SlideShare a Scribd company logo
1 of 5
Bandwidth Recycling in IEEE 802.16 Networks. 
Abstract: 
IEEE 802.16 standard was designed to support the bandwidth demanding applications with quali 
ty of service (QoS). Bandwidth is reserved for each application to ensure the QoS. For variable 
bit rate (VBR) applications, however, it is difficult for the subscriber station (SS) to predict the a 
mount of incoming data. To ensure the QoS guaranteed services, the SS may reserve more band 
width than its demand. As a result, the reserved bandwidth may not be fully utilized all the time. 
In this paper, we propose a scheme, named Bandwidth Recycling, to recycle the unused bandwi 
dth without changing the existing bandwidth reservation. The idea of the proposed scheme is to 
allow other SSs to utilize the unused bandwidth when it is available. Thus, the system throughp 
ut can be improved while maintaining the same QoS guaranteed services. Mathematical analysis 
and simulation are used to evaluate the proposed scheme. Simulation and analysis results confir 
m that the proposed scheme can recycle 35% of unused bandwidth on average. By analyzing fa 
ctors affecting the recycling performance, three scheduling algorithms are proposed to improve t 
he overall throughput. The simulation results show that our proposed algorithm improves the ov 
erall throughput by 40% in a steady network. 
Algorithm: 
GLOBALSOFT TECHNOLOGIES 
IEEE PROJECTS & SOFTWARE DEVELOPMENTS 
IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE 
BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS 
CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 
Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com
Dynamic bandwidth request-allocation algorithm and Priority 
based Scheduling Algorithm A dynamic bandwidth request-allocation algorithm for real 
time services is proposed in . The authors predict the amount of bandwidth to be requested based on t 
he information of the backlogged amount of traffic in the queue and the rate mismatch between packet 
arrival and service rate to improve the bandwidth utilization. The research works listed above improve 
the performance by predicting the traffic coming in the future. Instead of prediction, our scheme can al 
low SSs to accurately identify the portion of unused bandwidth and provides a method to recycle the un 
used bandwidth. It can improve the utilization of bandwidth while keeping the same QoS guaranteed s 
ervices and introducing no extra delay 
Existing System: 
Bandwidth transmitted data may be more than the amount of transmitted data and may not be fully ut 
ilized all the time. Before it is different from the bandwidth adjustment in which the adjusted bandwid 
th is enforced as early as in the next coming frame. Moreover, the unused bandwidth is likely to be rele 
ased temporarily (i.e., only in the current frame) and the existing bandwidth reservation does not chan 
ge. The ad hoc networking community assumes that the underlying wireless technology is the IEEE 802. 
11 standard due to the broad availability of interface cards and simulation models. 
Proposed System: 
The IEEE 802.16 network is connection 
oriented. It gives the advantage of having better control over network resource to provide QoS guarant 
eed services To improve the bandwidth utilization while maintaining the same QoS guaranteed services, 
our research objective is two fold: the existing bandwidth reservation is not changed to maintain the sa 
me QoS guaranteed services. our research work focuses on increasing the bandwidth 
utilization by utilizing the unused bandwidth. 
We propose a scheme, named Bandwidth Recycling, which recycles the unused bandwidth while keepin 
g the same QoS guaranteed services without introducing extra delay. The general concept behind our s 
cheme is to allow other SSs to utilize the unused bandwidth left by the current transmitting SS. Since th 
e unused bandwidth is not supposed to occur regularly, our scheme allows SSs with non-real 
time applications, which have more flexibility of delay requirements, to recycle the unused bandwi 
dth.
In this system they are using 802.11 MAC layer to evaluate the correct bandwidth. This method combin 
es channel monitoring to estimate each node’s medium occupancy. Probabilistic combination of the val 
ues is to account for synchronization between nodes, estimation of the collision probability between ea 
ch couple of nodes, and variable overhead’s impact estimation. This mechanism only requires one-hop 
information communication and may be applied without generating a too high additional overhea 
d. These results show that singlehop flows and multihop flows are admitted more accurately, resulting i 
n a better stability and overall performance. 
Modules: 
1. Bandwidth utilization Module: 
Bandwidth utilization improvements have been proposed in the literature. In, a dynamic resource reser 
vation mechanism is proposed. It can dynamically change the amount of reserved resource depending o 
n the actual number of active connections. The investigation of dynamic bandwidth reservation for hyb 
rid networks is presented in. Evaluated the performance and effectiveness for the hybrid network, and 
proposed efficient methods to ensure optimum reservation and utilization of bandwidth while minimizi 
ng signal blocking probability and signaling cost. In, the enhanced the system throughput by using conc 
urrent transmission in mesh mode 
2. Bandwidth recycling Module: 
The complementary station (CS). Waits for the possible opportunities to recycle the unused bandwidth 
of its corresponding TS in this frame. The CS information scheduled by the BS is resided in a list, called c 
omplementary list (CL). The CL includes the mapping relation between each pair of pre-assigned 
C and TS.
3. QoS guaranteed services Module 
It is different from the bandwidth adjustment in which the adjusted bandwidth is enforced as early as in 
the next coming frame. Moreover, the unused bandwidth is likely to be released temporarily (i.e., only i 
n the current frame) and the existing bandwidth reservation does not change. Therefore, our scheme i 
mproves the overall throughput while providing the same QoS guaranteed services. 
4. Traffic and Packet Performance: 
The Packet mean data rate of each application but make the mean packet size randomly selected from 
512 to 1024 bytes. Thus, the mean packet arrive rate can be determined based on the corresponding m 
ean packet size. As mentioned earlier, the size of each packet is modeled as Poisson distribution 
And the packet arrival rate is modeled as exponential distribution. The other factor that may affect the 
performance of bandwidth recycling is the probability of the RM to be received by the CS successfully. 
Conclusion: 
We proposed bandwidth recycling to recycle the unused bandwidth once it occurs. It allows the BS to sc 
hedule a complementary station for each transmission stations. Each complementary station monitors t 
he entire UL transmission interval of its corresponding TS and standby for any opportunities to recycle t 
he unused bandwidth. Besides the naive prioritybased scheduling algorithm, three additional algorithms 
have been proposed to improve the recycling effectiveness. Our mathematical and simulation results c 
onfirm that our scheme can not only improve the throughput but also reduce the delay with negligible 
overhead and satisfy the QoS requirements. 
System Specification 
Hardware Requirements: 
• System : Pentium IV 2.4 GHz. 
• Hard Disk : 40 GB. 
• Floppy Drive : 1.44 Mb.
• Monitor : 14’ Colour Monitor. 
• Mouse : Optical Mouse. 
• Ram : 512 Mb. 
Software Requirements: 
• Operating system : Windows 7. 
• Coding Language : ASP.Net with C#

