SlideShare a Scribd company logo
1 of 4
Download to read offline
IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 02 Issue: 06 | Jun-2013, Available @ http://www.ijret.org 987
AVOIDING PACKET LOSS IN GATEWAY REALLOCATION IN MOBILE
WIMAX NETWORKS
Kusha K R
Student, Department of Computer Science and Engineering, Jawaharlal Nehru National College of Engineering,
Shimoga, VTU, Karnataka, India, kusha.karur@gmail.com
Abstract
Gateway reallocation algorithms are proposed to increase the capacity of WiMAX networks to serve more users. But most of the
proposed solutions don’t consider the momentary packet loss occurring during the reallocation process. This momentary packet loss
can also affect the application quality of service. In this work, I propose an efficient adaptive buffering strategy to avoid this packet
loss in the network. Through simulation I prove that the approach is effective against momentary packet loss during the gateway
reallocation process.
Keywords— security; sensor networks, denial of sleep attack
---------------------------------------------------------------------***-------------------------------------------------------------------------
1. INTRODUCTION
The IEEE 802.16-series standards [1], [2] are expected to
provide broadband wireless access for a variety of multimedia
services. Like other IEEE 802-series standards, IEEE 802.16
working group standardizes physical (PHY) layer and Medium
Access Control (MAC) layer only. To build a complete
system, higher layers are still necessary. One of the major
objectives of WiMAX Forum [3], thus, is to develop and
standardize the WiMAX Forum Network Architecture [4], [5],
[6], [7], which is evolving into Internet Protocol (IP)-based
wireless network. The architecture is depicted in Figure 1. In
Figure 1, the Access Service Network (ASN) provides
wireless radio access for WiMAX subscribers. It consists of
one ASN Gateway (ASN GW) and many base stations (BSs).
Each ASN is connected to Connectivity Service Network
(CSN), which provides IP connectivity services. To support IP
mobility, Mobile IP (MIP) 1 is adopted. The Home Agent
(HA) of a Mobile Station (MS) is located in the CSN of the
MS’s Home Network Service Provider (H-NSP). ASN GW
supports the Foreign Agent (FA) functionality. The WiMAX
Forum has defined a two-tiered mobility management: ASN
Anchored Mobility and CSN Anchored Mobility.
ASN Anchored Mobility refers to the procedures associated
with the MS’s movement between BSs, which may belong to
the same or different ASN GWs. In ASN Anchored Mobility,
the context of the designated MS is transferred from the
previous BS to the new BS. Without performing CSN
Anchored Mobility, ASN Anchored Mobility can minimize
handover delay and packet loss. For example, an MS may
perform intra-ASN handover (e.g., changing from Flow (1) to
Flow (2) in Figure 1) while still attaching to the same ASN
GW. In addition, an MS may perform inter-ASN handover
(e.g., changing from Flow (2) to Flow (3) in Figure 1) where
the ASN GW A is the traffic anchor point and responsible for
ASN-CSN tunneling. That is, traffic is still sent to ASN GW
A, which then further tunnels traffic to ASN GW B. In Flow
(1) and Flow (2), the MS is called Serving MS of ASN GW A.
In Flow (3), the MS is called Anchored MS of ASN GW A
and handover MS of ASN GW B. In such case, the ASN GW
A and ASN GW B are called anchored ASN GW and Serving
ASN GW, respectively.
CSN Anchored Mobility refers to the process of changing the
traffic anchor point and is independent of the MS’s link layer
handover [4]. It is also called ASN GW reallocation. For
example, if CSN Anchored Mobility is not performed, when
MS roams from ASN GW B to ASN GW C in Fig. 1, ASN
GW A will tunnel traffic to ASN GW C. The MS is still
served by two ASN GWs (ASN GW A and ASN GW C). As
before mentioned discussion, the MS is called Anchored MS
of ASN GW A. Later on, the ASN GW A may request the MS
to carry out CSN Anchored Mobility, i.e., ASN GW
reallocation. This may happen due to the heavy load of the
ASN GW A [8], to reduce end-to-end latency, or for resource
optimization purposes [4], [5]. After performing ASN GW
reallocation, the traffic anchor point is changed to ASN GW
C. The MS then is not served by ASN GW A. This is shown in
Fig. 1 after changing from Flow (4) to Flow (5).
Although the two-tiered mobility management defined in
WiMAX potentially can minimize handover delay and packet
loss, it leads to another problem: When to perform ASN GW
reallocation? The WiMAX standards, however, only define
the procedures for ASN Anchored Mobility and CSN
Anchored Mobility. The standards do not address when the
Anchored MSs should perform ASN GW reallocation to
relocate the traffic anchor point from the anchored ASN GW
IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 02 Issue: 06 | Jun-2013, Available @ http://www.ijret.org 988
to the serving ASN GW. The problem is left for vendors and
operators to develop their own proprietary solutions.
Besides, the problem is closely related to Admission Control
(AC), which is widely used in wireless networks to ensure
service quality and reduce network congestion by limiting the
number of MSs served in the network. If the ASN GW
reallocation can be performed before the system becomes
overloaded, the system may be able to accommodate more
MSs. Therefore, a well-designed AC algorithm should
cooperate with the ASN GW reallocation algorithm.
Figure 1: ASN Anchored Mobility and CSN Anchored
Mobility in WiMAX networks.
The problem with the reallocation is that, typical reallocation
on established session results in sudden packet loss during the
handover procedure. Most solutions only focus on the
reallocation process, but give little attention to the momentary
packet loss during the reallocation process. I propose adaptive
buffering solution to reduce this packet loss without affecting
the quality of service.
2. LITERATURE SURVEY
In the literature survey, I explore current solutions to reduce
packet loss in gateway reallocation process in Mobile
WIMAX networks.
Zong-Hua Li and Jyh Cheng Chen in their work on gateway
reallocation proposed a predictive mechanism to reduce the
packet loss and handover latency. Their approach is based on
predicting the connections to be reallocated and moving them
in advance, so that capacity of network is increased and also
there is less call drops because connections are available. But
their approach does not consider momentary packet loss also
they do reallocation on the connection which is loaded with
packets causing momentary packet loss.
Ai-Chun Pang and Yi-Bing Lin in their work on approach for
reallocation in UMTS network proposed to buffer packets at
RNC to avoid packet loss. But their approach does not
consider the case of multiple mobile stations downloading
same contents. In this case buffering at RNC is not a viable
