SlideShare uma empresa Scribd logo
1 de 4
Baixar para ler offline
IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 02 Issue: 06 | Jun-2013, Available @ http://www.ijret.org 987
AVOIDING PACKET LOSS IN GATEWAY REALLOCATION IN MOBILE
WIMAX NETWORKS
Kusha K R
Student, Department of Computer Science and Engineering, Jawaharlal Nehru National College of Engineering,
Shimoga, VTU, Karnataka, India, kusha.karur@gmail.com
Abstract
Gateway reallocation algorithms are proposed to increase the capacity of WiMAX networks to serve more users. But most of the
proposed solutions don’t consider the momentary packet loss occurring during the reallocation process. This momentary packet loss
can also affect the application quality of service. In this work, I propose an efficient adaptive buffering strategy to avoid this packet
loss in the network. Through simulation I prove that the approach is effective against momentary packet loss during the gateway
reallocation process.
Keywords— security; sensor networks, denial of sleep attack
---------------------------------------------------------------------***-------------------------------------------------------------------------
1. INTRODUCTION
The IEEE 802.16-series standards [1], [2] are expected to
provide broadband wireless access for a variety of multimedia
services. Like other IEEE 802-series standards, IEEE 802.16
working group standardizes physical (PHY) layer and Medium
Access Control (MAC) layer only. To build a complete
system, higher layers are still necessary. One of the major
objectives of WiMAX Forum [3], thus, is to develop and
standardize the WiMAX Forum Network Architecture [4], [5],
[6], [7], which is evolving into Internet Protocol (IP)-based
wireless network. The architecture is depicted in Figure 1. In
Figure 1, the Access Service Network (ASN) provides
wireless radio access for WiMAX subscribers. It consists of
one ASN Gateway (ASN GW) and many base stations (BSs).
Each ASN is connected to Connectivity Service Network
(CSN), which provides IP connectivity services. To support IP
mobility, Mobile IP (MIP) 1 is adopted. The Home Agent
(HA) of a Mobile Station (MS) is located in the CSN of the
MS’s Home Network Service Provider (H-NSP). ASN GW
supports the Foreign Agent (FA) functionality. The WiMAX
Forum has defined a two-tiered mobility management: ASN
Anchored Mobility and CSN Anchored Mobility.
ASN Anchored Mobility refers to the procedures associated
with the MS’s movement between BSs, which may belong to
the same or different ASN GWs. In ASN Anchored Mobility,
the context of the designated MS is transferred from the
previous BS to the new BS. Without performing CSN
Anchored Mobility, ASN Anchored Mobility can minimize
handover delay and packet loss. For example, an MS may
perform intra-ASN handover (e.g., changing from Flow (1) to
Flow (2) in Figure 1) while still attaching to the same ASN
GW. In addition, an MS may perform inter-ASN handover
(e.g., changing from Flow (2) to Flow (3) in Figure 1) where
the ASN GW A is the traffic anchor point and responsible for
ASN-CSN tunneling. That is, traffic is still sent to ASN GW
A, which then further tunnels traffic to ASN GW B. In Flow
(1) and Flow (2), the MS is called Serving MS of ASN GW A.
In Flow (3), the MS is called Anchored MS of ASN GW A
and handover MS of ASN GW B. In such case, the ASN GW
A and ASN GW B are called anchored ASN GW and Serving
ASN GW, respectively.
CSN Anchored Mobility refers to the process of changing the
traffic anchor point and is independent of the MS’s link layer
handover [4]. It is also called ASN GW reallocation. For
example, if CSN Anchored Mobility is not performed, when
MS roams from ASN GW B to ASN GW C in Fig. 1, ASN
GW A will tunnel traffic to ASN GW C. The MS is still
served by two ASN GWs (ASN GW A and ASN GW C). As
before mentioned discussion, the MS is called Anchored MS
of ASN GW A. Later on, the ASN GW A may request the MS
to carry out CSN Anchored Mobility, i.e., ASN GW
reallocation. This may happen due to the heavy load of the
ASN GW A [8], to reduce end-to-end latency, or for resource
optimization purposes [4], [5]. After performing ASN GW
reallocation, the traffic anchor point is changed to ASN GW
C. The MS then is not served by ASN GW A. This is shown in
Fig. 1 after changing from Flow (4) to Flow (5).
Although the two-tiered mobility management defined in
WiMAX potentially can minimize handover delay and packet
loss, it leads to another problem: When to perform ASN GW
reallocation? The WiMAX standards, however, only define
the procedures for ASN Anchored Mobility and CSN