More Related Content

More from IEEEFINALYEARSTUDENTSPROJECTS

2014 2015 ieee dotnet projects globalsoft technologies
2014 2015 ieee dotnet projects globalsoft technologies2014 2015 ieee dotnet projects globalsoft technologies
2014 2015 ieee dotnet projects globalsoft technologiesIEEEFINALYEARSTUDENTSPROJECTS
 
2014 2015 ieee java projects globalsoft technologies
2014 2015 ieee java projects globalsoft technologies2014 2015 ieee java projects globalsoft technologies
2014 2015 ieee java projects globalsoft technologiesIEEEFINALYEARSTUDENTSPROJECTS
 
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Smartdc mobility prediction based a...
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Smartdc mobility prediction based a...2014 IEEE DOTNET MOBILE COMPUTING PROJECT Smartdc mobility prediction based a...
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Smartdc mobility prediction based a...IEEEFINALYEARSTUDENTSPROJECTS
 
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...IEEEFINALYEARSTUDENTSPROJECTS
 
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Autonomous mobile-mesh-networks
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Autonomous mobile-mesh-networks2014 IEEE DOTNET MOBILE COMPUTING PROJECT Autonomous mobile-mesh-networks
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Autonomous mobile-mesh-networksIEEEFINALYEARSTUDENTSPROJECTS
 
2014 IEEE DOTNET MOBILE COMPUTING PROJECT A qos-oriented-distributed-routing-...
2014 IEEE DOTNET MOBILE COMPUTING PROJECT A qos-oriented-distributed-routing-...2014 IEEE DOTNET MOBILE COMPUTING PROJECT A qos-oriented-distributed-routing-...
2014 IEEE DOTNET MOBILE COMPUTING PROJECT A qos-oriented-distributed-routing-...IEEEFINALYEARSTUDENTSPROJECTS
 
