SlideShare a Scribd company logo
1 of 6
Download to read offline
Short Paper
ACEEE Int. J. on Network Security , Vol. 4, No. 1, July 2013

Congestion Control through Load Balancing Technique
for Mobile Networks: A Cluster based Approach
Subhajit Sadhu#1, Sushovon Maity#2,
#

1

Department of CSE, NIT, Durgapur, WB-713209, INDIA
subhajitsadhu.nitdgp@gmail.com, 2sushovon.nit@gmail.com

Abstract — The Optimal Routing Path (ORP) for mobile
cellular networks is proposed in this paper with the
introduction of cluster-based approach. Here an improved
dynamic selection procedure is used to elect cluster head.
The cluster head is only responsible for the computation of
least congested path. Hence the delay is reduced with the
significant reduction on the number of backtrackings.

delay to a larger extent.
In this paper, the previous work in [1, 2, 4] has been
extended with improved dynamic selection procedure to,
select the appropriate node as autonomous cluster-head, in
order to distribute the computation overhead equally among
that particular subset of nodes belonging to that cluster. The
cluster head is only involved in the computation of Optimal
routing path (ORP). Hence the objective of this work is to
search the ORP through intermediate cellular clusters with
least backtracking, and also to change the autonomous
cluster-head dynamically, to distribute the load of
computation.
The paper is organized as follows: section 2 describes
the proposed model along with its working principles. The
experimental results have been discussed in section 3.Finally,
section 4 contains the conclusion.

Keywords - clustering, load-balancing, congestion control,
computation optimization, delay reduction.

I. INTRODUCTION
Allocation of resources and optimization of its usage are
the major concerns in the field of mobile networking due to
the viral increase of mobile phone usage. Sometimes calls
have to be blocked or dropped due to unavailability of resources. Quality of Services (QoS) may also degrade, leading to customer dissatisfaction. Therefore, minimizing the
number of calls blocked per unit time, along with providing
better quality of services (QoS) with optimum delay, is being
considered as one of the primary focus of research. Hence
different resource allocation schemes have been proposed
for better user services and system utilization [1].
One of those schemes is based on the concept of clustering of the network nodes [2]. It tries to minimize the total
computational overhead and delay by allowing only the cluster-heads to compute the least congested optimal routing
path through that particular cluster; thereby ensuring not
only congestion control but also load balancing. But in this
approach, the cluster head becomes overly loaded with computation of the Optimal Routing Path (ORP) and hence
thereby, performance may decrease and delay may increase
at the time of heavy traffics. Another one of those scheme
based on the concept of dynamic pricing [2] has been proposed which introduces variant price for calls in accordance
with variation of demands of the users, but it does not elucidate the problem caused by computational overhead. Effective joint Call Admission Control (JCAC) [3] algorithms have
been proposed to ensure optimal QoS. The reduction of delay was beyond the scope of this work. Another dynamic
pricing scheme introduced as priority based tree generation
model (PTGM) in [1] proposing the use of a fixed MOBILE
TERMINAL (MT) acting as a mobile switching centre (MSC).
Further, the improvement on foundation of optimal path is
needed. The reduction of routing path was dealt with the
introduction of certain imperative rules based on the radii
oriented topology of nodes and well-defined priority factors
[4]. The probable chances of backtracking increased the
© 2013 ACEEE
DOI: 01.IJNS.4.1.1160

II. PROPOSED MODEL
The model addressed in this work is based on the cellular
layout of mobile network shown in Fig.1.

Fig. 1: Cellular layout of mobile networks

The calls are forwarded through the MT [1]. The proposed
model is based on the functional activities described in the
following.
A. Clustering Model
Firstly the nodes are assembled in the form of a graph.
The nodes are grouped into various levels, starting from level
1 where, the MT [1] is placed. Now the nodes are grouped
into various clusters[6]. The condition for cluster formation
is discussed later. The transmission of signal from MT to
destination node takes place from cluster to cluster.
43
Short Paper
ACEEE Int. J. on Network Security , Vol. 4, No. 1, July 2013
This algorithm is verified with the following Fig. 2. Let the
unique id of the destination node be duid . Now the call is
forwarded if 5:N/2-4<=duid<=5:N/2+4 is satisfied else
blocked.

Introduction of Index Structure:
During the call transmission between nodes, each cluster
keeps on computing the least congested ORP through it,
towards its upper radius. Here, we are not able to determine
whether this computed path actually leads to the destination
node. If not then it would cause huge futile computation.
Subsequently it requires back-tracking which would increase
computational complexity and delay. Hence an Index structure
has been introduced to reduce backtracking. The method of
indexing is described below:We index the nodes of the graph in such a way that the
index number of the left child is less than that of its parent
node and the right child has the index number greater than
the parent. Thus intermediate nodes are given indices which
lie between these extreme child indices. So, the cluster head
forwards the call, only if the destination index number lies
between those two extremities. Otherwise, the call is blocked
through that specific node. Some cases might arise, where
the two different nodes belonging to different radii are
assigned with same indices. To overcome such ambiguity we
couple radius number (radi) with node index (Ii) ,and this
conjugation serves as the unique identification (uid) for each
node. This method is described by the following algorithm:
Initialize (MT,n,r) {
/* Pre_Computation */
for (i=1 to n)
{
SiUm;
// Um stands for status “unmarked”
Ai Φ;
// Acceptance Rate of (i);
Ri Φ;
//Rejection Rate of (i);
Li Φ;
// Load of (i);
}
IMT= n/2; Ident_no(MT,n/2,1);
}
/*assigning unique identification number to each node*/
Ident_no(node,m,r) {
if (node==NULL)
Return;
if (lc_node!=NULL)
Ilc_nodem-1; radlc_noder+1;
Ident_no (lc_node, m-1,r+1);
if (rc_node!=NULL)
Irc_nodem+1; radlc_noder+1;
Ident_no (rc_node, m+1, r+1);
} /*composition of {radi, Ii} serves as the uid */
Extremity_indexing(n,r,k) { /* Extremity Calculation */
for (i=1 to k)
E_Cal(ni,ni,ni->lc,ni->rc);
E_Cal(node,temp,temp1,temp2) {
If (temp! =NULL) {
temp1node->lc; temp2node->rc;
Call E_Call(node,node->lc,templ,temp2);
node->LeftExtremeI templ;
Call E_Call(node,node->rc,templ,temp2);
node->RightExtremeI temp2;
}
}
© 2013 ACEEE
DOI: 01.IJNS.4.1.1160

Fig.2: uid assignment to nodes
Cluster Formation
The number of nodes increases exponentially with the
increment of radii. The cluster size is dependent on the
number of nodes at the specific level. To maintain a trade off
between the number of clusters and the cluster cardinality,
the cluster size is considered as variable and is considered to
be a function of the respective level number. The size is defined
as: (2l + 1) or (2l – 1) depending on the remaining number of
nodes where l=level number. We have chosen (2l + 1) or (2l –
1) such size cluster because the number of nodes in a complete
binary tree with height h is 2h -1[7].
Grouping of nodes into various clusters
Obviously, the number of nodes in (n+1) level is greater
than that in nth level. Here, one-to-many computation requires
less number of computations than one-to-one in model [5].
Static Selection of cluster head (Ci)
In each cluster[6] a node is selected as the cluster head
which is the lowest index from the lower radius. This is used
to maintain uniformity