Anchored Mobility. The standards do not address when the
Anchored MSs should perform ASN GW reallocation to
relocate the traffic anchor point from the anchored ASN GW
IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 02 Issue: 06 | Jun-2013, Available @ http://www.ijret.org 988
to the serving ASN GW. The problem is left for vendors and
operators to develop their own proprietary solutions.
Besides, the problem is closely related to Admission Control
(AC), which is widely used in wireless networks to ensure
service quality and reduce network congestion by limiting the
number of MSs served in the network. If the ASN GW
reallocation can be performed before the system becomes
overloaded, the system may be able to accommodate more
MSs. Therefore, a well-designed AC algorithm should
cooperate with the ASN GW reallocation algorithm.
Figure 1: ASN Anchored Mobility and CSN Anchored
Mobility in WiMAX networks.
The problem with the reallocation is that, typical reallocation
on established session results in sudden packet loss during the
handover procedure. Most solutions only focus on the
reallocation process, but give little attention to the momentary
packet loss during the reallocation process. I propose adaptive
buffering solution to reduce this packet loss without affecting
the quality of service.
2. LITERATURE SURVEY
In the literature survey, I explore current solutions to reduce
packet loss in gateway reallocation process in Mobile
WIMAX networks.
Zong-Hua Li and Jyh Cheng Chen in their work on gateway
reallocation proposed a predictive mechanism to reduce the
packet loss and handover latency. Their approach is based on
predicting the connections to be reallocated and moving them
in advance, so that capacity of network is increased and also
there is less call drops because connections are available. But
their approach does not consider momentary packet loss also
they do reallocation on the connection which is loaded with
packets causing momentary packet loss.
Ai-Chun Pang and Yi-Bing Lin in their work on approach for
reallocation in UMTS network proposed to buffer packets at
RNC to avoid packet loss. But their approach does not
consider the case of multiple mobile stations downloading
same contents. In this case buffering at RNC is not a viable
solution. Also when the mobile station moves out of the area
of RNC the packets queued at RNC is waste.
As see from related works mentioned, there is no optimized
way to avoid this momentary packet loss, and I am the first to
provide solution for same.
3. OVERVIEW OF PROPOSED SOLUTION
This proposed solution consists of two stages.
1. Buffering packets at CSN
2. Buffering packet at ASN.
Buffering packets at CSN is needed for the packets arriving
from the internet side. Buffering at ASN is needed for the
packets from the mobile station.
In the proposed solution, when a connection is to be
reallocated based on the current rate of communication, buffer
size need to be allocated is calculated and reserved in advance
at the serving ASN and at the CSN. The packets arrived from
mobile station is queued in the ASN buffer, till reallocation
process is completed. The packets from internet is buffered at
the gateway and delivered to the ASN once the gateway
reallocation process is complete.
Buffering at ASN has a important advantage when compared
to buffering at the RNC because even when the mobile station
moves from one RNC area to another but in the same ASN.
4. DETAILS OF PROPOSED SECURITY
MECHANISM
A. Buffering at CSN
At the gateway, buffer chunks are available. When a
connection is to be reallocated, based on the rate of arrival of
packets from internet the buffer chunks are allocated
according to
Buffer Size = Rate of Arrival of Packet (RI) x Time to
reallocate.
ASN: Access Service Network
ASN GW: ASN Gateway
BS: Base Station
CSN: Connectivity Service Network
FA: Foreign Agent
HA: Home Agent
MS: Mobile Station
IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 02 Issue: 06 | Jun-2013, Available @ http://www.ijret.org 989
The time to reallocate is most of cases constant, but when the
number of reallocates is more this value will increase.
The packets arriving from internet are queued in the Buffer
and provided to the connection on successful reallocation. In
case of failure of reallocation the connection will be torn down
and buffer space allocated is added back to the pool. The
buffer space allocated is based on the current rate of arrival
and thus the allocation process is very adaptive. Also if the
reallocation is known a priori, the rate of packet arrival at