2014 IEEE JAVA MOBILE COMPUTING PROJECT TokenMac a fair mac protocol for pass...
2014 IEEE JAVA MOBILE COMPUTING PROJECT TokenMac a fair mac protocol for pass...2014 IEEE JAVA MOBILE COMPUTING PROJECT TokenMac a fair mac protocol for pass...
2014 IEEE JAVA MOBILE COMPUTING PROJECT TokenMac a fair mac protocol for pass...IEEEFINALYEARSTUDENTSPROJECTS
 
2014 IEEE JAVA MOBILE COMPUTING PROJECT Preserving location privacy in geo so...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Preserving location privacy in geo so...2014 IEEE JAVA MOBILE COMPUTING PROJECT Preserving location privacy in geo so...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Preserving location privacy in geo so...IEEEFINALYEARSTUDENTSPROJECTS
 
2014 IEEE JAVA MOBILE COMPUTING PROJECT Energy optimum throughput and carrier...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Energy optimum throughput and carrier...2014 IEEE JAVA MOBILE COMPUTING PROJECT Energy optimum throughput and carrier...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Energy optimum throughput and carrier...IEEEFINALYEARSTUDENTSPROJECTS
 
2014 IEEE JAVA MOBILE COMPUTING PROJECT Efficient and privacy aware data aggr...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Efficient and privacy aware data aggr...2014 IEEE JAVA MOBILE COMPUTING PROJECT Efficient and privacy aware data aggr...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Efficient and privacy aware data aggr...IEEEFINALYEARSTUDENTSPROJECTS
 
2014 IEEE JAVA MOBILE COMPUTING PROJECT Cloud assisted mobile-access of healt...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Cloud assisted mobile-access of healt...2014 IEEE JAVA MOBILE COMPUTING PROJECT Cloud assisted mobile-access of healt...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Cloud assisted mobile-access of healt...IEEEFINALYEARSTUDENTSPROJECTS
 
2014 IEEE JAVA MOBILE COMPUTING PROJECT A low complexity algorithm for neighb...
2014 IEEE JAVA MOBILE COMPUTING PROJECT A low complexity algorithm for neighb...2014 IEEE JAVA MOBILE COMPUTING PROJECT A low complexity algorithm for neighb...
2014 IEEE JAVA MOBILE COMPUTING PROJECT A low complexity algorithm for neighb...IEEEFINALYEARSTUDENTSPROJECTS
 

More from IEEEFINALYEARSTUDENTSPROJECTS (12)

2014 2015 ieee dotnet projects globalsoft technologies
2014 2015 ieee dotnet projects globalsoft technologies2014 2015 ieee dotnet projects globalsoft technologies
2014 2015 ieee dotnet projects globalsoft technologies
 
2014 2015 ieee java projects globalsoft technologies
2014 2015 ieee java projects globalsoft technologies2014 2015 ieee java projects globalsoft technologies
2014 2015 ieee java projects globalsoft technologies
 
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Smartdc mobility prediction based a...
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Smartdc mobility prediction based a...2014 IEEE DOTNET MOBILE COMPUTING PROJECT Smartdc mobility prediction based a...
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Smartdc mobility prediction based a...
 
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...
 
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Autonomous mobile-mesh-networks
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Autonomous mobile-mesh-networks2014 IEEE DOTNET MOBILE COMPUTING PROJECT Autonomous mobile-mesh-networks
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Autonomous mobile-mesh-networks
 
2014 IEEE DOTNET MOBILE COMPUTING PROJECT A qos-oriented-distributed-routing-...
2014 IEEE DOTNET MOBILE COMPUTING PROJECT A qos-oriented-distributed-routing-...2014 IEEE DOTNET MOBILE COMPUTING PROJECT A qos-oriented-distributed-routing-...
2014 IEEE DOTNET MOBILE COMPUTING PROJECT A qos-oriented-distributed-routing-...
 
2014 IEEE JAVA MOBILE COMPUTING PROJECT TokenMac a fair mac protocol for pass...
2014 IEEE JAVA MOBILE COMPUTING PROJECT TokenMac a fair mac protocol for pass...2014 IEEE JAVA MOBILE COMPUTING PROJECT TokenMac a fair mac protocol for pass...
2014 IEEE JAVA MOBILE COMPUTING PROJECT TokenMac a fair mac protocol for pass...
 