Fig. 3: Representation of cluster formation

The cluster formation based on the discussed algorithm is
shown in Fig. 3.
Dynamic Selection of cluster head (Ci)
The cluster head besides taking decisions regarding call
transmission, also itself takes part in call transmission. It may
sometimes happen that the cluster head may become too
busy in call transmission, if its position lies on an unavoidable
busy route. In this situation the call transmission decisions
44
Short Paper
ACEEE Int. J. on Network Security , Vol. 4, No. 1, July 2013
may get pending, resulting in delay in transmission, as the
cluster head is in non- pre-emptive call transmission through
itself.
The solution is instead of keeping the cluster head static,
we have to dynamically change the cluster head at runtime
when required. Under this, any node in a cluster may be
assigned the responsibility of cluster head, if it happens to
be the idlest node of the cluster at that point of time.
A Threshold Load value (LT) will be calculated for each
cluster, which is defined as the ratio of, summation of load of
all notes in that cluster, to that of the size of the cluster.
LTk = “ (Li) / (Sk)
LTk = “ (Ai-Ri) / (Sk)
Where, Li is the load of node i, Sk is the size of Kth cluster and
LTk is the Threshold Load value for Kth cluster.
Whenever the load of the cluster head (Lk) will be more than
Threshold Load value of the cluster (LTk), then a change of
cluster head procedure will be initiated.
So, when (Lk>LTk ), the node in that cluster with least load
value will be made the new cluster head.
Ck = Node with Min {Li} in Kth cluster.
Where Ck is the new cluster head of Kth cluster and Li is the
load of ith node in Kth Cluster.
This shifting of cluster head will be accompanied by shifting
of the entire data set containing information about that cluster
from the previous cluster head to presently selected cluster
head. Also the priorities of the nodes need to be swapped
between the current and the previous cluster head, in order
to keep the current cluster head free as much as possible. So
the new priorities(
) will be:
= 1/α i.e. priority for previous cluster head
= α i.e. priority for current cluster head,
Where, 0 <= α <= 1 (α: constant) & is the priority of the
nodes. (Discussed in section 2.3)
Since under this procedure any node in a cluster can be a
cluster head, so an array data structure Cluster_Head[i ] is
used to store the cluster head index, to keep a track of all the
cluster heads. The Cluster_Head[i], will store the index of
cluster head of the ith cluster. Thus the shifting of cluster
head will require modifying this data also.
This entire procedure of calculating the total load of the cluster
and swapping the cluster head if required will take place in
each and every cluster from time to time after a certain timer
interrupt TR (constant).
So, initially the cluster head will be statically selected and
later during runtime the cluster head may change depending
upon network traffic (load).
This method is described by the following Pseudo Code:
Dynamic_Cluster_Selection(Cluster i)
{
set Li=0;
for (j=1 to last node in ith cluster) {
Li+=(Aj-Rj);
//cluster load summation
}
LTi =(Li / (Si); //where, Si is size of cluster i,
// LTi is the Threshold Load value for ith cluster.
Ci= Cluster_Head[i]; // cluster head of ith cluster
© 2013 ACEEE
DOI: 01.IJNS.4.1.1160

if (Load (Ci) < LTi)
{ //load on current cluster head is less than threshold load
return; // No change in cluster head is required
}
else //load on current cluster head is greater than threshold
{ //change in cluster head
min= Load (Ci);
node=i;
for (j=1 to last node in ith cluster)
{
if (Lj<min)
{
Min= Lj;
Node=j;
}
}
swap_priority(Ci,j); // swapping priorities of nodes Ci & j
TransferOfClusterData (node i  node j);
Cluster_Head[i]=j; // cluster head of ith cluster  jth node
}
return;
}
B. Function of the cluster head
The cluster head is an autonomous node which keeps a
track of detailed information of each and every node belonging
to that particular cluster. Each node has the following
information embedded in its structure:
(a)Call Acceptance Rate (Ai): no of calls accepted by node ni
per unit time.(b)Call Rejection Rate (Ri): no of calls dropped
by node ni per unit time.(c)Priority (÷i): Priority of the node
(defined later). (d)Left Extremity (Lei): Left Extreme node
reachable form node i. (e) Right Extremity (Rei): Right Extreme
node reachable form node i, Unique id (uid), Radius (radi) and
Load (Li) =Ai -Ri.
Besides, the cluster head keeps the information on
connectivity of the clustered network. The entire computation
of candidate ORPs and thereby selecting the optimum one is
carried out by the cluster-head only. So cluster head is solely
responsible for transmitting the incoming request from lower
radius to the appropriate node in higher radius
C. Priority of the nodes
The main computations of candidate ORP are being carried
out explicitly by the cluster heads. So it is imperative to make
the cluster head less burdened that is to make sure that less
number of calls physically passes through cluster heads only.
In order to implement this, we introduce priority among the
nodes belonging to a cluster, so that low priority nodes (nodes
other than heads) transmit calls. Whereas high priority nodes
(cluster heads) are employed to computation mainly. The
priority of a node is defined as follows:= 1/á for nodes other than cluster head
= á for cluster head, where 0 <= á <= 1 (á: constant)
The desirable performance can be achieved by assigning
appropriate value to á. For high transmission á should be set
near to 1, for steady performance á should be set near to 0.5
45
Short Paper
ACEEE Int. J. on Network Security , Vol. 4, No. 1, July 2013
Ai++; Return (i);
}
Else
Return (-1);
}

and for restricted use á should be set near to 0.
D. Load balancing by cluster head
Whenever a call request arrives at a node, the corresponding
cluster head computes the cost of congestion for each
possible path and to choose the least congested one. The
Cost of Congestion (CoC) of the Routing path (£) is expressed
as:
£= 1/ (Φ)
Where, Φ= (Load of node) * (Priority of node) = L* ;
= (A-R) * ;
Therefore, ORP= min {£i} for all i.

F. Link state routing protocol
In each cluster the cluster head keeps the track of different
information of the nodes in the cluster discussed previously.
As the transmission continues, the acceptance and rejection
of the nodes keep on changing depending on traffic. The
priorities of the nodes may also be changed explicitly due to
changing demand or due to swapping to cluster head. The
updated information has to be transmitted to every cluster
head of the network which will then update the information
locally among the nodes in that cluster. So the base cluster
head containing the MT is provided with updated link state
packet (ULSP) which keeps this update information. This
LSP gets flooded to all the neighbouring cluster heads in
higher radius except the one from which it has received. The
cluster head keeps this LSP if it’s the updated version of the
previous LSP else it keeps the previous one by checking the
reference number associated with each LSP. This flooding of
LSP will take place after a certain time interval (tm).So the
flooding stops when every cluster head retains the updated
LSP.

E.Call transmission procedure
Initially the call request comes to the MT. The cluster
head (Ci ) to which MT belongs reads the uid of the destination
node. It then reads the Rei and Lei of MT and if Lei<=uid<=Rei
then computation proceeds else the call is dropped instantly
by that cluster head.
If the above said criterion is satisfied then least cost ORP
is calculated by the cluster head in the following way:
First all the candidate paths from the lower radius (radi),
to the immediate higher radius (radi +1) are computed, which
proceeds in the direction of the destination. Then the cost of
each path is computed according to the previous discussion.
£i =1/ [(Ai-Ri) * i]
Here, i denote the node in radius (radi+ 1) adjacent to MT
node present in the same cluster Ci.
The cluster head Ci selects the £i with least cost and forwards
the incoming request from MT. This process continues until
the ultimate destination node is reached or unless the call
gets blocked by any cluster head. This procedure is described
by the following algorithm.
Algorithm: /* Selection of ORP */
Path_Selection (MT, destination_node) {
Source_nodeßMT; Countß0; Set int_node ! 0;
While (destination_node!=int_node or Count<=Max) {
CheadßCluster_head of Source_node;
Flagßforwarding
(Chead,Source_node,destination_node);
If (Flag=-1) {
Block_Request(); break;
}
Int_node=Flag;
}
}
Forwarding (Chead, Source_node, destination_node) {
If (Le Source_node <= destination_node <= Re Source_node)
{ Max=0;
For (all nodes i in next radius in that cluster adjacent to
Source_node)
Cost = (Ai-Ri)* ÷i;
If (max<Cost) {
Max=Cost; Node =i;
}
If (Max==0)
Return -1;
© 2013 ACEEE
DOI: 01.IJNS.4.1. 1160