internet can be reduced, there by the buffer size allocated is
less.
B. Buffering at ASN
At ASN buffer space is allocated for the packets arriving from
the mobile station. Based on the rate of arrival of packets from
the mobile station, the buffer space is allocated according to
the relation
Buffer Size = Rate of Arrival of Packet (Rm) x Time to
reallocate
The packets from the mobile station is queued at the ASN and
delivered to the CSN on establishment of the connection. The
rate of arrival of packets from mobile station is reduced on the
start of reallocation process and brought back to original level
after the reallocation process is complete.
C. Prediction Algorithm Changes For Reducing
Packet Loss
Wiener prediction process proposed by Zhong Hua Li can be
used for finding the connection to be reallocated. But in their
original work the connection to be reallocated is found by
estimating the expected serving rate of each ASN and
reallocating the connection based on it. But I propose a further
extension to this method, based on the expected serving rate
the number of connection to be reallocated is found. The
connections are then sorted in ascending order of the rate of
packet transfer. The connection with low rate of packet
transfer is first reallocated before connection with high rate of
data transfer. This is done purposely to avoid packet loss; the
best time for reallocation of connection is at the time of low
data packet transfer rate. The previous solutions have not
focused on this part, so there was momentary packet loss, but
in my solution I have given more priority to connection with
low data rate transfer and reallocated them.
D. Buffer Space De-Allocation
The buffer space is de allocated in following ways.
 In case of reallocation failure the connection is freed
totally and buffer is freed back to pool.
 In case of reallocation success the packets in the
buffer are cleared at the rate of packet transfer and
once all packets are delivered, the buffer space is
freed back to pool
5. PERFORMANCE ANALYSIS
I implemented the simulation using NS2 simulator and also
simulated a WIMAX of 4 ASN and 20 to 50 mobile in each
ASN area and random movement of mobile nodes across the 4
ASN. The number of allowed connection between ASN and
CSN is set as 10 and simulation is conducted.
I measure the number of packet loss during the reallocation
time using this proposed solution and the WP based method.
The results show that proposed solution has less packet loss
compared with WP based solution. This reduced packet loss is
due to the buffering of packets.
Figure 2: Number of reallocations per second versus Packets
Lost in WP-based and proposed buffering.
CONCLUSION AND ENHANCEMENTS
In this paper, I have detailed buffering solution to avoid packet
loss. Through extensive simulation I proved that that packet
loss is reduced in this approach compared to previous
solutions of buffering at RNC. The solution is very effective
by giving more priority to low data rate connections to be
reallocated faster compared to connections with higher data
rate.
Not all kind of applications need mechanism for packet loss
tolerance. Applications like VOIP can tolerate packet loss. In
future I want to provide the buffering strategy based on the
kind of application.
IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 02 Issue: 06 | Jun-2013, Available @ http://www.ijret.org 990
REFERENCES
[1] IEEE 802.16-2004 Std., Air Interface for Fixed
Broadband Wireless Access Systems, IEEE, Oct. 2004.
[2] IEEE 802.16e-2005 Std., Part 16: Air Interface for Fixed
and Mobile Broadband Wireless Access Systems-
Amendment 2: Physical and Medium Access Control
Layers for Combined Fixed and Mobile WiMAX Forum,
http://www.wimaxforum.org, 2011.
[3] WiMAX Forum Std. 1.0, Rev. 4, WiMAX Forum
Network Architecture (Stage 2: Architecture Tenets,
Reference Model and Reference Points), WiMAX, Feb.
2009.
[4] WiMAX forum Std. 1.0, Rev. 4, WiMAX Forum
Network Architecture (Stage 3: Detailed Protocols and
Procedures), WiMAX, Feb. 2009.
[5] L. Nuaymi, WiMAX: Technology for Broadband
Wireless Access John Wiley, 2007.
[6] K. Etemad, “Overview of Mobile WiMAX Technology
and Evolution,” IEEE Comm. Mag., vol. 46, no. 10, pp.
31-40, Oct. 2008.
[7] Z.-H. Liu, S.-Y. Pan, and J.-C. Chen, “Access Service
Network (ASN) Gateway Relocation Algorithms in
WiMAX Networks,” Proc. IEEE Int’l Conf. Comm.
(ICC ’08), pp. 2674-2679, May 2008.
[8] Y. Fang and Y. Zhang, “Call Admission Control
Schemes and Performance Analysis in Wireless Mobile
Networks,” IEEE Trans. Vehicular Technology, vol. 51,
no. 2, pp. 371-382, Mar. 2002.

