor. Every neighbor calculates the traffic to deduce the Here, T is the offered traffic to the system with the contention. arrival rate and T is given by; IV. EXPERIMENTAL RESULTS λ T= (8) μ A. Simulation Setup Where, λ is Poisson distribution and the service rate and In this section, we simulate the proposed dynamic MAC μ is the exponential distribution. (DMAC) protocol for WCDMA cellular networks. The simulation tool used is NS2 [20] which is a general- The probability of the packet success rate PSR is purpose simulation tool that provides discrete event calculated as ; simulation of user defined networks. In the simulation, c n mobile nodes move in a 600 meter x 600 meter region for PSR = ∑ ∑ (1 − xj)(1 − Berr(k )) (9) 50 seconds simulation time. Initial locations and movements of the nodes are obtained using the random k =0 j =0 waypoint (RWP) model of NS2. All nodes have the same here ' ' c' ' is the active number of CDMA codes allocated to transmission range of 250 meters. The simulation the active users in a data slot and the steady state parameters are given in table I. probabilities are given as; TABLE I. SIMULATION PARAMETERS 1 Area Size 600 X 600 x0 = and (10) n ⎛K⎞ i Number of Cells 2 ∑ ⎜ ⎟T i =0 ⎜ i ⎟ ⎝ ⎠ Users Per Cell 20 Slot Duration 2 msec Radio Range 250m ⎛K⎞ Frame Length 2 to 8 slots xj = ⎜ ⎟ T j x0 ⎜ j⎟ (11) ⎝ ⎠ Frame Duration 1 second CDMA codes 2 to 5 and Berr (k ) is the BER value, which is given by the Simulation Time 50 sec relationship as; Routing Protocol AODV ⎛ ⎞ Traffic Source CBR, VBR ⎜ ⎟ Video Trace JurassikH263-256k 1 ⎜ Eb ⎟ Berr(k) = erfc⎜ Packet Size 512 bytes 2 2 k −1 ⎟ ⎜ No + Eb( ⎜ )⎟ MSDU 2132 ⎝ 3 βp ⎟⎠ Transmission Rate 1Mb,2Mb,…5Mb Where, No. of Users 2,4,6,8 and 10 k = Number of active user. β p = Processing gain of the spectrum. Eb = Energy per bit in joules No = The two-sided psd in Watts/Hz 61 © 2011 ACEEE DOI: 01.IJNS.01.03.18
  • 6. ACEEE Int. J. on Network Security, Vol. 01, No. 03, Jan 2011 TABLE II. WCDMA SYSTEM PARAMETERS FOR DATA USERS Delay Vs Rate 0.3 0.25 Delay (s) 0.2 DMAC 0.15 TDMA 0.1 802.11 0.05 0 1 2 3 4 5 Rate(Mb) B. Performance Metrics We compare our proposed DMAC protocol against the Figure 4. Delay Vs Rate normal TDMA and 802.11 MAC protocols. When the traffic rate is increased, more traffic flows will The performance is mainly evaluated according to the contend and hence fair utilization of channel will be following metrics: decreased. It can be seen that from Figure.2, the channel Channel Utilization: It is the ratio of bandwidth utilization gradually decreases a little when the rate is received into total available bandwidth for a traffic flow. increased. Figure.1 shows the channel utilization obtained Throughput: It is the throughput received successfully, for various rates. It shows that DMAC has better utilization measured in Mb/s. than the TDMA and 802.11 protocols. Average End-to-End Delay: The end-to-end-delay is Figure.3 shows the throughput obtained with the averaged over all surviving data packets from the sources proposed DMAC protocol compared with TDMA and to the destinations. 802.11 protocols. From the figure, it can be seen that the The performance results are presented in the next throughput for all the protocols are drastically decreased, section. when the rate is increased. It shows that the throughput of C. Results DMAC is more than the TDMA and 802.11, as rate increases. A. Effect of Varying Transmission Rates Figure.4 shows the delay occurred for various rates. In the first experiment, the transmission rates are varied From the figures, it can be observed that the delay as 1,2,3,4 and 5Mb and measured the channel utilization, increases gradually when the rate is increased. It shows that end-to-end delay and throughput. the delay of DMAC is significantly less than the WTTP Channel Utilization Vs Rate scheme TDMA and 802.11 protocols, since it has the adaptive contention resolution mechanism. Channel Utilization 0.6 0.5 B. Effect of Varying Sources 0.4 DMAC In the second experiment, the number of sources is 0.3 TDMA 0.2 varied as 2, 4, 6, 8 and 10 and measure the channel 802.11 0.1 utilization, throughput and end-to-end delay. 0 1 2 3 4 5 Channel Utilization Vs Sources Rate (Mb) 0.6 Channel Utilization Figure 2. Channel Utilization Vs Rate 0.5 0.4 DMAC Throughput Vs Rate 0.3 TDMA 0.2 802.11 0.3 0.1 Throughput(Mb/s) 0.25 0 0.2 DMAC 2 4 6 8 10 0.15 TDMA 0.1 Sources 802.11 0.05 0 1 2 3 4 5 Figure 5. Channel Utilization Vs Sources Rate (Mb) Figure 3. Throughput Vs Rate 62 © 2011 ACEEE DOI: 01.IJNS.01.03.18