G. Delay Computation
In order to compare the performance and speed of the
proposed model with those of the previous model, we need
to compute the overall delay while transmission through MT
to destination node.
The overall delay is a sum of two types of delay. These
are:(a)Propagation Delay: Delay incurred due to traversal of the
physical topology. So the parameter on which propagation
delay depends is the number of physical hops traversed.
Let the number of nodes from MT to destination node be
n. So the total number of hops traversed is log(n). Hence
Propagation Delay is (h*d) where d is propagation delay per
edge.
(b) Computation Delay: Delay incurred due to computation
analysis by the cluster head. Hence Computation delay
is (h*k) where k is computation delay per node.
Hence, overall delay: Propagation Delay + Computation Delay.
DELAY (D) = [ {Log (n)*d} + [ {Log (n)-1}* k] ]
Delay incurred when the cluster-head remains static:
As discussed in section 2.1.5 when the cluster head
becomes busy in call transmission, the computation and
decisions to be taken remain pending as long as the cluster
head is busy with its transmission. This will lead to an
additional delay which can be termed as Waiting Time Delay
(WTD) and can be defined as follows:
WTD=f(Li,Tt)
Where f () is a variable function of Li and Tt and will vary
from network to network.
46
Short Paper
ACEEE Int. J. on Network Security , Vol. 4, No. 1, July 2013

Fig. 4: Time Delay Vs Traffic Load

Li=It is the load on that particular cluster head and can be
formulated as Ai-Ri
Tt =Unit of time the cluster head is occupied with call
transmission only and not computation.
So while using only static cluster-head, our overall delay
equation will become:
DELAY (D) = {Log (n)*d} + {Log (n)-1}* k + WTD
DELAY (D) = {Log (n)*d} + {Log (n)-1}* k + f (Li,Tt)- - (1)
The main problem here is that the WTD delay completely
depends on network traffic and we have no control over it. It
may happen that the cluster head may remain busy for greater
time period and may increase the delay for indefinite period
of time.
Delay reduction on dynamically cluster head approach:
When dynamic approach is used along with static
approach, the WTD delay will disappear, because when the
cluster head becomes busy, the idlest node in the cluster is
made the cluster head. But this transition of cluster head
entails selection of the least loaded node and also transferring
the entire set of information of the cluster from previous to
current cluster head. So, all these tasks will lead a new type
of delay which can be termed as Transition Delay [TD] and
can be defined as:
TD=f (|C|, Li) where, |C|=cardinality of that cluster and Li
is the load of the ith cluster.
But this delay will only happen after TR time interval, when
this dynamic procedure will work.
So, our new delay equation after every TR time interval will
be:
DELAY (D) = {Log (n)*d} + {Log (n)-1}* k +TD
DELAY (D) = {Log (n)*d} + {Log (n)-1}* k + f (|C|) —- (2)

But the indefinite Waiting Time Delay (WTD) is completely
removed. As a result the delay reduces considerably when
the network becomes busy or saturated.
III. EXPERIMENTAL RESULTS:
The results of the proposed model have been plotted in a
graph (series 1) as shown in Fig 4. Here, X-axis represents
the Traffic load in terms of cumulative calls/second and the
Y-axis represents the corresponding time delay (µs).It has
also been compared with the results of the previous two
models [2] and [4] which have been plotted in series 2 and
series 3 respectively.
The plot can be subdivide into four regions as shown in
Fig 4.These regions are described as below:
Reg 1: Region of Dormancy:
It’s the pre-computation period so delay is more in series
1 and 2, compared to series 3, as the calls are made to wait till
pre-computation is over completely.
Reg 2: Incremental Region:
As the pre-computation is already done, so the calls are
accepted by the free nodes at a rate faster in series 1 and 2
than the previous model(series 3).
Reg 3: Saturation Region:
As the Traffic Load increases, so more nodes are being
engaged in accepting calls, resulting in utilization of free
resources, so in this region, the calls have to suffer an almost
steady delay due to unavailability of resources.
Reg 4: Decrementing Region:
As the previous accepted calls release their resources
after their bound time, so the availability of free nodes
increases.These results in increase in call acceptance rate
and hence delay decreases.
On comparing series 1 and series 2, we can see that in
saturated region the delay is more in series 2 where only
static selection of cluster head approach is used, than on
series 1 where combined static and dynamic selection of

But rest of the time the delay will be a normal delay as
discussed above:
DELAY (D) = [ {Log (n)*d} + [ {Log (n)-1}* k] ]
So when we are using the combined dynamic and static
approach rather than only static approach we only have to
incur Translation delay (TD), that to after every TR interval.
© 2013 ACEEE
DOI: 01.IJNS.4.1. 1160

47
Short Paper
ACEEE Int. J. on Network Security , Vol. 4, No. 1, July 2013
[2].

Subhajit Sadhu, Sushovon Maity ,Vivek Agarwal and P K
Guha Thakurta,”A New Cluster Based Approach on Load
Balancing Technique with Congestion Control Schema for
Mobile Networks”, IEEE MNCApps Conference, August
2012.
[3]. Saravut Yaipairoj and Fotios C.Harmantzis, “A Dynamic
Pricing Model for Data Services in GPRS Networks”,
Globecom Workshops, IEEE Communication Society, 2004
[4].
Sarah Kabahuma and Olabisi E. Falowo, “Analysis of
Network Operators’ Revenue with a Dynamic Pricing Model
Based on User Behaviour in NGWN Using JCAC”, SATNAC,
2010.
[5]. P.K. GuhaThakurta, Prothoma Sinha, Nilesh Mallick and
Subhansu Bandyopadhyay, “An Approach towards Reduction
of Routing Paths for Mobile Networks”, ICMOC, 2010.
[6]. Andrew McCallum, Kamal Nigam, Lyle H. Ungar, “Efficient
Clustering of High Dimensional Data Sets with Application
to Reference Matching”, 6 th ACM SIGKDD International
Conference on Knowledge discovery and Data Mining, 2000.
[7]. Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest,
and Clifford Stein “Introduction to Algorithms”, Third Edition
2010.

cluster head approach is used this is due to the absence of
WTD delay. Also if we closely watch the series 1, we can see
than, at some points the delay suddenly increases for very
minute period of time and this is due to Transition Delay
[TD] which appears after TR interval.
IV. CONCLUSION
In this model, cluster heads are being dynamically chosen,
so that even during heavy traffic hours, both call
transmissions and ORP computation can be carried out with
ease. When the cluster head is busy in transmitting calls
through it, a new least loaded node is chosen to be the new
cluster head. Hence, the efficiency of the model has been
improved with the reduction of delay due to least probable
backtracking and also by discarding the delay caused due to
busy cluster-head. So, by using combined static and dynamic
selection of cluster head approach the delay is considerable
reduced in saturated region compared to our previous
approach [2], where we have only used the static selection of
cluster head approach. The experimental result of series 1, 2
and 3 proves our point.
REFERENCES
[1].

P.K.Guha Thakurta and Subhansu Bandyopadhyay, “A New
Dynamic Pricing Scheme with Priority based Tree Generation
and Scheduling for Mobile Networks”, IEEE Advanced
Computing Conference, March 2009.