Mais conteúdo relacionado

Mais procurados

Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Flexible channel allocation using best Secondary user detection algorithm
Flexible channel allocation using best Secondary user detection algorithmFlexible channel allocation using best Secondary user detection algorithm
Flexible channel allocation using best Secondary user detection algorithm
ijsrd.com
 
Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...
Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...
Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...
IJERA Editor
 
Shubha_Project_Final_modified_1_1_Final_10_March_April_18
Shubha_Project_Final_modified_1_1_Final_10_March_April_18Shubha_Project_Final_modified_1_1_Final_10_March_April_18
Shubha_Project_Final_modified_1_1_Final_10_March_April_18
Shubha Koundinyan
 

Mais procurados (17)

Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Fy3111571162
Fy3111571162Fy3111571162
Fy3111571162
 
Flexible channel allocation using best Secondary user detection algorithm
Flexible channel allocation using best Secondary user detection algorithmFlexible channel allocation using best Secondary user detection algorithm
Flexible channel allocation using best Secondary user detection algorithm
 
Ns2 2015 2016 titles abstract
Ns2 2015 2016 titles abstractNs2 2015 2016 titles abstract
Ns2 2015 2016 titles abstract
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Fuzzy Optimized Metric for Adaptive Network Routing
Fuzzy Optimized Metric for Adaptive Network RoutingFuzzy Optimized Metric for Adaptive Network Routing
Fuzzy Optimized Metric for Adaptive Network Routing
 
Power allocation for statistical qo s provisioning in
Power allocation for statistical qo s provisioning inPower allocation for statistical qo s provisioning in
Power allocation for statistical qo s provisioning in
 
06425531
0642553106425531
06425531
 
Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...
Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...
Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...
 
EESRDA
EESRDAEESRDA
EESRDA
 
Performance of the Maximum Stable Connected Dominating Sets in the Presence o...
Performance of the Maximum Stable Connected Dominating Sets in the Presence o...Performance of the Maximum Stable Connected Dominating Sets in the Presence o...
Performance of the Maximum Stable Connected Dominating Sets in the Presence o...
 
C046022025
C046022025C046022025
C046022025
 
Location updation for energy efficient geographic routing in manet
Location updation for energy efficient geographic routing in manetLocation updation for energy efficient geographic routing in manet
Location updation for energy efficient geographic routing in manet
 
Defeating jamming with the power of silence a gametheoretic analysis
Defeating jamming with the power of silence a gametheoretic analysisDefeating jamming with the power of silence a gametheoretic analysis
Defeating jamming with the power of silence a gametheoretic analysis
 
Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...
Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...
Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...
 
Shubha_Project_Final_modified_1_1_Final_10_March_April_18
Shubha_Project_Final_modified_1_1_Final_10_March_April_18Shubha_Project_Final_modified_1_1_Final_10_March_April_18
Shubha_Project_Final_modified_1_1_Final_10_March_April_18
 
DYNAMIC TASK SCHEDULING BASED ON BURST TIME REQUIREMENT FOR CLOUD ENVIRONMENT
DYNAMIC TASK SCHEDULING BASED ON BURST TIME REQUIREMENT FOR CLOUD ENVIRONMENTDYNAMIC TASK SCHEDULING BASED ON BURST TIME REQUIREMENT FOR CLOUD ENVIRONMENT
DYNAMIC TASK SCHEDULING BASED ON BURST TIME REQUIREMENT FOR CLOUD ENVIRONMENT
 

Destaque

Management Training Presentation
Management Training PresentationManagement Training Presentation
Management Training Presentation
Hanelie Lategan
 

Destaque (14)

Conception and realisation of a sensor
Conception and realisation of a sensorConception and realisation of a sensor
Conception and realisation of a sensor
 
Blended e-learning, evaluation and emerging scenarios
Blended e-learning, evaluation and emerging scenariosBlended e-learning, evaluation and emerging scenarios
Blended e-learning, evaluation and emerging scenarios
 
Adopta un arbol.
Adopta un arbol.Adopta un arbol.
Adopta un arbol.
 
Interaksi sosial
Interaksi sosialInteraksi sosial
Interaksi sosial
 
Nilai dan norma sosial
Nilai dan norma sosialNilai dan norma sosial
Nilai dan norma sosial
 
Blood - hemo
Blood - hemoBlood - hemo
Blood - hemo
 
49 nd
49 nd49 nd
49 nd
 
Godhead 10: Ministry of angels
Godhead 10:   Ministry of angelsGodhead 10:   Ministry of angels
Godhead 10: Ministry of angels
 
Evaluation question 4
Evaluation question 4Evaluation question 4
Evaluation question 4
 
Marketing
MarketingMarketing
Marketing
 
Tutorial delicious (1)
Tutorial delicious (1)Tutorial delicious (1)
Tutorial delicious (1)
 
Ev-ent-anglement 3: dublin
Ev-ent-anglement 3: dublinEv-ent-anglement 3: dublin
Ev-ent-anglement 3: dublin
 
China diapositivas-de-ingles
China diapositivas-de-inglesChina diapositivas-de-ingles
China diapositivas-de-ingles
 
Management Training Presentation
Management Training PresentationManagement Training Presentation
Management Training Presentation
 

Semelhante a Avoiding packet loss in gateway reallocation in mobile wimax networks