2014 IEEE JAVA MOBILE COMPUTING PROJECT Preserving location privacy in geo so...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Preserving location privacy in geo so...2014 IEEE JAVA MOBILE COMPUTING PROJECT Preserving location privacy in geo so...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Preserving location privacy in geo so...
 
2014 IEEE JAVA MOBILE COMPUTING PROJECT Energy optimum throughput and carrier...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Energy optimum throughput and carrier...2014 IEEE JAVA MOBILE COMPUTING PROJECT Energy optimum throughput and carrier...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Energy optimum throughput and carrier...
 
2014 IEEE JAVA MOBILE COMPUTING PROJECT Efficient and privacy aware data aggr...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Efficient and privacy aware data aggr...2014 IEEE JAVA MOBILE COMPUTING PROJECT Efficient and privacy aware data aggr...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Efficient and privacy aware data aggr...
 
2014 IEEE JAVA MOBILE COMPUTING PROJECT Cloud assisted mobile-access of healt...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Cloud assisted mobile-access of healt...2014 IEEE JAVA MOBILE COMPUTING PROJECT Cloud assisted mobile-access of healt...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Cloud assisted mobile-access of healt...
 
2014 IEEE JAVA MOBILE COMPUTING PROJECT A low complexity algorithm for neighb...
2014 IEEE JAVA MOBILE COMPUTING PROJECT A low complexity algorithm for neighb...2014 IEEE JAVA MOBILE COMPUTING PROJECT A low complexity algorithm for neighb...
2014 IEEE JAVA MOBILE COMPUTING PROJECT A low complexity algorithm for neighb...
 

Recently uploaded

CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Comparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization TechniquesComparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization Techniquesugginaramesh
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
An introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptxAn introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptxPurva Nikam
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...121011101441
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleAlluxio, Inc.
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 

Recently uploaded (20)

CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Comparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization TechniquesComparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization Techniques
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
An introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptxAn introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptx
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at Scale
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 