  • 7. ACEEE Int. J. on Network Security, Vol. 01, No. 03, Jan 2011 channel utilization and throughput of the bulky real-time Throughput Vs Sources flows. By simulation results, we have shown that our proposed MAC protocol achieves high channel utilization 0.2 and improved throughput with reduced average delay under Throughput(Mb) 0.15 DMAC low and high data traffic. As a future work, we will 0.1 TDMA include a power control mechanism to this protocol. 0.05 802.11 REFERENCES 0 2 4 6 8 10 [1] “Wideband CDMA” from http://en.wikipedia.org/wiki/W- CDMA_(UMTS) Sources [2] Rajamani Ganesh, Kaveh Pahlavan and Zoran Zvonar, “Wireless multimedia network technologies”, Kluwer academic publishers, 2000, Figure 6. Throughput Vs Sources [3] R. Prasad, An overview of CDMA evolution toward wideband CDMA, IEEE Commun. Surveys, Vol .1 (1), 1998. Delay Vs Sources [4] “Wideband CDMA” from http://www.mobileisgood.com/WhatIsWCDMA.php 0.5 [5] Peter jung , Paul walter Baier and Andreas steil “Advantages 0.4 of CDMA and Spread Spectrum Techniques over FDMA and DMAC TDMA in cellular Mobile Radio Applications” IEEE Delay (s) 0.3 Transactions on Vehicular Technology, Vol 42 ,No.3, TDMA 0.2 August 1993. 802.11 0.1 [6] N. Mohan and T. Ravichandran “An Efficient Multiclass 0 Call Admission Control and Adaptive Scheduling for 2 4 6 8 10 WCDMA Wireless Network” Euro Journals Publishing, Inc. 2009. Sources [7] Juha Korhonen, “Introduction to 3G mobile communications”, 2nd edition, mobile communication series, 2003. Figure 7. Delay Vs Rate [8] Sudhir Dixit and Tao Wu, “Content networking in the mobile When the traffic sources are increased, more stations Internet” john wiley and son publication, 2004, will contend for the channel and hence fair utilization of [9] Harri Holma and Antti Toskala, “WCDMA for UMTS: HSPA evolution and LTE” , 4th edition, wiley publication, 2007, channel will be decreased. It can be seen from Figure.5, the ISBN 978-0-470-31933-8 channel utilization gradually decreases a little when the [10] V.Sumalatha and T.Satya Savithri “Router control number of sources is increased. It shows that DMAC has mechanism for congestion avoidance in cdma based ip better utilization than the TDMA and 802.11 protocols. network”, International Journal of Information Technology Figure.6 shows the throughput obtained with the and Knowledge Management July-December 2010, Volume proposed DMAC protocol and other MAC protocols. From 2. the figure, it can be seen that, the throughput of both [11] Uthman Baroudi and Ahmed Elhakeem “Adaptive TDMA and 802.11 are decreased, when the sources are Admission/Congestion Control Policy for Hybrid TDMA /MC-CDMA Integrated Networks with Guaranteed QOS” increased. But it shows that the throughput is more and ICECS 2003. increases for DMAC, because it supports multiple users. [12] Hai Jiang , Weihua Zhuang, and Xuemin (Sherman) Shen Figure.7 shows the delay of traffic occurred, when the “Distributed Medium Access Control for Next Generation sources are varied. . From the figure, it can be observed CDMA Wireless Networks” IEEE Wireless that the delay increases gradually when the sources are Communications, Special Issue on Next Generation CDMA increased It shows that the delay of DMAC is significantly vs. OFDMA for 4G Wireless Applications, vol. 14, no. 3, less than other protocols. pp.25-31, June 2007. [13] Junshan Zhang, Ming Hu and Ness