Paper id 24201445
Paper id 24201445Paper id 24201445
Paper id 24201445
IJRAT
 
A Professional QoS Provisioning in the Intra Cluster Packet Level Resource Al...
A Professional QoS Provisioning in the Intra Cluster Packet Level Resource Al...A Professional QoS Provisioning in the Intra Cluster Packet Level Resource Al...
A Professional QoS Provisioning in the Intra Cluster Packet Level Resource Al...
GiselleginaGloria
 
Energy sink-holes avoidance method based on fuzzy system in wireless sensor ...
Energy sink-holes avoidance method based on fuzzy system in  wireless sensor ...Energy sink-holes avoidance method based on fuzzy system in  wireless sensor ...
Energy sink-holes avoidance method based on fuzzy system in wireless sensor ...
IJECEIAES
 

Semelhante a Avoiding packet loss in gateway reallocation in mobile wimax networks (20)

Bc03303410346
Bc03303410346Bc03303410346
Bc03303410346
 
M.Phil Computer Science Networking Projects
M.Phil Computer Science Networking ProjectsM.Phil Computer Science Networking Projects
M.Phil Computer Science Networking Projects
 
M phil-computer-science-networking-projects
M phil-computer-science-networking-projectsM phil-computer-science-networking-projects
M phil-computer-science-networking-projects
 
Paper id 24201445
Paper id 24201445Paper id 24201445
Paper id 24201445
 
A Review on Virtual Grid Based Dynamic Routes Adjustment in WSN
A Review on Virtual Grid Based Dynamic Routes Adjustment in WSNA Review on Virtual Grid Based Dynamic Routes Adjustment in WSN
A Review on Virtual Grid Based Dynamic Routes Adjustment in WSN
 
Network assisted mobile computing with optimal uplink query processing
Network assisted mobile computing with optimal uplink query processingNetwork assisted mobile computing with optimal uplink query processing
Network assisted mobile computing with optimal uplink query processing
 
iccet2015sp02
iccet2015sp02iccet2015sp02
iccet2015sp02
 
M.E Computer Science Mobile Computing Projects
M.E Computer Science Mobile Computing ProjectsM.E Computer Science Mobile Computing Projects
M.E Computer Science Mobile Computing Projects
 
Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...
Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...
Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...
 
A Professional QoS Provisioning in the Intra Cluster Packet Level Resource Al...
A Professional QoS Provisioning in the Intra Cluster Packet Level Resource Al...A Professional QoS Provisioning in the Intra Cluster Packet Level Resource Al...
A Professional QoS Provisioning in the Intra Cluster Packet Level Resource Al...
 
Secured Data Aggregation using SRL Protocol for Wireless Sensor Networks
Secured Data Aggregation using SRL Protocol for Wireless Sensor NetworksSecured Data Aggregation using SRL Protocol for Wireless Sensor Networks
Secured Data Aggregation using SRL Protocol for Wireless Sensor Networks
 
M phil-computer-science-mobile-computing-projects
M phil-computer-science-mobile-computing-projectsM phil-computer-science-mobile-computing-projects
M phil-computer-science-mobile-computing-projects
 
M.Phil Computer Science Mobile Computing Projects
M.Phil Computer Science Mobile Computing ProjectsM.Phil Computer Science Mobile Computing Projects
M.Phil Computer Science Mobile Computing Projects
 
Analyzing the interaction of ascent with ieee 802.11E mac in wireless sensor ...
Analyzing the interaction of ascent with ieee 802.11E mac in wireless sensor ...Analyzing the interaction of ascent with ieee 802.11E mac in wireless sensor ...
Analyzing the interaction of ascent with ieee 802.11E mac in wireless sensor ...
 
Iisrt komathi krishna (networks)
Iisrt komathi krishna (networks)Iisrt komathi krishna (networks)
Iisrt komathi krishna (networks)
 
Modified q aware scheduling algorithm for improved fairness in 802.16 j networks
Modified q aware scheduling algorithm for improved fairness in 802.16 j networksModified q aware scheduling algorithm for improved fairness in 802.16 j networks
Modified q aware scheduling algorithm for improved fairness in 802.16 j networks
 
Packet Transfer Rate & Robust Throughput for Mobile Adhoc Network
Packet Transfer Rate & Robust Throughput for Mobile Adhoc NetworkPacket Transfer Rate & Robust Throughput for Mobile Adhoc Network
Packet Transfer Rate & Robust Throughput for Mobile Adhoc Network
 
Energy sink-holes avoidance method based on fuzzy system in wireless sensor ...
Energy sink-holes avoidance method based on fuzzy system in  wireless sensor ...Energy sink-holes avoidance method based on fuzzy system in  wireless sensor ...
Energy sink-holes avoidance method based on fuzzy system in wireless sensor ...
 