solution. Also when the mobile station moves out of the area
of RNC the packets queued at RNC is waste.
As see from related works mentioned, there is no optimized
way to avoid this momentary packet loss, and I am the first to
provide solution for same.
3. OVERVIEW OF PROPOSED SOLUTION
This proposed solution consists of two stages.
1. Buffering packets at CSN
2. Buffering packet at ASN.
Buffering packets at CSN is needed for the packets arriving
from the internet side. Buffering at ASN is needed for the
packets from the mobile station.
In the proposed solution, when a connection is to be
reallocated based on the current rate of communication, buffer
size need to be allocated is calculated and reserved in advance
at the serving ASN and at the CSN. The packets arrived from
mobile station is queued in the ASN buffer, till reallocation
process is completed. The packets from internet is buffered at
the gateway and delivered to the ASN once the gateway
reallocation process is complete.
Buffering at ASN has a important advantage when compared
to buffering at the RNC because even when the mobile station
moves from one RNC area to another but in the same ASN.
4. DETAILS OF PROPOSED SECURITY
MECHANISM
A. Buffering at CSN
At the gateway, buffer chunks are available. When a
connection is to be reallocated, based on the rate of arrival of
packets from internet the buffer chunks are allocated
according to
Buffer Size = Rate of Arrival of Packet (RI) x Time to
reallocate.
ASN: Access Service Network
ASN GW: ASN Gateway
BS: Base Station
CSN: Connectivity Service Network
FA: Foreign Agent
HA: Home Agent
MS: Mobile Station
IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 02 Issue: 06 | Jun-2013, Available @ http://www.ijret.org 989
The time to reallocate is most of cases constant, but when the
number of reallocates is more this value will increase.
The packets arriving from internet are queued in the Buffer
and provided to the connection on successful reallocation. In
case of failure of reallocation the connection will be torn down
and buffer space allocated is added back to the pool. The
buffer space allocated is based on the current rate of arrival
and thus the allocation process is very adaptive. Also if the
reallocation is known a priori, the rate of packet arrival at
internet can be reduced, there by the buffer size allocated is
less.
B. Buffering at ASN
At ASN buffer space is allocated for the packets arriving from
the mobile station. Based on the rate of arrival of packets from
the mobile station, the buffer space is allocated according to
the relation
Buffer Size = Rate of Arrival of Packet (Rm) x Time to
reallocate
The packets from the mobile station is queued at the ASN and
delivered to the CSN on establishment of the connection. The
rate of arrival of packets from mobile station is reduced on the
start of reallocation process and brought back to original level
after the reallocation process is complete.
C. Prediction Algorithm Changes For Reducing
Packet Loss
Wiener prediction process proposed by Zhong Hua Li can be
used for finding the connection to be reallocated. But in their
original work the connection to be reallocated is found by
estimating the expected serving rate of each ASN and
reallocating the connection based on it. But I propose a further
extension to this method, based on the expected serving rate
the number of connection to be reallocated is found. The
connections are then sorted in ascending order of the rate of
packet transfer. The connection with low rate of packet
transfer is first reallocated before connection with high rate of
data transfer. This is done purposely to avoid packet loss; the
best time for reallocation of connection is at the time of low
data packet transfer rate. The previous solutions have not
focused on this part, so there was momentary packet loss, but
in my solution I have given more priority to connection with
low data rate transfer and reallocated them.
D. Buffer Space De-Allocation
The buffer space is de allocated in following ways.
 In case of reallocation failure the connection is freed
totally and buffer is freed back to pool.
 In case of reallocation success the packets in the
buffer are cleared at the rate of packet transfer and
once all packets are delivered, the buffer space is
freed back to pool
5. PERFORMANCE ANALYSIS
I implemented the simulation using NS2 simulator and also
simulated a WIMAX of 4 ASN and 20 to 50 mobile in each
ASN area and random movement of mobile nodes across the 4
ASN. The number of allowed connection between ASN and
CSN is set as 10 and simulation is conducted.
I measure the number of packet loss during the reallocation
time using this proposed solution and the WP based method.
The results show that proposed solution has less packet loss
compared with WP based solution. This reduced packet loss is
due to the buffering of packets.
Figure 2: Number of reallocations per second versus Packets
Lost in WP-based and proposed buffering.
CONCLUSION AND ENHANCEMENTS
In this paper, I have detailed buffering solution to avoid packet
loss. Through extensive simulation I proved that that packet
loss is reduced in this approach compared to previous
solutions of buffering at RNC. The solution is very effective
by giving more priority to low data rate connections to be
reallocated faster compared to connections with higher data
rate.
Not all kind of applications need mechanism for packet loss
tolerance. Applications like VOIP can tolerate packet loss. In
future I want to provide the buffering strategy based on the
kind of application.
IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 02 Issue: 06 | Jun-2013, Available @ http://www.ijret.org 990
REFERENCES
[1] IEEE 802.16-2004 Std., Air Interface for Fixed
Broadband Wireless Access Systems, IEEE, Oct. 2004.
[2] IEEE 802.16e-2005 Std., Part 16: Air Interface for Fixed
and Mobile Broadband Wireless Access Systems-
Amendment 2: Physical and Medium Access Control
Layers for Combined Fixed and Mobile WiMAX Forum,
http://www.wimaxforum.org, 2011.
[3] WiMAX Forum Std. 1.0, Rev. 4, WiMAX Forum
Network Architecture (Stage 2: Architecture Tenets,
Reference Model and Reference Points), WiMAX, Feb.
2009.
[4] WiMAX forum Std. 1.0, Rev. 4, WiMAX Forum
Network Architecture (Stage 3: Detailed Protocols and
Procedures), WiMAX, Feb. 2009.
[5] L. Nuaymi, WiMAX: Technology for Broadband
Wireless Access John Wiley, 2007.
[6] K. Etemad, “Overview of Mobile WiMAX Technology
and Evolution,” IEEE Comm. Mag., vol. 46, no. 10, pp.
31-40, Oct. 2008.
[7] Z.-H. Liu, S.-Y. Pan, and J.-C. Chen, “Access Service
Network (ASN) Gateway Relocation Algorithms in
WiMAX Networks,” Proc. IEEE Int’l Conf. Comm.
(ICC ’08), pp. 2674-2679, May 2008.
[8] Y. Fang and Y. Zhang, “Call Admission Control
Schemes and Performance Analysis in Wireless Mobile
Networks,” IEEE Trans. Vehicular Technology, vol. 51,
no. 2, pp. 371-382, Mar. 2002.