2014 IEEE DOTNET MOBILE COMPUTING PROJECT Bandwidth recycling in ieee 802.16 networks

  • 1. Bandwidth Recycling in IEEE 802.16 Networks. Abstract: IEEE 802.16 standard was designed to support the bandwidth demanding applications with quali ty of service (QoS). Bandwidth is reserved for each application to ensure the QoS. For variable bit rate (VBR) applications, however, it is difficult for the subscriber station (SS) to predict the a mount of incoming data. To ensure the QoS guaranteed services, the SS may reserve more band width than its demand. As a result, the reserved bandwidth may not be fully utilized all the time. In this paper, we propose a scheme, named Bandwidth Recycling, to recycle the unused bandwi dth without changing the existing bandwidth reservation. The idea of the proposed scheme is to allow other SSs to utilize the unused bandwidth when it is available. Thus, the system throughp ut can be improved while maintaining the same QoS guaranteed services. Mathematical analysis and simulation are used to evaluate the proposed scheme. Simulation and analysis results confir m that the proposed scheme can recycle 35% of unused bandwidth on average. By analyzing fa ctors affecting the recycling performance, three scheduling algorithms are proposed to improve t he overall throughput. The simulation results show that our proposed algorithm improves the ov erall throughput by 40% in a steady network. Algorithm: GLOBALSOFT TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com
  • 2. Dynamic bandwidth request-allocation algorithm and Priority based Scheduling Algorithm A dynamic bandwidth request-allocation algorithm for real time services is proposed in . The authors predict the amount of bandwidth to be requested based on t he information of the backlogged amount of traffic in the queue and the rate mismatch between packet arrival and service rate to improve the bandwidth utilization. The research works listed above improve the performance by predicting the traffic coming in the future. Instead of prediction, our scheme can al low SSs to accurately identify the portion of unused bandwidth and provides a method to recycle the un used bandwidth. It can improve the utilization of bandwidth while keeping the same QoS guaranteed s ervices and introducing no extra delay Existing System: Bandwidth transmitted data may be more than the amount of transmitted data and may not be fully ut ilized all the time. Before it is different from the bandwidth adjustment in which the adjusted bandwid th is enforced as early as in the next coming frame. Moreover, the unused bandwidth is likely to be rele ased temporarily (i.e., only in the current frame) and the existing bandwidth reservation does not chan ge. The ad hoc networking community assumes that the underlying wireless technology is the IEEE 802. 11 standard due to the broad availability of interface cards and simulation models. Proposed System: The IEEE 802.16 network is connection oriented. It gives the advantage of having better control over network resource to provide QoS guarant eed services To improve the bandwidth utilization while maintaining the same QoS guaranteed services, our research objective is two fold: the existing bandwidth reservation is not changed to maintain the sa me QoS guaranteed services. our research work focuses on increasing the bandwidth utilization by utilizing the unused bandwidth. We propose a scheme, named Bandwidth Recycling, which recycles the unused bandwidth while keepin g the same QoS guaranteed services without introducing extra delay. The general concept behind our s cheme is to allow other SSs to utilize the unused bandwidth left by the current transmitting SS. Since th e unused bandwidth is not supposed to occur regularly, our scheme allows SSs with non-real time applications, which have more flexibility of delay requirements, to recycle the unused bandwi dth.
  • 3. In this system they are using 802.11 MAC layer to evaluate the correct bandwidth. This method combin es channel monitoring to estimate each node’s medium occupancy. Probabilistic combination of the val ues is to account for synchronization between nodes, estimation of the collision probability between ea ch couple of nodes, and variable overhead’s impact estimation. This mechanism only requires one-hop information communication and may be applied without generating a too high additional overhea d. These results show that singlehop flows and multihop flows are admitted more accurately, resulting i n a better stability and overall performance. Modules: 1. Bandwidth utilization Module: Bandwidth utilization improvements have been proposed in the literature. In, a dynamic resource reser vation mechanism is proposed. It can dynamically change the amount of reserved resource depending o n the actual number of active connections. The investigation of dynamic bandwidth reservation for hyb rid networks is presented in. Evaluated the performance and effectiveness for the hybrid network, and proposed efficient methods to ensure optimum reservation and utilization of bandwidth while minimizi ng signal blocking probability and signaling cost. In, the enhanced the system throughput by using conc urrent transmission in mesh mode 2. Bandwidth recycling Module: The complementary station (CS). Waits for the possible opportunities to recycle the unused bandwidth of its corresponding TS in this frame. The CS information scheduled by the BS is resided in a list, called c omplementary list (CL). The CL includes the mapping relation between each pair of pre-assigned C and TS.
  • 4. 3. QoS guaranteed services Module It is different from the bandwidth adjustment in which the adjusted bandwidth is enforced as early as in the next coming frame. Moreover, the unused bandwidth is likely to be released temporarily (i.e., only i n the current frame) and the existing bandwidth reservation does not change. Therefore, our scheme i mproves the overall throughput while providing the same QoS guaranteed services. 4. Traffic and Packet Performance: The Packet mean data rate of each application but make the mean packet size randomly selected from 512 to 1024 bytes. Thus, the mean packet arrive rate can be determined based on the corresponding m ean packet size. As mentioned earlier, the size of each packet is modeled as Poisson distribution And the packet arrival rate is modeled as exponential distribution. The other factor that may affect the performance of bandwidth recycling is the probability of the RM to be received by the CS successfully. Conclusion: We proposed bandwidth recycling to recycle the unused bandwidth once it occurs. It allows the BS to sc hedule a complementary station for each transmission stations. Each complementary station monitors t he entire UL transmission interval of its corresponding TS and standby for any opportunities to recycle t he unused bandwidth. Besides the naive prioritybased scheduling algorithm, three additional algorithms have been proposed to improve the recycling effectiveness. Our mathematical and simulation results c onfirm that our scheme can not only improve the throughput but also reduce the delay with negligible overhead and satisfy the QoS requirements. System Specification Hardware Requirements: • System : Pentium IV 2.4 GHz. • Hard Disk : 40 GB. • Floppy Drive : 1.44 Mb.
  • 5. • Monitor : 14’ Colour Monitor. • Mouse : Optical Mouse. • Ram : 512 Mb. Software Requirements: • Operating system : Windows 7. • Coding Language : ASP.Net with C#