V.KARTHIKEYAN PUBLISHED ARTICLE AA
V.KARTHIKEYAN PUBLISHED ARTICLE AAV.KARTHIKEYAN PUBLISHED ARTICLE AA
V.KARTHIKEYAN PUBLISHED ARTICLE AA
 
Civilizing the Network Lifespan of Manets Through Cooperative Mac Protocol Me...
Civilizing the Network Lifespan of Manets Through Cooperative Mac Protocol Me...Civilizing the Network Lifespan of Manets Through Cooperative Mac Protocol Me...
Civilizing the Network Lifespan of Manets Through Cooperative Mac Protocol Me...
 

Mais de eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
eSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
eSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
eSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
eSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
eSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
eSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
eSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
eSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
eSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
eSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
eSAT Publishing House
 

Mais de eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 

Último

Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
amitlee9823
 

Último (20)

Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 

Avoiding packet loss in gateway reallocation in mobile wimax networks

  • 1. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163 __________________________________________________________________________________________ Volume: 02 Issue: 06 | Jun-2013, Available @ http://www.ijret.org 987 AVOIDING PACKET LOSS IN GATEWAY REALLOCATION IN MOBILE WIMAX NETWORKS Kusha K R Student, Department of Computer Science and Engineering, Jawaharlal Nehru National College of Engineering, Shimoga, VTU, Karnataka, India, kusha.karur@gmail.com Abstract Gateway reallocation algorithms are proposed to increase the capacity of WiMAX networks to serve more users. But most of the proposed solutions don’t consider the momentary packet loss occurring during the reallocation process. This momentary packet loss can also affect the application quality of service. In this work, I propose an efficient adaptive buffering strategy to avoid this packet loss in the network. Through simulation I prove that the approach is effective against momentary packet loss during the gateway reallocation process. Keywords— security; sensor networks, denial of sleep attack ---------------------------------------------------------------------***------------------------------------------------------------------------- 1. INTRODUCTION The IEEE 802.16-series standards [1], [2] are expected to provide broadband wireless access for a variety of multimedia services. Like other IEEE 802-series standards, IEEE 802.16 working group standardizes physical (PHY) layer and Medium Access Control (MAC) layer only. To build a complete system, higher layers are still necessary. One of the major objectives of WiMAX Forum [3], thus, is to develop and standardize the WiMAX Forum Network Architecture [4], [5], [6], [7], which is evolving into Internet Protocol (IP)-based wireless network. The architecture is depicted in Figure 1. In Figure 1, the Access Service Network (ASN) provides wireless radio access for WiMAX subscribers. It consists of one ASN Gateway (ASN GW) and many base stations (BSs). Each ASN is connected to Connectivity Service Network (CSN), which provides IP connectivity services. To support IP mobility, Mobile IP (MIP) 1 is adopted. The Home Agent (HA) of a Mobile Station (MS) is located in the CSN of the MS’s Home Network Service Provider (H-NSP). ASN GW supports the Foreign Agent (FA) functionality. The WiMAX Forum has defined a two-tiered mobility management: ASN Anchored Mobility and CSN Anchored Mobility. ASN Anchored Mobility refers to the procedures associated with the MS’s movement between BSs, which may belong to the same or different ASN GWs. In ASN Anchored Mobility, the context of the designated MS is transferred from the previous BS to the new BS. Without performing CSN Anchored Mobility, ASN Anchored Mobility can minimize handover delay and packet loss. For example, an MS may perform intra-ASN handover (e.g., changing from Flow (1) to Flow (2) in Figure 1) while still attaching to the same ASN GW. In addition, an MS may perform inter-ASN handover (e.g., changing from Flow (2) to Flow (3) in Figure 1) where the ASN GW A is the traffic anchor point and responsible for ASN-CSN tunneling. That is, traffic is still sent to ASN GW A, which then further tunnels traffic to ASN GW B. In Flow (1) and Flow (2), the MS is called Serving MS of ASN GW A. In Flow (3), the MS is called Anchored MS of ASN GW A and handover MS of ASN GW B. In such case, the ASN GW A and ASN GW B are called anchored ASN GW and Serving ASN GW, respectively. CSN Anchored Mobility refers to the process of changing the traffic anchor point and is independent of the MS’s link layer handover [4]. It is also called ASN GW reallocation. For example, if CSN Anchored Mobility is not performed, when MS roams from ASN GW B to ASN GW C in Fig. 1, ASN GW A will tunnel traffic to