More Related Content

What's hot

Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Flexible channel allocation using best Secondary user detection algorithm
Flexible channel allocation using best Secondary user detection algorithmFlexible channel allocation using best Secondary user detection algorithm
Flexible channel allocation using best Secondary user detection algorithm
ijsrd.com
 
Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...
Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...
Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...
IJERA Editor
 
Shubha_Project_Final_modified_1_1_Final_10_March_April_18
Shubha_Project_Final_modified_1_1_Final_10_March_April_18Shubha_Project_Final_modified_1_1_Final_10_March_April_18
Shubha_Project_Final_modified_1_1_Final_10_March_April_18
Shubha Koundinyan
 

What's hot (17)

Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Fy3111571162
Fy3111571162Fy3111571162
Fy3111571162
 
Flexible channel allocation using best Secondary user detection algorithm
Flexible channel allocation using best Secondary user detection algorithmFlexible channel allocation using best Secondary user detection algorithm
Flexible channel allocation using best Secondary user detection algorithm
 
Ns2 2015 2016 titles abstract
Ns2 2015 2016 titles abstractNs2 2015 2016 titles abstract
Ns2 2015 2016 titles abstract
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Fuzzy Optimized Metric for Adaptive Network Routing
Fuzzy Optimized Metric for Adaptive Network RoutingFuzzy Optimized Metric for Adaptive Network Routing
Fuzzy Optimized Metric for Adaptive Network Routing
 
Power allocation for statistical qo s provisioning in
Power allocation for statistical qo s provisioning inPower allocation for statistical qo s provisioning in
Power allocation for statistical qo s provisioning in
 
06425531
0642553106425531
06425531
 
Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...
Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...
Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...
 
EESRDA
EESRDAEESRDA
EESRDA
 
Performance of the Maximum Stable Connected Dominating Sets in the Presence o...
Performance of the Maximum Stable Connected Dominating Sets in the Presence o...Performance of the Maximum Stable Connected Dominating Sets in the Presence o...
Performance of the Maximum Stable Connected Dominating Sets in the Presence o...
 