B. Shroff “Bursty traffic V. CONCLUSION over CDMA: predictive MAI temporal structure, rate control and admission control” Elsevier 2002-2003. In this paper, we have developed a dynamic MAC [14] Liang Xu , Xuemin (Sherman) Shen and Jon W. Mark protocol for WCDMA wireless multimedia networks. In “Dynamic Fair Scheduling With QoS Constraints in this design, we have combined the merits of the CSMA, Multimedia Wideband CDMA Cellular Networks” IEEE TDMA MAC protocols with WCDMA systems to improve Transactions on wireless communications, Vol. 3, No. 1, January 2004. the throughput of the multimedia WLAN in a cellular [15] Jennifer Price and Tara Javidi “Distributed Rate environment. We have used these MAC protocols Assignments for Simultaneous Interference and Congestion adaptively, to handle both the low and high data traffics of Control in CDMA-Based Wireless Networks” UW Electrical the mobile users. It uses multiple slots per frame allowing Engineering Technical Report, 2004. multiple users to transmit simultaneously using their own [16] “Channel access method” from CDMA codes. Hence our dynamic MAC protocol for http://en.wikipedia.org/wiki/Channel_access_method WCDMA networks avoids congestion and improves the 63 © 2011 ACEEE DOI: 01.IJNS.01.03.18
  • 8. ACEEE Int. J. on Network Security, Vol. 01, No. 03, Jan 2011 [17] W. Ye, J. Heidemann, and D. Estrin, “An energy-efficient Dr.S.Venkata Chalam is graduated in MAC protocol for wireless sensor networks,” in Proceedings B.Tech (Electronics and Communication the 21st Annual Joint Conference of the IEEE Computer and Engineering) in 1987 from the University Communications Societies (INFOCOM '02), pp. 1567–1576, College JNTU College of Engineering New York, NY, USA, June 2002. Anantapur. He did his M.Tech in [18] Nuwan Gajaweera and Dileeka Dias, “FAMA/TDMA Microprocessor and application from M S Hybrid MAC for Wireless Sensor Networks”, In proceeding University, Baroda during 1992.He was of the 4th International Conference on Information and awarded Doctorate in ECE in 2004 from Automation for Sustainability, Colombo, Sri Lanka, 12-14 Jawaharlal Nehru Technological University, December 2008 Hyderabad. His research area of interest includes Wireless [19] T. van Dam, and K. Langendoen, "An adaptive energy Multimedia Networks, Embedded systems and Digital signal efficient MAC protocol for wireless sensor networks," ACM processing. He is presently guiding 10 research students of JNT SenSys 2003, pp. 171-180, November 2003. University, Hyderabad. He has 32 publications in various [20] Network Simulator , http://www.isi.edu/nsnam National, International Conferences and Journals. Presently he is working as the principal of ACE Engineering College, Hyderabad, and Andhra Pradesh, India. S.P.V Subba Rao is graduated in B.Tech (Electronics and Communication Dr.D.Sreenivasa Rao is graduated in Engineering) in 2000 from the JNT B.Tech (Electronics and Communication University, Hyderabad. He did his M.Tech Engineering) in 1986 from Nagarjuna in Communications and signal processing University. He did his M.Tech in digital from S.K University, Anantapur during systems from Osmania University during 2005.He is pursuing PHD from Jawaharlal 1994.He was awarded Doctorate in ECE in Nehru Technological University, Hyderabad .His areas of interest 2004 from University of Hyderabad .His includes WCDMA based Wireless Multimedia Networks and research interest are in the area of communications and computer Cellular Mobile Communications .He is Presently working as an networks ,Wireless Multimedia Networks. Presently 12 research Associate Professor in ECE dept, Sreenidhi Institute of Science students are working under his guidance. He has 22 publications and Technology, Hyderabad Andhra Pradesh ,India. in various National, International Conferences and Journals. Presently he is working as Professor in ECE Dept. of JNTU CE, Hyderabad,andAndhraPradesh,India. 64 © 2011 ACEEE DOI: 01.IJNS.01.03.18