ASN GW C. The MS is still served by two ASN GWs (ASN GW A and ASN GW C). As before mentioned discussion, the MS is called Anchored MS of ASN GW A. Later on, the ASN GW A may request the MS to carry out CSN Anchored Mobility, i.e., ASN GW reallocation. This may happen due to the heavy load of the ASN GW A [8], to reduce end-to-end latency, or for resource optimization purposes [4], [5]. After performing ASN GW reallocation, the traffic anchor point is changed to ASN GW C. The MS then is not served by ASN GW A. This is shown in Fig. 1 after changing from Flow (4) to Flow (5). Although the two-tiered mobility management defined in WiMAX potentially can minimize handover delay and packet loss, it leads to another problem: When to perform ASN GW reallocation? The WiMAX standards, however, only define the procedures for ASN Anchored Mobility and CSN Anchored Mobility. The standards do not address when the Anchored MSs should perform ASN GW reallocation to relocate the traffic anchor point from the anchored ASN GW
  • 2. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163 __________________________________________________________________________________________ Volume: 02 Issue: 06 | Jun-2013, Available @ http://www.ijret.org 988 to the serving ASN GW. The problem is left for vendors and operators to develop their own proprietary solutions. Besides, the problem is closely related to Admission Control (AC), which is widely used in wireless networks to ensure service quality and reduce network congestion by limiting the number of MSs served in the network. If the ASN GW reallocation can be performed before the system becomes overloaded, the system may be able to accommodate more MSs. Therefore, a well-designed AC algorithm should cooperate with the ASN GW reallocation algorithm. Figure 1: ASN Anchored Mobility and CSN Anchored Mobility in WiMAX networks. The problem with the reallocation is that, typical reallocation on established session results in sudden packet loss during the handover procedure. Most solutions only focus on the reallocation process, but give little attention to the momentary packet loss during the reallocation process. I propose adaptive buffering solution to reduce this packet loss without affecting the quality of service. 2. LITERATURE SURVEY In the literature survey, I explore current solutions to reduce packet loss in gateway reallocation process in Mobile WIMAX networks. Zong-Hua Li and Jyh Cheng Chen in their work on gateway reallocation proposed a predictive mechanism to reduce the packet loss and handover latency. Their approach is based on predicting the connections to be reallocated and moving them in advance, so that capacity of network is increased and also there is less call drops because connections are available. But their approach does not consider momentary packet loss also they do reallocation on the connection which is loaded with packets causing momentary packet loss. Ai-Chun Pang and Yi-Bing Lin in their work on approach for reallocation in UMTS network proposed to buffer packets at RNC to avoid packet loss. But their approach does not consider the case of multiple mobile stations downloading same contents. In this case buffering at RNC is not a viable solution. Also when the mobile station moves out of the area of RNC the packets queued at RNC is waste. As see from related works mentioned, there is no optimized way to avoid this momentary packet loss, and I am the first to provide solution for same. 3. OVERVIEW OF PROPOSED SOLUTION This proposed solution consists of two stages. 1. Buffering packets at CSN 2. Buffering packet at ASN. Buffering packets at CSN is needed for the packets arriving from the internet side. Buffering at ASN is needed for the packets from the mobile station. In the proposed solution, when a connection is to be reallocated based on the current rate of communication, buffer size need to be allocated is calculated and reserved in advance at the serving ASN and at the CSN. The packets arrived from mobile station is queued in the ASN buffer, till reallocation process is completed. The packets from internet is buffered at the gateway and delivered to the ASN once the gateway reallocation process is complete. Buffering at ASN has a important advantage when compared to buffering at the RNC because even when the mobile station moves from one RNC area to another but in the same ASN. 4. DETAILS OF PROPOSED SECURITY MECHANISM A. Buffering at CSN At the gateway, buffer chunks are available. When a connection is to be reallocated, based on the rate of arrival of packets from internet the buffer chunks are allocated according to Buffer Size = Rate of Arrival of Packet (RI) x Time to reallocate. ASN: Access Service Network ASN GW: ASN Gateway BS: Base Station CSN: Connectivity Service Network FA: Foreign Agent HA: Home Agent MS: Mobile Station