C046022025
C046022025C046022025
C046022025
 
Location updation for energy efficient geographic routing in manet
Location updation for energy efficient geographic routing in manetLocation updation for energy efficient geographic routing in manet
Location updation for energy efficient geographic routing in manet
 
Defeating jamming with the power of silence a gametheoretic analysis
Defeating jamming with the power of silence a gametheoretic analysisDefeating jamming with the power of silence a gametheoretic analysis
Defeating jamming with the power of silence a gametheoretic analysis
 
Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...
Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...
Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...
 
Shubha_Project_Final_modified_1_1_Final_10_March_April_18
Shubha_Project_Final_modified_1_1_Final_10_March_April_18Shubha_Project_Final_modified_1_1_Final_10_March_April_18
Shubha_Project_Final_modified_1_1_Final_10_March_April_18
 
DYNAMIC TASK SCHEDULING BASED ON BURST TIME REQUIREMENT FOR CLOUD ENVIRONMENT
DYNAMIC TASK SCHEDULING BASED ON BURST TIME REQUIREMENT FOR CLOUD ENVIRONMENTDYNAMIC TASK SCHEDULING BASED ON BURST TIME REQUIREMENT FOR CLOUD ENVIRONMENT
DYNAMIC TASK SCHEDULING BASED ON BURST TIME REQUIREMENT FOR CLOUD ENVIRONMENT
 

Viewers also liked

Design and analysis of an electric kart
Design and analysis of an electric kartDesign and analysis of an electric kart
Design and analysis of an electric kart
eSAT Journals
 
Performance analysis of papr reduction techniques in multicarrier modulation ...
Performance analysis of papr reduction techniques in multicarrier modulation ...Performance analysis of papr reduction techniques in multicarrier modulation ...
Performance analysis of papr reduction techniques in multicarrier modulation ...
eSAT Journals
 
Design and development of grid tie inverter with closed loop spwm single stag...
Design and development of grid tie inverter with closed loop spwm single stag...Design and development of grid tie inverter with closed loop spwm single stag...
Design and development of grid tie inverter with closed loop spwm single stag...
eSAT Journals
 

Viewers also liked (20)

Design and analysis of an electric kart
Design and analysis of an electric kartDesign and analysis of an electric kart
Design and analysis of an electric kart
 
Investigation of behaviour of 3 degrees of freedom systems for transient loads
Investigation of behaviour of 3 degrees of freedom systems for transient loadsInvestigation of behaviour of 3 degrees of freedom systems for transient loads
Investigation of behaviour of 3 degrees of freedom systems for transient loads
 
Comparison of percentage steel and concrete quantities of a r.c building in d...
Comparison of percentage steel and concrete quantities of a r.c building in d...Comparison of percentage steel and concrete quantities of a r.c building in d...
Comparison of percentage steel and concrete quantities of a r.c building in d...
 
Design of integrated multistage dc dc convrter
Design of integrated multistage dc dc convrterDesign of integrated multistage dc dc convrter
Design of integrated multistage dc dc convrter
 
Effect of nanofluid on efficiency of centrifugal pump
Effect of nanofluid on efficiency of centrifugal pumpEffect of nanofluid on efficiency of centrifugal pump
Effect of nanofluid on efficiency of centrifugal pump
 
Smart railway crossing embedded with automated platform bridge
Smart railway crossing embedded with automated platform bridgeSmart railway crossing embedded with automated platform bridge
Smart railway crossing embedded with automated platform bridge
 
A continuous time adc and digital signal processing system for smart dust and...
A continuous time adc and digital signal processing system for smart dust and...A continuous time adc and digital signal processing system for smart dust and...
A continuous time adc and digital signal processing system for smart dust and...
 
Natural convection heat transfer oscillatory flow of an elastico viscous flui...
Natural convection heat transfer oscillatory flow of an elastico viscous flui...Natural convection heat transfer oscillatory flow of an elastico viscous flui...
Natural convection heat transfer oscillatory flow of an elastico viscous flui...
 
Heat transfer augmentation in different geometries of dimpled surface under n...
Heat transfer augmentation in different geometries of dimpled surface under n...Heat transfer augmentation in different geometries of dimpled surface under n...
Heat transfer augmentation in different geometries of dimpled surface under n...
 
Interactive liver tumor segmentation using
Interactive liver tumor segmentation using Interactive liver tumor segmentation using
Interactive liver tumor segmentation using
 
Vibration analysis and diagnostics for oil production units by pumping rod
Vibration analysis and diagnostics for oil production units by pumping rodVibration analysis and diagnostics for oil production units by pumping rod
Vibration analysis and diagnostics for oil production units by pumping rod
 
Master slave vector controlled double induction motor using unity power facto...
Master slave vector controlled double induction motor using unity power facto...Master slave vector controlled double induction motor using unity power facto...
Master slave vector controlled double induction motor using unity power facto...
 
Performance analysis of papr reduction techniques in multicarrier modulation ...
Performance analysis of papr reduction techniques in multicarrier modulation ...Performance analysis of papr reduction techniques in multicarrier modulation ...
Performance analysis of papr reduction techniques in multicarrier modulation ...
 