© 2013 ACEEE
DOI: 01.IJNS.4.1. 1160

48

More Related Content

What's hot

IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
A PROPOSAL TO IMPROVE SEP ROUTING PROTOCOL USING INSENSITIVE FUZZY C-MEANS IN...
A PROPOSAL TO IMPROVE SEP ROUTING PROTOCOL USING INSENSITIVE FUZZY C-MEANS IN...A PROPOSAL TO IMPROVE SEP ROUTING PROTOCOL USING INSENSITIVE FUZZY C-MEANS IN...
A PROPOSAL TO IMPROVE SEP ROUTING PROTOCOL USING INSENSITIVE FUZZY C-MEANS IN...IJCNCJournal
 
Fuzzy Optimized Metric for Adaptive Network Routing
Fuzzy Optimized Metric for Adaptive Network RoutingFuzzy Optimized Metric for Adaptive Network Routing
Fuzzy Optimized Metric for Adaptive Network RoutingCSCJournals
 
Dce a novel delay correlation
Dce a novel delay correlationDce a novel delay correlation
Dce a novel delay correlationijdpsjournal
 
RADIAL BASIS FUNCTION PROCESS NEURAL NETWORK TRAINING BASED ON GENERALIZED FR...
RADIAL BASIS FUNCTION PROCESS NEURAL NETWORK TRAINING BASED ON GENERALIZED FR...RADIAL BASIS FUNCTION PROCESS NEURAL NETWORK TRAINING BASED ON GENERALIZED FR...
RADIAL BASIS FUNCTION PROCESS NEURAL NETWORK TRAINING BASED ON GENERALIZED FR...cseij
 
P REDICTION F OR S HORT -T ERM T RAFFIC F LOW B ASED O N O PTIMIZED W...
P REDICTION  F OR  S HORT -T ERM  T RAFFIC  F LOW  B ASED  O N  O PTIMIZED  W...P REDICTION  F OR  S HORT -T ERM  T RAFFIC  F LOW  B ASED  O N  O PTIMIZED  W...
P REDICTION F OR S HORT -T ERM T RAFFIC F LOW B ASED O N O PTIMIZED W...ijcsit
 
MULTIUSER BER ANALYSIS OF CS-QCSK MODULATION SCHEME IN A CELLULAR SYSTEM
MULTIUSER BER ANALYSIS OF CS-QCSK MODULATION SCHEME IN A CELLULAR SYSTEM MULTIUSER BER ANALYSIS OF CS-QCSK MODULATION SCHEME IN A CELLULAR SYSTEM
MULTIUSER BER ANALYSIS OF CS-QCSK MODULATION SCHEME IN A CELLULAR SYSTEM ijwmn
 
13 9 sep17 22aug 8454 9914-1-ed edit septian
13 9 sep17 22aug 8454 9914-1-ed edit septian13 9 sep17 22aug 8454 9914-1-ed edit septian
13 9 sep17 22aug 8454 9914-1-ed edit septianIAESIJEECS
 
A PROGRESSIVE MESH METHOD FOR PHYSICAL SIMULATIONS USING LATTICE BOLTZMANN ME...
A PROGRESSIVE MESH METHOD FOR PHYSICAL SIMULATIONS USING LATTICE BOLTZMANN ME...A PROGRESSIVE MESH METHOD FOR PHYSICAL SIMULATIONS USING LATTICE BOLTZMANN ME...
A PROGRESSIVE MESH METHOD FOR PHYSICAL SIMULATIONS USING LATTICE BOLTZMANN ME...ijdpsjournal
 
Labeled generalized stochastic petri net Based approach for web services Comp...
Labeled generalized stochastic petri net Based approach for web services Comp...Labeled generalized stochastic petri net Based approach for web services Comp...
Labeled generalized stochastic petri net Based approach for web services Comp...ijcsit
 
A CLUSTER BASED STABLE ROUTING PROTOCOL USING BINARY PARTICLE SWARM OPTIMIZAT...
A CLUSTER BASED STABLE ROUTING PROTOCOL USING BINARY PARTICLE SWARM OPTIMIZAT...A CLUSTER BASED STABLE ROUTING PROTOCOL USING BINARY PARTICLE SWARM OPTIMIZAT...
A CLUSTER BASED STABLE ROUTING PROTOCOL USING BINARY PARTICLE SWARM OPTIMIZAT...ijmnct
 
Haqr the hierarchical ant based qos aware on demand routing for manets
Haqr the hierarchical ant based qos aware on demand routing for manetsHaqr the hierarchical ant based qos aware on demand routing for manets
Haqr the hierarchical ant based qos aware on demand routing for manetscsandit
 
Section based hex cell routing algorithm (sbhcr)
Section based hex cell routing algorithm (sbhcr)Section based hex cell routing algorithm (sbhcr)
Section based hex cell routing algorithm (sbhcr)IJCNCJournal
 
Routing in Wireless Mesh Networks: Two Soft Computing Based Approaches
Routing in Wireless Mesh Networks: Two Soft Computing Based ApproachesRouting in Wireless Mesh Networks: Two Soft Computing Based Approaches
Routing in Wireless Mesh Networks: Two Soft Computing Based Approachesijmnct
 
A Hybrid Method of CART and Artificial Neural Network for Short Term Load For...
A Hybrid Method of CART and Artificial Neural Network for Short Term Load For...A Hybrid Method of CART and Artificial Neural Network for Short Term Load For...
A Hybrid Method of CART and Artificial Neural Network for Short Term Load For...Salford Systems
 

What's hot (17)

IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
A PROPOSAL TO IMPROVE SEP ROUTING PROTOCOL USING INSENSITIVE FUZZY C-MEANS IN...
A PROPOSAL TO IMPROVE SEP ROUTING PROTOCOL USING INSENSITIVE FUZZY C-MEANS IN...A PROPOSAL TO IMPROVE SEP ROUTING PROTOCOL USING INSENSITIVE FUZZY C-MEANS IN...
A PROPOSAL TO IMPROVE SEP ROUTING PROTOCOL USING INSENSITIVE FUZZY C-MEANS IN...
 
Fuzzy Optimized Metric for Adaptive Network Routing
Fuzzy Optimized Metric for Adaptive Network RoutingFuzzy Optimized Metric for Adaptive Network Routing
Fuzzy Optimized Metric for Adaptive Network Routing
 
Dce a novel delay correlation
Dce a novel delay correlationDce a novel delay correlation
Dce a novel delay correlation
 
RADIAL BASIS FUNCTION PROCESS NEURAL NETWORK TRAINING BASED ON GENERALIZED FR...
RADIAL BASIS FUNCTION PROCESS NEURAL NETWORK TRAINING BASED ON GENERALIZED FR...RADIAL BASIS FUNCTION PROCESS NEURAL NETWORK TRAINING BASED ON GENERALIZED FR...
RADIAL BASIS FUNCTION PROCESS NEURAL NETWORK TRAINING BASED ON GENERALIZED FR...
 
Radial Basis Function
Radial Basis FunctionRadial Basis Function
Radial Basis Function
 
P REDICTION F OR S HORT -T ERM T RAFFIC F LOW B ASED O N O PTIMIZED W...
P REDICTION  F OR  S HORT -T ERM  T RAFFIC  F LOW  B ASED  O N  O PTIMIZED  W...P REDICTION  F OR  S HORT -T ERM  T RAFFIC  F LOW  B ASED  O N  O PTIMIZED  W...
P REDICTION F OR S HORT -T ERM T RAFFIC F LOW B ASED O N O PTIMIZED W...
 