  • 3. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163 __________________________________________________________________________________________ Volume: 02 Issue: 06 | Jun-2013, Available @ http://www.ijret.org 989 The time to reallocate is most of cases constant, but when the number of reallocates is more this value will increase. The packets arriving from internet are queued in the Buffer and provided to the connection on successful reallocation. In case of failure of reallocation the connection will be torn down and buffer space allocated is added back to the pool. The buffer space allocated is based on the current rate of arrival and thus the allocation process is very adaptive. Also if the reallocation is known a priori, the rate of packet arrival at internet can be reduced, there by the buffer size allocated is less. B. Buffering at ASN At ASN buffer space is allocated for the packets arriving from the mobile station. Based on the rate of arrival of packets from the mobile station, the buffer space is allocated according to the relation Buffer Size = Rate of Arrival of Packet (Rm) x Time to reallocate The packets from the mobile station is queued at the ASN and delivered to the CSN on establishment of the connection. The rate of arrival of packets from mobile station is reduced on the start of reallocation process and brought back to original level after the reallocation process is complete. C. Prediction Algorithm Changes For Reducing Packet Loss Wiener prediction process proposed by Zhong Hua Li can be used for finding the connection to be reallocated. But in their original work the connection to be reallocated is found by estimating the expected serving rate of each ASN and reallocating the connection based on it. But I propose a further extension to this method, based on the expected serving rate the number of connection to be reallocated is found. The connections are then sorted in ascending order of the rate of packet transfer. The connection with low rate of packet transfer is first reallocated before connection with high rate of data transfer. This is done purposely to avoid packet loss; the best time for reallocation of connection is at the time of low data packet transfer rate. The previous solutions have not focused on this part, so there was momentary packet loss, but in my solution I have given more priority to connection with low data rate transfer and reallocated them. D. Buffer Space De-Allocation The buffer space is de allocated in following ways.  In case of reallocation failure the connection is freed totally and buffer is freed back to pool.  In case of reallocation success the packets in the buffer are cleared at the rate of packet transfer and once all packets are delivered, the buffer space is freed back to pool 5. PERFORMANCE ANALYSIS I implemented the simulation using NS2 simulator and also simulated a WIMAX of 4 ASN and 20 to 50 mobile in each ASN area and random movement of mobile nodes across the 4 ASN. The number of allowed connection between ASN and CSN is set as 10 and simulation is conducted. I measure the number of packet loss during the reallocation time using this proposed solution and the WP based method. The results show that proposed solution has less packet loss compared with WP based solution. This reduced packet loss is due to the buffering of packets. Figure 2: Number of reallocations per second versus Packets Lost in WP-based and proposed buffering. CONCLUSION AND ENHANCEMENTS In this paper, I have detailed buffering solution to avoid packet loss. Through extensive simulation I proved that that packet loss is reduced in this approach compared to previous solutions of buffering at RNC. The solution is very effective by giving more priority to low data rate connections to be reallocated faster compared to connections with higher data rate. Not all kind of applications need mechanism for packet loss tolerance. Applications like VOIP can tolerate packet loss. In future I want to provide the buffering strategy based on the kind of application.
  • 4. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163 __________________________________________________________________________________________ Volume: 02 Issue: 06 | Jun-2013, Available @ http://www.ijret.org 990 REFERENCES [1] IEEE 802.16-2004 Std., Air Interface for Fixed Broadband Wireless Access Systems, IEEE, Oct. 2004. [2] IEEE 802.16e-2005 Std., Part 16: Air Interface for Fixed and Mobile Broadband Wireless Access Systems- Amendment 2: Physical and Medium Access Control Layers for Combined Fixed and Mobile WiMAX Forum, http://www.wimaxforum.org, 2011. [3] WiMAX Forum Std. 1.0, Rev. 4, WiMAX Forum Network Architecture (Stage 2: Architecture Tenets, Reference Model and Reference Points), WiMAX, Feb. 2009. [4] WiMAX forum Std. 1.0, Rev. 4, WiMAX Forum Network Architecture (Stage 3: Detailed Protocols and Procedures), WiMAX, Feb. 2009. [5] L. Nuaymi, WiMAX: Technology for Broadband Wireless Access John Wiley, 2007. [6] K. Etemad, “Overview of Mobile WiMAX Technology and Evolution,” IEEE Comm. Mag., vol. 46, no. 10, pp. 31-40, Oct. 2008. [7] Z.-H. Liu, S.-Y. Pan, and J.-C. Chen, “Access Service Network (ASN) Gateway Relocation Algorithms in WiMAX Networks,” Proc. IEEE Int’l Conf. Comm. (ICC ’08), pp. 2674-2679, May 2008. [8] Y. Fang and Y. Zhang, “Call Admission Control Schemes and Performance Analysis in Wireless Mobile Networks,” IEEE Trans. Vehicular Technology, vol. 51, no. 2, pp. 371-382, Mar. 2002.