Design of a low cost compact size starter for low power water pumps
Design of a low cost compact size starter for low power water pumpsDesign of a low cost compact size starter for low power water pumps
Design of a low cost compact size starter for low power water pumps
 
Design and development of grid tie inverter with closed loop spwm single stag...
Design and development of grid tie inverter with closed loop spwm single stag...Design and development of grid tie inverter with closed loop spwm single stag...
Design and development of grid tie inverter with closed loop spwm single stag...
 
Effect of nanofluid on friction factor of pipe and pipe fittings part ii ef...
Effect of nanofluid on friction factor of pipe and pipe fittings   part ii ef...Effect of nanofluid on friction factor of pipe and pipe fittings   part ii ef...
Effect of nanofluid on friction factor of pipe and pipe fittings part ii ef...
 
Mobile WiMAX
Mobile WiMAXMobile WiMAX
Mobile WiMAX
 
Wimax
WimaxWimax
Wimax
 
Power quality improvement of grid interconnected distribution system using fs...
Power quality improvement of grid interconnected distribution system using fs...Power quality improvement of grid interconnected distribution system using fs...
Power quality improvement of grid interconnected distribution system using fs...
 
Effect of different infill material on the seismic behavior of high rise buil...
Effect of different infill material on the seismic behavior of high rise buil...Effect of different infill material on the seismic behavior of high rise buil...
Effect of different infill material on the seismic behavior of high rise buil...
 

Similar to Avoiding packet loss in gateway reallocation in mobile wimax networks

Paper id 24201445
Paper id 24201445Paper id 24201445
Paper id 24201445
IJRAT
 
A Professional QoS Provisioning in the Intra Cluster Packet Level Resource Al...
A Professional QoS Provisioning in the Intra Cluster Packet Level Resource Al...A Professional QoS Provisioning in the Intra Cluster Packet Level Resource Al...
A Professional QoS Provisioning in the Intra Cluster Packet Level Resource Al...
GiselleginaGloria
 
Energy sink-holes avoidance method based on fuzzy system in wireless sensor ...
Energy sink-holes avoidance method based on fuzzy system in  wireless sensor ...Energy sink-holes avoidance method based on fuzzy system in  wireless sensor ...
Energy sink-holes avoidance method based on fuzzy system in wireless sensor ...
IJECEIAES
 

Similar to Avoiding packet loss in gateway reallocation in mobile wimax networks (20)

Bc03303410346
Bc03303410346Bc03303410346
Bc03303410346
 
M.Phil Computer Science Networking Projects
M.Phil Computer Science Networking ProjectsM.Phil Computer Science Networking Projects
M.Phil Computer Science Networking Projects
 
M phil-computer-science-networking-projects
M phil-computer-science-networking-projectsM phil-computer-science-networking-projects
M phil-computer-science-networking-projects
 
Paper id 24201445
Paper id 24201445Paper id 24201445
Paper id 24201445
 
A Review on Virtual Grid Based Dynamic Routes Adjustment in WSN
A Review on Virtual Grid Based Dynamic Routes Adjustment in WSNA Review on Virtual Grid Based Dynamic Routes Adjustment in WSN
A Review on Virtual Grid Based Dynamic Routes Adjustment in WSN
 
Network assisted mobile computing with optimal uplink query processing
Network assisted mobile computing with optimal uplink query processingNetwork assisted mobile computing with optimal uplink query processing
Network assisted mobile computing with optimal uplink query processing
 
iccet2015sp02
iccet2015sp02iccet2015sp02
iccet2015sp02
 
M.E Computer Science Mobile Computing Projects
M.E Computer Science Mobile Computing ProjectsM.E Computer Science Mobile Computing Projects
M.E Computer Science Mobile Computing Projects
 
Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...
Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...
Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...
 
A Professional QoS Provisioning in the Intra Cluster Packet Level Resource Al...
A Professional QoS Provisioning in the Intra Cluster Packet Level Resource Al...A Professional QoS Provisioning in the Intra Cluster Packet Level Resource Al...
A Professional QoS Provisioning in the Intra Cluster Packet Level Resource Al...
 
Secured Data Aggregation using SRL Protocol for Wireless Sensor Networks
Secured Data Aggregation using SRL Protocol for Wireless Sensor NetworksSecured Data Aggregation using SRL Protocol for Wireless Sensor Networks
Secured Data Aggregation using SRL Protocol for Wireless Sensor Networks
 
M phil-computer-science-mobile-computing-projects
M phil-computer-science-mobile-computing-projectsM phil-computer-science-mobile-computing-projects
M phil-computer-science-mobile-computing-projects
 
M.Phil Computer Science Mobile Computing Projects
M.Phil Computer Science Mobile Computing ProjectsM.Phil Computer Science Mobile Computing Projects
M.Phil Computer Science Mobile Computing Projects
 
Analyzing the interaction of ascent with ieee 802.11E mac in wireless sensor ...
Analyzing the interaction of ascent with ieee 802.11E mac in wireless sensor ...Analyzing the interaction of ascent with ieee 802.11E mac in wireless sensor ...
Analyzing the interaction of ascent with ieee 802.11E mac in wireless sensor ...
 