MULTIUSER BER ANALYSIS OF CS-QCSK MODULATION SCHEME IN A CELLULAR SYSTEM
MULTIUSER BER ANALYSIS OF CS-QCSK MODULATION SCHEME IN A CELLULAR SYSTEM MULTIUSER BER ANALYSIS OF CS-QCSK MODULATION SCHEME IN A CELLULAR SYSTEM
MULTIUSER BER ANALYSIS OF CS-QCSK MODULATION SCHEME IN A CELLULAR SYSTEM
 
13 9 sep17 22aug 8454 9914-1-ed edit septian
13 9 sep17 22aug 8454 9914-1-ed edit septian13 9 sep17 22aug 8454 9914-1-ed edit septian
13 9 sep17 22aug 8454 9914-1-ed edit septian
 
A PROGRESSIVE MESH METHOD FOR PHYSICAL SIMULATIONS USING LATTICE BOLTZMANN ME...
A PROGRESSIVE MESH METHOD FOR PHYSICAL SIMULATIONS USING LATTICE BOLTZMANN ME...A PROGRESSIVE MESH METHOD FOR PHYSICAL SIMULATIONS USING LATTICE BOLTZMANN ME...
A PROGRESSIVE MESH METHOD FOR PHYSICAL SIMULATIONS USING LATTICE BOLTZMANN ME...
 
Labeled generalized stochastic petri net Based approach for web services Comp...
Labeled generalized stochastic petri net Based approach for web services Comp...Labeled generalized stochastic petri net Based approach for web services Comp...
Labeled generalized stochastic petri net Based approach for web services Comp...
 
A CLUSTER BASED STABLE ROUTING PROTOCOL USING BINARY PARTICLE SWARM OPTIMIZAT...
A CLUSTER BASED STABLE ROUTING PROTOCOL USING BINARY PARTICLE SWARM OPTIMIZAT...A CLUSTER BASED STABLE ROUTING PROTOCOL USING BINARY PARTICLE SWARM OPTIMIZAT...
A CLUSTER BASED STABLE ROUTING PROTOCOL USING BINARY PARTICLE SWARM OPTIMIZAT...
 
Haqr the hierarchical ant based qos aware on demand routing for manets
Haqr the hierarchical ant based qos aware on demand routing for manetsHaqr the hierarchical ant based qos aware on demand routing for manets
Haqr the hierarchical ant based qos aware on demand routing for manets
 
Section based hex cell routing algorithm (sbhcr)
Section based hex cell routing algorithm (sbhcr)Section based hex cell routing algorithm (sbhcr)
Section based hex cell routing algorithm (sbhcr)
 
call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...
 
Routing in Wireless Mesh Networks: Two Soft Computing Based Approaches
Routing in Wireless Mesh Networks: Two Soft Computing Based ApproachesRouting in Wireless Mesh Networks: Two Soft Computing Based Approaches
Routing in Wireless Mesh Networks: Two Soft Computing Based Approaches
 
A Hybrid Method of CART and Artificial Neural Network for Short Term Load For...
A Hybrid Method of CART and Artificial Neural Network for Short Term Load For...A Hybrid Method of CART and Artificial Neural Network for Short Term Load For...
A Hybrid Method of CART and Artificial Neural Network for Short Term Load For...
 

Viewers also liked

Študij mehanizma preprečevanja retrotranspozicije s proteini APOBEC3
Študij mehanizma preprečevanja retrotranspozicije s proteini APOBEC3Študij mehanizma preprečevanja retrotranspozicije s proteini APOBEC3
Študij mehanizma preprečevanja retrotranspozicije s proteini APOBEC3Matja? De?elak
 
Documento word pestaña diseño de pagina
Documento word pestaña diseño de paginaDocumento word pestaña diseño de pagina
Documento word pestaña diseño de pagina15309292
 
Documento word copia seguridad ymacros
Documento word   copia seguridad ymacrosDocumento word   copia seguridad ymacros
Documento word copia seguridad ymacros15309292
 
INTERIOR DESIGN – Collection of Photography
INTERIOR DESIGN – Collection of PhotographyINTERIOR DESIGN – Collection of Photography
INTERIOR DESIGN – Collection of PhotographyJuerg Wey
 
QM0012- STATISTICAL PROCESS CONTROL AND PROCESS CAPABILITY
QM0012- STATISTICAL PROCESS CONTROL AND PROCESS CAPABILITYQM0012- STATISTICAL PROCESS CONTROL AND PROCESS CAPABILITY
QM0012- STATISTICAL PROCESS CONTROL AND PROCESS CAPABILITYsmumbahelp
 
Elastomeric & new materials, recycling and biodegradation of materials /certi...
Elastomeric & new materials, recycling and biodegradation of materials /certi...Elastomeric & new materials, recycling and biodegradation of materials /certi...
Elastomeric & new materials, recycling and biodegradation of materials /certi...Indian dental academy
 
أرقام جلوس الفرقه الرابعه انتساب باقى للإعادة
أرقام جلوس الفرقه الرابعه انتساب باقى للإعادةأرقام جلوس الفرقه الرابعه انتساب باقى للإعادة
أرقام جلوس الفرقه الرابعه انتساب باقى للإعادةHassan Ibrahim
 

Viewers also liked (16)

Cloud computing
Cloud computingCloud computing
Cloud computing
 
Študij mehanizma preprečevanja retrotranspozicije s proteini APOBEC3
Študij mehanizma preprečevanja retrotranspozicije s proteini APOBEC3Študij mehanizma preprečevanja retrotranspozicije s proteini APOBEC3
Študij mehanizma preprečevanja retrotranspozicije s proteini APOBEC3
 
Askep ca.nasoparing
Askep ca.nasoparingAskep ca.nasoparing
Askep ca.nasoparing
 
tommy hilfiger tas
tommy hilfiger tastommy hilfiger tas
tommy hilfiger tas
 
Documento word pestaña diseño de pagina
Documento word pestaña diseño de paginaDocumento word pestaña diseño de pagina
Documento word pestaña diseño de pagina
 
Askep trauma dada lia & ian
Askep trauma dada lia &  ianAskep trauma dada lia &  ian
Askep trauma dada lia & ian
 
project
projectproject
project
 
Tema 3
Tema 3Tema 3
Tema 3
 
Documento word copia seguridad ymacros
Documento word   copia seguridad ymacrosDocumento word   copia seguridad ymacros
Documento word copia seguridad ymacros
 
INTERIOR DESIGN – Collection of Photography
INTERIOR DESIGN – Collection of PhotographyINTERIOR DESIGN – Collection of Photography
INTERIOR DESIGN – Collection of Photography
 
Askep pada pasien ppok
Askep pada pasien ppokAskep pada pasien ppok
Askep pada pasien ppok
 
QM0012- STATISTICAL PROCESS CONTROL AND PROCESS CAPABILITY
QM0012- STATISTICAL PROCESS CONTROL AND PROCESS CAPABILITYQM0012- STATISTICAL PROCESS CONTROL AND PROCESS CAPABILITY
QM0012- STATISTICAL PROCESS CONTROL AND PROCESS CAPABILITY
 
Elastomeric & new materials, recycling and biodegradation of materials /certi...
Elastomeric & new materials, recycling and biodegradation of materials /certi...Elastomeric & new materials, recycling and biodegradation of materials /certi...
Elastomeric & new materials, recycling and biodegradation of materials /certi...
 
Asuhan keperawatan pada klien dengan
Asuhan keperawatan pada klien denganAsuhan keperawatan pada klien dengan
Asuhan keperawatan pada klien dengan
 
أرقام جلوس الفرقه الرابعه انتساب باقى للإعادة
أرقام جلوس الفرقه الرابعه انتساب باقى للإعادةأرقام جلوس الفرقه الرابعه انتساب باقى للإعادة
أرقام جلوس الفرقه الرابعه انتساب باقى للإعادة
 
Copd
Copd Copd
Copd
 

Similar to Congestion Control through Load Balancing Technique for Mobile Networks: A Cluster based Approach

Improved Performance of LEACH for WSN Using Precise Number of Cluster-Head an...
Improved Performance of LEACH for WSN Using Precise Number of Cluster-Head an...Improved Performance of LEACH for WSN Using Precise Number of Cluster-Head an...
Improved Performance of LEACH for WSN Using Precise Number of Cluster-Head an...ijsrd.com
 
A study of localized algorithm for self organized wireless sensor network and...
A study of localized algorithm for self organized wireless sensor network and...A study of localized algorithm for self organized wireless sensor network and...
A study of localized algorithm for self organized wireless sensor network and...eSAT Journals
 
Enhanced Leach Protocol
Enhanced Leach ProtocolEnhanced Leach Protocol
Enhanced Leach Protocolijceronline
 
HAQR: THE HIERARCHICAL ANT BASED QOS AWARE ON-DEMAND ROUTING FOR MANETS
HAQR: THE HIERARCHICAL ANT BASED QOS AWARE ON-DEMAND ROUTING FOR MANETSHAQR: THE HIERARCHICAL ANT BASED QOS AWARE ON-DEMAND ROUTING FOR MANETS
HAQR: THE HIERARCHICAL ANT BASED QOS AWARE ON-DEMAND ROUTING FOR MANETScscpconf
 
Maximizing Network Lifetime by Using Smart Cluster Head Selection
Maximizing Network Lifetime by Using Smart Cluster Head SelectionMaximizing Network Lifetime by Using Smart Cluster Head Selection
Maximizing Network Lifetime by Using Smart Cluster Head Selectioniosrjce
 
9.distributive energy efficient adaptive clustering protocol for wireless sen...
9.distributive energy efficient adaptive clustering protocol for wireless sen...9.distributive energy efficient adaptive clustering protocol for wireless sen...
9.distributive energy efficient adaptive clustering protocol for wireless sen...Chính Cao
 
A Survey Paper on Cluster Head Selection Techniques for Mobile Ad-Hoc Network
A Survey Paper on Cluster Head Selection Techniques for Mobile Ad-Hoc NetworkA Survey Paper on Cluster Head Selection Techniques for Mobile Ad-Hoc Network
A Survey Paper on Cluster Head Selection Techniques for Mobile Ad-Hoc NetworkIOSR Journals
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...Editor IJCATR
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...Editor IJCATR
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...Editor IJCATR
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...Editor IJCATR
 
SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...
SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...
SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...IJCSEA Journal
 
Implementation of energy efficient coverage aware routing protocol for wirele...
Implementation of energy efficient coverage aware routing protocol for wirele...Implementation of energy efficient coverage aware routing protocol for wirele...
Implementation of energy efficient coverage aware routing protocol for wirele...ijfcstjournal
 
Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...
Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...
Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...IOSR Journals
 
Distance based cluster head section in sensor networks for efficient energy u...
Distance based cluster head section in sensor networks for efficient energy u...Distance based cluster head section in sensor networks for efficient energy u...
Distance based cluster head section in sensor networks for efficient energy u...IAEME Publication
 

Similar to Congestion Control through Load Balancing Technique for Mobile Networks: A Cluster based Approach (20)

J1803056876
J1803056876J1803056876
J1803056876
 
Improved Performance of LEACH for WSN Using Precise Number of Cluster-Head an...
Improved Performance of LEACH for WSN Using Precise Number of Cluster-Head an...Improved Performance of LEACH for WSN Using Precise Number of Cluster-Head an...
Improved Performance of LEACH for WSN Using Precise Number of Cluster-Head an...
 
A study of localized algorithm for self organized wireless sensor network and...
A study of localized algorithm for self organized wireless sensor network and...A study of localized algorithm for self organized wireless sensor network and...
A study of localized algorithm for self organized wireless sensor network and...
 
E035425030
E035425030E035425030
E035425030
 
Enhanced Leach Protocol
Enhanced Leach ProtocolEnhanced Leach Protocol
Enhanced Leach Protocol
 
HAQR: THE HIERARCHICAL ANT BASED QOS AWARE ON-DEMAND ROUTING FOR MANETS
HAQR: THE HIERARCHICAL ANT BASED QOS AWARE ON-DEMAND ROUTING FOR MANETSHAQR: THE HIERARCHICAL ANT BASED QOS AWARE ON-DEMAND ROUTING FOR MANETS
HAQR: THE HIERARCHICAL ANT BASED QOS AWARE ON-DEMAND ROUTING FOR MANETS
 
O0106395100
O0106395100O0106395100
O0106395100
 
Maximizing Network Lifetime by Using Smart Cluster Head Selection
Maximizing Network Lifetime by Using Smart Cluster Head SelectionMaximizing Network Lifetime by Using Smart Cluster Head Selection
Maximizing Network Lifetime by Using Smart Cluster Head Selection
 
9.distributive energy efficient adaptive clustering protocol for wireless sen...
9.distributive energy efficient adaptive clustering protocol for wireless sen...9.distributive energy efficient adaptive clustering protocol for wireless sen...
9.distributive energy efficient adaptive clustering protocol for wireless sen...
 
F017123439
F017123439F017123439
F017123439
 
A Survey Paper on Cluster Head Selection Techniques for Mobile Ad-Hoc Network
A Survey Paper on Cluster Head Selection Techniques for Mobile Ad-Hoc NetworkA Survey Paper on Cluster Head Selection Techniques for Mobile Ad-Hoc Network
A Survey Paper on Cluster Head Selection Techniques for Mobile Ad-Hoc Network
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
 
SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...
SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...
SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...
 
D031202018023
D031202018023D031202018023
D031202018023
 
Implementation of energy efficient coverage aware routing protocol for wirele...
Implementation of energy efficient coverage aware routing protocol for wirele...Implementation of energy efficient coverage aware routing protocol for wirele...
Implementation of energy efficient coverage aware routing protocol for wirele...
 
Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...
Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...
Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...
 
Distance based cluster head section in sensor networks for efficient energy u...
Distance based cluster head section in sensor networks for efficient energy u...Distance based cluster head section in sensor networks for efficient energy u...
Distance based cluster head section in sensor networks for efficient energy u...
 

More from IDES Editor

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A ReviewIDES Editor
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...IDES Editor
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...IDES Editor
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...IDES Editor
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCIDES Editor
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...IDES Editor
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingIDES Editor
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...IDES Editor
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsIDES Editor
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...IDES Editor
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...IDES Editor
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkIDES Editor
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetIDES Editor
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’sIDES Editor
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...IDES Editor
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance AnalysisIDES Editor
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesIDES Editor
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...IDES Editor
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...IDES Editor
 

More from IDES Editor (20)

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A Review
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFC
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive Thresholds
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability Framework
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’s
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance Analysis
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
 

Recently uploaded

CLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptxCLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptxAnupam32727
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - I-LEARN SMART WORLD - CẢ NĂM - CÓ FILE NGHE (BẢN...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - I-LEARN SMART WORLD - CẢ NĂM - CÓ FILE NGHE (BẢN...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - I-LEARN SMART WORLD - CẢ NĂM - CÓ FILE NGHE (BẢN...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - I-LEARN SMART WORLD - CẢ NĂM - CÓ FILE NGHE (BẢN...Nguyen Thanh Tu Collection
 
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...DhatriParmar
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...Nguyen Thanh Tu Collection
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Association for Project Management
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxSayali Powar
 
Comparative Literature in India by Amiya dev.pptx
Comparative Literature in India by Amiya dev.pptxComparative Literature in India by Amiya dev.pptx
Comparative Literature in India by Amiya dev.pptxAvaniJani1
 