Iisrt komathi krishna (networks)
Iisrt komathi krishna (networks)Iisrt komathi krishna (networks)
Iisrt komathi krishna (networks)
 
Modified q aware scheduling algorithm for improved fairness in 802.16 j networks
Modified q aware scheduling algorithm for improved fairness in 802.16 j networksModified q aware scheduling algorithm for improved fairness in 802.16 j networks
Modified q aware scheduling algorithm for improved fairness in 802.16 j networks
 
Packet Transfer Rate & Robust Throughput for Mobile Adhoc Network
Packet Transfer Rate & Robust Throughput for Mobile Adhoc NetworkPacket Transfer Rate & Robust Throughput for Mobile Adhoc Network
Packet Transfer Rate & Robust Throughput for Mobile Adhoc Network
 
Energy sink-holes avoidance method based on fuzzy system in wireless sensor ...
Energy sink-holes avoidance method based on fuzzy system in  wireless sensor ...Energy sink-holes avoidance method based on fuzzy system in  wireless sensor ...
Energy sink-holes avoidance method based on fuzzy system in wireless sensor ...
 
V.KARTHIKEYAN PUBLISHED ARTICLE AA
V.KARTHIKEYAN PUBLISHED ARTICLE AAV.KARTHIKEYAN PUBLISHED ARTICLE AA
V.KARTHIKEYAN PUBLISHED ARTICLE AA
 
Civilizing the Network Lifespan of Manets Through Cooperative Mac Protocol Me...
Civilizing the Network Lifespan of Manets Through Cooperative Mac Protocol Me...Civilizing the Network Lifespan of Manets Through Cooperative Mac Protocol Me...
Civilizing the Network Lifespan of Manets Through Cooperative Mac Protocol Me...
 

More from eSAT Journals

Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case study
eSAT Journals
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
eSAT Journals
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources management
eSAT Journals
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn method
eSAT Journals
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...
eSAT Journals
 

More from eSAT Journals (20)

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavements
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case study
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case study
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangalore
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizer
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources management
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concrete
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabs
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in india
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn method
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniques
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...
 

Recently uploaded

DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
MayuraD1
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
mphochane1998
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
AldoGarca30
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
Kamal Acharya
 

Recently uploaded (20)

kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal load
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
Moment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilMoment Distribution Method For Btech Civil
Moment Distribution Method For Btech Civil
 
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLEGEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
 
Wadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptxWadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptx
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 