How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17Celine George
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfPrerana Jadhav
 
Satirical Depths - A Study of Gabriel Okara's Poem - 'You Laughed and Laughed...
Satirical Depths - A Study of Gabriel Okara's Poem - 'You Laughed and Laughed...Satirical Depths - A Study of Gabriel Okara's Poem - 'You Laughed and Laughed...
Satirical Depths - A Study of Gabriel Okara's Poem - 'You Laughed and Laughed...HetalPathak10
 
Sulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their usesSulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their usesVijayaLaxmi84
 
ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6Vanessa Camilleri
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationdeepaannamalai16
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdfMr Bounab Samir
 

Recently uploaded (20)

CLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptxCLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - I-LEARN SMART WORLD - CẢ NĂM - CÓ FILE NGHE (BẢN...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - I-LEARN SMART WORLD - CẢ NĂM - CÓ FILE NGHE (BẢN...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - I-LEARN SMART WORLD - CẢ NĂM - CÓ FILE NGHE (BẢN...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - I-LEARN SMART WORLD - CẢ NĂM - CÓ FILE NGHE (BẢN...
 
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
 
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of EngineeringFaculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
 
Mattingly "AI & Prompt Design" - Introduction to Machine Learning"
Mattingly "AI & Prompt Design" - Introduction to Machine Learning"Mattingly "AI & Prompt Design" - Introduction to Machine Learning"
Mattingly "AI & Prompt Design" - Introduction to Machine Learning"
 
Comparative Literature in India by Amiya dev.pptx
Comparative Literature in India by Amiya dev.pptxComparative Literature in India by Amiya dev.pptx
Comparative Literature in India by Amiya dev.pptx
 
How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdf
 
Satirical Depths - A Study of Gabriel Okara's Poem - 'You Laughed and Laughed...
Satirical Depths - A Study of Gabriel Okara's Poem - 'You Laughed and Laughed...Satirical Depths - A Study of Gabriel Okara's Poem - 'You Laughed and Laughed...
Satirical Depths - A Study of Gabriel Okara's Poem - 'You Laughed and Laughed...
 
Sulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their usesSulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their uses
 
ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6
 
Plagiarism,forms,understand about plagiarism,avoid plagiarism,key significanc...
Plagiarism,forms,understand about plagiarism,avoid plagiarism,key significanc...Plagiarism,forms,understand about plagiarism,avoid plagiarism,key significanc...
Plagiarism,forms,understand about plagiarism,avoid plagiarism,key significanc...
 
Paradigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTAParadigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTA
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentation
 
Introduction to Research ,Need for research, Need for design of Experiments, ...
Introduction to Research ,Need for research, Need for design of Experiments, ...Introduction to Research ,Need for research, Need for design of Experiments, ...
Introduction to Research ,Need for research, Need for design of Experiments, ...
 
Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdf
 

Congestion Control through Load Balancing Technique for Mobile Networks: A Cluster based Approach