Avoiding packet loss in gateway reallocation in mobile wimax networks

  • 1. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163 __________________________________________________________________________________________ Volume: 02 Issue: 06 | Jun-2013, Available @ http://www.ijret.org 987 AVOIDING PACKET LOSS IN GATEWAY REALLOCATION IN MOBILE WIMAX NETWORKS Kusha K R Student, Department of Computer Science and Engineering, Jawaharlal Nehru National College of Engineering, Shimoga, VTU, Karnataka, India, kusha.karur@gmail.com Abstract Gateway reallocation algorithms are proposed to increase the capacity of WiMAX networks to serve more users. But most of the proposed solutions don’t consider the momentary packet loss occurring during the reallocation process. This momentary packet loss can also affect the application quality of service. In this work, I propose an efficient adaptive buffering strategy to avoid this packet loss in the network. Through simulation I prove that the approach is effective against momentary packet loss during the gateway reallocation process. Keywords— security; sensor networks, denial of sleep attack ---------------------------------------------------------------------***------------------------------------------------------------------------- 1. INTRODUCTION The IEEE 802.16-series standards [1], [2] are expected to provide broadband wireless access for a variety of multimedia services. Like other IEEE 802-series standards, IEEE 802.16 working group standardizes physical (PHY) layer and Medium Access Control (MAC) layer only. To build a complete system, higher layers are still necessary. One of the major objectives of WiMAX Forum [3], thus, is to develop and standardize the WiMAX Forum Network Architecture [4], [5], [6], [7], which is evolving into Internet Protocol (IP)-based wireless network. The architecture is depicted in Figure 1. In Figure 1, the Access Service Network (ASN) provides wireless radio access for WiMAX subscribers. It consists of one ASN Gateway (ASN GW) and many base stations (BSs). Each ASN is connected to Connectivity Service Network (CSN), which provides IP connectivity services. To support IP mobility, Mobile IP (MIP) 1 is adopted. The Home Agent (HA) of a Mobile Station (MS) is located in the CSN of the MS’s Home Network Service Provider (H-NSP). ASN GW supports the Foreign Agent (FA) functionality. The WiMAX Forum has defined a two-tiered mobility management: ASN Anchored Mobility and CSN Anchored Mobility. ASN Anchored Mobility refers to the procedures associated with the MS’s movement between BSs, which may belong to the same or different ASN GWs. In ASN Anchored Mobility, the context of the designated MS is transferred from the previous BS to the new BS. Without performing CSN Anchored Mobility, ASN Anchored Mobility can minimize handover delay and packet loss. For example, an MS may perform intra-ASN handover (e.g., changing from Flow (1) to Flow (2) in Figure 1) while still attaching to the same ASN GW. In addition, an MS may perform inter-ASN handover (e.g., changing from Flow (2) to Flow (3) in Figure 1) where the ASN GW A is the traffic anchor point and responsible for ASN-CSN tunneling. That is, traffic is still sent to ASN GW A, which then further tunnels traffic to ASN GW B. In Flow (1) and Flow (2), the MS is called Serving MS of ASN GW A. In Flow (3), the MS is called Anchored MS of ASN GW A and handover MS of ASN GW B. In such case, the ASN GW A and ASN GW B are called anchored ASN GW and Serving ASN GW, respectively. CSN Anchored Mobility refers to the process of changing the traffic anchor point and is independent of the MS’s link layer handover [4]. It is also called ASN GW reallocation. For example, if CSN Anchored Mobility is not performed, when MS roams from ASN GW B to ASN GW C in Fig. 1, ASN GW A will tunnel traffic to ASN GW C. The MS is still served by two ASN GWs (ASN GW A and ASN GW C). As before mentioned discussion, the MS is called Anchored MS of ASN GW A. Later on, the ASN GW A may request the MS to carry out CSN Anchored Mobility, i.e., ASN GW reallocation. This may happen due to the heavy load of the ASN GW A [8], to reduce end-to-end latency, or for resource optimization purposes [4], [5]. After performing ASN GW reallocation, the traffic anchor point is changed to ASN GW C. The MS then is not served by ASN GW A. This is shown in Fig. 1 after changing from Flow (4) to Flow (5). Although the two-tiered mobility management defined in WiMAX potentially can minimize handover delay and packet loss, it leads to another problem: When to perform ASN GW reallocation? The WiMAX standards, however, only define the procedures for ASN Anchored Mobility and CSN Anchored Mobility. The standards do not address when the Anchored MSs should perform ASN GW reallocation to relocate the traffic anchor point from the anchored ASN GW
  • 2. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163 __________________________________________________________________________________________ Volume: 02 Issue: 06 | Jun-2013, Available @ http://www.ijret.org 988 to the serving ASN GW. The problem is left for vendors and operators to develop their own proprietary solutions. Besides, the problem is closely related to Admission Control (AC), which is widely used in wireless networks to ensure service quality and reduce network congestion by limiting the number of MSs served in the network. If the ASN GW reallocation can be performed before the system becomes overloaded, the system may be able to accommodate more MSs. Therefore, a well-designed AC algorithm should cooperate with the ASN GW reallocation algorithm. Figure 1: ASN Anchored Mobility and CSN Anchored Mobility in WiMAX networks. The problem with the reallocation is that, typical reallocation on established session results in sudden packet loss during the handover procedure. Most solutions only focus on the reallocation process, but give little attention to the momentary packet loss during the reallocation process. I propose adaptive buffering solution to reduce this packet loss without affecting the quality of service. 2. LITERATURE SURVEY In the literature survey, I explore current solutions to reduce packet loss in gateway reallocation process in Mobile WIMAX networks. Zong-Hua Li and Jyh Cheng Chen in their work on gateway reallocation proposed a predictive mechanism to reduce the packet loss and handover latency. Their approach is based on predicting the connections to be reallocated and moving them in advance, so that capacity of network is increased and also there is less call drops because connections are available. But their approach does not consider momentary packet loss also they do reallocation on the connection which is loaded with packets causing momentary packet loss. Ai-Chun Pang and Yi-Bing Lin in their work on approach for reallocation in UMTS network proposed to buffer packets at RNC to avoid packet loss. But their approach does not consider the case of multiple mobile stations downloading same contents. In this case buffering at RNC is not a viable solution. Also when the mobile station moves out of the area of RNC the packets queued at RNC is waste. As see from related works mentioned, there is no optimized way to avoid this momentary packet loss, and I am the first to provide solution for same. 3. OVERVIEW OF PROPOSED SOLUTION This proposed solution consists of two stages. 1. Buffering packets at CSN 2. Buffering packet at ASN. Buffering packets at CSN is needed for the packets arriving from the internet side. Buffering at ASN is needed for the packets from the mobile station. In the proposed solution, when a connection is to be reallocated based on the current rate of communication, buffer size need to be allocated is calculated and reserved in advance at the serving ASN and at the CSN. The packets arrived from mobile station is queued in the ASN buffer, till reallocation process is completed. The packets from internet is buffered at the gateway and delivered to the ASN once the gateway reallocation process is complete. Buffering at ASN has a important advantage when compared to buffering at the RNC because even when the mobile station moves from one RNC area to another but in the same ASN. 4. DETAILS OF PROPOSED SECURITY MECHANISM A. Buffering at CSN At the gateway, buffer chunks are available. When a connection is to be reallocated, based on the rate of arrival of packets from internet the buffer chunks are allocated according to Buffer Size = Rate of Arrival of Packet (RI) x Time to reallocate. ASN: Access Service Network ASN GW: ASN Gateway BS: Base Station CSN: Connectivity Service Network FA: Foreign Agent HA: Home Agent MS: Mobile Station
  • 3. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163 __________________________________________________________________________________________ Volume: 02 Issue: 06 | Jun-2013, Available @ http://www.ijret.org 989 The time to reallocate is most of cases constant, but when the number of reallocates is more this value will increase. The packets arriving from internet are queued in the Buffer and provided to the connection on successful reallocation. In case of failure of reallocation the connection will be torn down and buffer space allocated is added back to the pool. The buffer space allocated is based on the current rate of arrival and thus the allocation process is very adaptive. Also if the reallocation is known a priori, the rate of packet arrival at internet can be reduced, there by the buffer size allocated is less. B. Buffering at ASN At ASN buffer space is allocated for the packets arriving from the mobile station. Based on the rate of arrival of packets from the mobile station, the buffer space is allocated according to the relation Buffer Size = Rate of Arrival of Packet (Rm) x Time to reallocate The packets from the mobile station is queued at the ASN and delivered to the CSN on establishment of the connection. The rate of arrival of packets from mobile station is reduced on the start of reallocation process and brought back to original level after the reallocation process is complete. C. Prediction Algorithm Changes For Reducing Packet Loss Wiener prediction process proposed by Zhong Hua Li can be used for finding the connection to be reallocated. But in their original work the connection to be reallocated is found by estimating the expected serving rate of each ASN and reallocating the connection based on it. But I propose a further extension to this method, based on the expected serving rate the number of connection to be reallocated is found. The connections are then sorted in ascending order of the rate of packet transfer. The connection with low rate of packet transfer is first reallocated before connection with high rate of data transfer. This is done purposely to avoid packet loss; the best time for reallocation of connection is at the time of low data packet transfer rate. The previous solutions have not focused on this part, so there was momentary packet loss, but in my solution I have given more priority to connection with low data rate transfer and reallocated them. D. Buffer Space De-Allocation The buffer space is de allocated in following ways.  In case of reallocation failure the connection is freed totally and buffer is freed back to pool.  In case of reallocation success the packets in the buffer are cleared at the rate of packet transfer and once all packets are delivered, the buffer space is freed back to pool 5. PERFORMANCE ANALYSIS I implemented the simulation using NS2 simulator and also simulated a WIMAX of 4 ASN and 20 to 50 mobile in each ASN area and random movement of mobile nodes across the 4 ASN. The number of allowed connection between ASN and CSN is set as 10 and simulation is conducted. I measure the number of packet loss during the reallocation time using this proposed solution and the WP based method. The results show that proposed solution has less packet loss compared with WP based solution. This reduced packet loss is due to the buffering of packets. Figure 2: Number of reallocations per second versus Packets Lost in WP-based and proposed buffering. CONCLUSION AND ENHANCEMENTS In this paper, I have detailed buffering solution to avoid packet loss. Through extensive simulation I proved that that packet loss is reduced in this approach compared to previous solutions of buffering at RNC. The solution is very effective by giving more priority to low data rate connections to be reallocated faster compared to connections with higher data rate. Not all kind of applications need mechanism for packet loss tolerance. Applications like VOIP can tolerate packet loss. In future I want to provide the buffering strategy based on the kind of application.
  • 4. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163 __________________________________________________________________________________________ Volume: 02 Issue: 06 | Jun-2013, Available @ http://www.ijret.org 990 REFERENCES [1] IEEE 802.16-2004 Std., Air Interface for Fixed Broadband Wireless Access Systems, IEEE, Oct. 2004. [2] IEEE 802.16e-2005 Std., Part 16: Air Interface for Fixed and Mobile Broadband Wireless Access Systems- Amendment 2: Physical and Medium Access Control Layers for Combined Fixed and Mobile WiMAX Forum, http://www.wimaxforum.org, 2011. [3] WiMAX Forum Std. 1.0, Rev. 4, WiMAX Forum Network Architecture (Stage 2: Architecture Tenets, Reference Model and Reference Points), WiMAX, Feb. 2009. [4] WiMAX forum Std. 1.0, Rev. 4, WiMAX Forum Network Architecture (Stage 3: Detailed Protocols and Procedures), WiMAX, Feb. 2009. [5] L. Nuaymi, WiMAX: Technology for Broadband Wireless Access John Wiley, 2007. [6] K. Etemad, “Overview of Mobile WiMAX Technology and Evolution,” IEEE Comm. Mag., vol. 46, no. 10, pp. 31-40, Oct. 2008. [7] Z.-H. Liu, S.-Y. Pan, and J.-C. Chen, “Access Service Network (ASN) Gateway Relocation Algorithms in WiMAX Networks,” Proc. IEEE Int’l Conf. Comm. (ICC ’08), pp. 2674-2679, May 2008. [8] Y. Fang and Y. Zhang, “Call Admission Control Schemes and Performance Analysis in Wireless Mobile Networks,” IEEE Trans. Vehicular Technology, vol. 51, no. 2, pp. 371-382, Mar. 2002.