  • 1. Short Paper ACEEE Int. J. on Network Security , Vol. 4, No. 1, July 2013 Congestion Control through Load Balancing Technique for Mobile Networks: A Cluster based Approach Subhajit Sadhu#1, Sushovon Maity#2, # 1 Department of CSE, NIT, Durgapur, WB-713209, INDIA subhajitsadhu.nitdgp@gmail.com, 2sushovon.nit@gmail.com Abstract — The Optimal Routing Path (ORP) for mobile cellular networks is proposed in this paper with the introduction of cluster-based approach. Here an improved dynamic selection procedure is used to elect cluster head. The cluster head is only responsible for the computation of least congested path. Hence the delay is reduced with the significant reduction on the number of backtrackings. delay to a larger extent. In this paper, the previous work in [1, 2, 4] has been extended with improved dynamic selection procedure to, select the appropriate node as autonomous cluster-head, in order to distribute the computation overhead equally among that particular subset of nodes belonging to that cluster. The cluster head is only involved in the computation of Optimal routing path (ORP). Hence the objective of this work is to search the ORP through intermediate cellular clusters with least backtracking, and also to change the autonomous cluster-head dynamically, to distribute the load of computation. The paper is organized as follows: section 2 describes the proposed model along with its working principles. The experimental results have been discussed in section 3.Finally, section 4 contains the conclusion. Keywords - clustering, load-balancing, congestion control, computation optimization, delay reduction. I. INTRODUCTION Allocation of resources and optimization of its usage are the major concerns in the field of mobile networking due to the viral increase of mobile phone usage. Sometimes calls have to be blocked or dropped due to unavailability of resources. Quality of Services (QoS) may also degrade, leading to customer dissatisfaction. Therefore, minimizing the number of calls blocked per unit time, along with providing better quality of services (QoS) with optimum delay, is being considered as one of the primary focus of research. Hence different resource allocation schemes have been proposed for better user services and system utilization [1]. One of those schemes is based on the concept of clustering of the network nodes [2]. It tries to minimize the total computational overhead and delay by allowing only the cluster-heads to compute the least congested optimal routing path through that particular cluster; thereby ensuring not only congestion control but also load balancing. But in this approach, the cluster head becomes overly loaded with computation of the Optimal Routing Path (ORP) and hence thereby, performance may decrease and delay may increase at the time of heavy traffics. Another one of those scheme based on the concept of dynamic pricing [2] has been proposed which introduces variant price for calls in accordance with variation of demands of the users, but it does not elucidate the problem caused by computational overhead. Effective joint Call Admission Control (JCAC) [3] algorithms have been proposed to ensure optimal QoS. The reduction of delay was beyond the scope of this work. Another dynamic pricing scheme introduced as priority based tree generation model (PTGM) in [1] proposing the use of a fixed MOBILE TERMINAL (MT) acting as a mobile switching centre (MSC). Further, the improvement on foundation of optimal path is needed. The reduction of routing path was dealt with the introduction of certain imperative rules based on the radii oriented topology of nodes and well-defined priority factors [4]. The probable chances of backtracking increased the © 2013 ACEEE DOI: 01.IJNS.4.1.1160 II. PROPOSED MODEL The model addressed in this work is based on the cellular layout of mobile network shown in Fig.1. Fig. 1: Cellular layout of mobile networks The calls are forwarded through the MT [1]. The proposed model is based on the functional activities described in the following. A. Clustering Model Firstly the nodes are assembled in the form of a graph. The nodes are grouped into various levels, starting from level 1 where, the MT [1] is placed. Now the nodes are grouped into various clusters[6]. The condition for cluster formation is discussed later. The transmission of signal from MT to destination node takes place from cluster to cluster. 43
  • 2. Short Paper ACEEE Int. J. on Network Security , Vol. 4, No. 1, July 2013 This algorithm is verified with the following Fig. 2. Let the unique id of the destination node be duid . Now the call is forwarded if 5:N/2-4<=duid<=5:N/2+4 is satisfied else blocked. Introduction of Index Structure: During the call transmission between nodes, each cluster keeps on computing the least congested ORP through it, towards its upper radius. Here, we are not able to determine whether this computed path actually leads to the destination node. If not then it would cause huge futile computation. Subsequently it requires back-tracking which would increase computational complexity and delay. Hence an Index structure has been introduced to reduce backtracking. The method of indexing is described below:We index the nodes of the graph in such a way that the index number of the left child is less than that of its parent node and the right child has the index number greater than the parent. Thus intermediate nodes are given indices which lie between these extreme child indices. So, the cluster head forwards the call, only if the destination index number lies between those two extremities. Otherwise, the call is blocked through that specific node. Some cases might arise, where the two different nodes belonging to different radii are assigned with same indices. To overcome such ambiguity we couple radius number (radi) with node index (Ii) ,and this conjugation serves as the unique identification (uid) for each node. This method is described by the following algorithm: Initialize (MT,n,r) { /* Pre_Computation */ for (i=1 to n) { SiUm; // Um stands for status “unmarked” Ai Φ; // Acceptance Rate of (i); Ri Φ; //Rejection Rate of (i); Li Φ; // Load of (i); } IMT= n/2; Ident_no(MT,n/2,1); } /*assigning unique identification number to each node*/ Ident_no(node,m,r) { if (node==NULL) Return; if (lc_node!=NULL) Ilc_nodem-1; radlc_noder+1; Ident_no (lc_node, m-1,r+1); if (rc_node!=NULL) Irc_nodem+1; radlc_noder+1; Ident_no (rc_node, m+1, r+1); } /*composition of {radi, Ii} serves as the uid */ Extremity_indexing(n,r,k) { /* Extremity Calculation */ for (i=1 to k) E_Cal(ni,ni,ni->lc,ni->rc); E_Cal(node,temp,temp1,temp2) { If (temp! =NULL) { temp1node->lc; temp2node->rc; Call E_Call(node,node->lc,templ,temp2); node->LeftExtremeI templ; Call E_Call(node,node->rc,templ,temp2); node->RightExtremeI temp2; } } © 2013 ACEEE DOI: 01.IJNS.4.1.1160 Fig.2: uid assignment to nodes Cluster Formation The number of nodes increases exponentially with the increment of radii. The cluster size is dependent on the number of nodes at the specific level. To maintain a trade off between the number of clusters and the cluster cardinality, the cluster size is considered as variable and is considered to be a function of the respective level number. The size is defined as: (2l + 1) or (2l – 1) depending on the remaining number of nodes where l=level number. We have chosen (2l + 1) or (2l – 1) such size cluster because the number of nodes in a complete binary tree with height h is 2h -1[7]. Grouping of nodes into various clusters Obviously, the number of nodes in (n+1) level is greater than that in nth level. Here, one-to-many computation requires less number of computations than one-to-one in model [5]. Static Selection of cluster head (Ci) In each cluster[6] a node is selected as the cluster head which is the lowest index from the lower radius. This is used to maintain uniformity Fig. 3: Representation of cluster formation The cluster formation based on the discussed algorithm is shown in Fig. 3. Dynamic Selection of cluster head (Ci) The cluster head besides taking decisions regarding call transmission, also itself takes part in call transmission. It may sometimes happen that the cluster head may become too busy in call transmission, if its position lies on an unavoidable busy route. In this situation the call transmission decisions 44
  • 3. Short Paper ACEEE Int. J. on Network Security , Vol. 4, No. 1, July 2013 may get pending, resulting in delay in transmission, as the cluster head is in non- pre-emptive call transmission through itself. The solution is instead of keeping the cluster head static, we have to dynamically change the cluster head at runtime when required. Under this, any node in a cluster may be assigned the responsibility of cluster head, if it happens to be the idlest node of the cluster at that point of time. A Threshold Load value (LT) will be calculated for each cluster, which is defined as the ratio of, summation of load of all notes in that cluster, to that of the size of the cluster. LTk = “ (Li) / (Sk) LTk = “ (Ai-Ri) / (Sk) Where, Li is the load of node i, Sk is the size of Kth cluster and LTk is the Threshold Load value for Kth cluster. Whenever the load of the cluster head (Lk) will be more than Threshold Load value of the cluster (LTk), then a change of cluster head procedure will be initiated. So, when (Lk>LTk ), the node in that cluster with least load value will be made the new cluster head. Ck = Node with Min {Li} in Kth cluster. Where Ck is the new cluster head of Kth cluster and Li is the load of ith node in Kth Cluster. This shifting of cluster head will be accompanied by shifting of the entire data set containing information about that cluster from the previous cluster head to presently selected cluster head. Also the priorities of the nodes need to be swapped between the current and the previous cluster head, in order to keep the current cluster head free as much as possible. So the new priorities( ) will be: = 1/α i.e. priority for previous cluster head = α i.e. priority for current cluster head, Where, 0 <= α <= 1 (α: constant) & is the priority of the nodes. (Discussed in section 2.3) Since under this procedure any node in a cluster can be a cluster head, so an array data structure Cluster_Head[i ] is used to store the cluster head index, to keep a track of all the cluster heads. The Cluster_Head[i], will store the index of cluster head of the ith cluster. Thus the shifting of cluster head will require modifying this data also. This entire procedure of calculating the total load of the cluster and swapping the cluster head if required will take place in each and every cluster from time to time after a certain timer interrupt TR (constant). So, initially the cluster head will be statically selected and later during runtime the cluster head may change depending upon network traffic (load). This method is described by the following Pseudo Code: Dynamic_Cluster_Selection(Cluster i) { set Li=0; for (j=1 to last node in ith cluster) { Li+=(Aj-Rj); //cluster load summation } LTi =(Li / (Si); //where, Si is size of cluster i, // LTi is the Threshold Load value for ith cluster. Ci= Cluster_Head[i]; // cluster head of ith cluster © 2013 ACEEE DOI: 01.IJNS.4.1.1160 if (Load (Ci) < LTi) { //load on current cluster head is less than threshold load return; // No change in cluster head is required } else //load on current cluster head is greater than threshold { //change in cluster head min= Load (Ci); node=i; for (j=1 to last node in ith cluster) { if (Lj<min) { Min= Lj; Node=j; } } swap_priority(Ci,j); // swapping priorities of nodes Ci & j TransferOfClusterData (node i  node j); Cluster_Head[i]=j; // cluster head of ith cluster  jth node } return; } B. Function of the cluster head The cluster head is an autonomous node which keeps a track of detailed information of each and every node belonging to that particular cluster. Each node has the following information embedded in its structure: (a)Call Acceptance Rate (Ai): no of calls accepted by node ni per unit time.(b)Call Rejection Rate (Ri): no of calls dropped by node ni per unit time.(c)Priority (÷i): Priority of the node (defined later). (d)Left Extremity (Lei): Left Extreme node reachable form node i. (e) Right Extremity (Rei): Right Extreme node reachable form node i, Unique id (uid), Radius (radi) and Load (Li) =Ai -Ri. Besides, the cluster head keeps the information on connectivity of the clustered network. The entire computation of candidate ORPs and thereby selecting the optimum one is carried out by the cluster-head only. So cluster head is solely responsible for transmitting the incoming request from lower radius to the appropriate node in higher radius C. Priority of the nodes The main computations of candidate ORP are being carried out explicitly by the cluster heads. So it is imperative to make the cluster head less burdened that is to make sure that less number of calls physically passes through cluster heads only. In order to implement this, we introduce priority among the nodes belonging to a cluster, so that low priority nodes (nodes other than heads) transmit calls. Whereas high priority nodes (cluster heads) are employed to computation mainly. The priority of a node is defined as follows:= 1/á for nodes other than cluster head = á for cluster head, where 0 <= á <= 1 (á: constant) The desirable performance can be achieved by assigning appropriate value to á. For high transmission á should be set near to 1, for steady performance á should be set near to 0.5 45
  • 4. Short Paper ACEEE Int. J. on Network Security , Vol. 4, No. 1, July 2013 Ai++; Return (i); } Else Return (-1); } and for restricted use á should be set near to 0. D. Load balancing by cluster head Whenever a call request arrives at a node, the corresponding cluster head computes the cost of congestion for each possible path and to choose the least congested one. The Cost of Congestion (CoC) of the Routing path (£) is expressed as: £= 1/ (Φ) Where, Φ= (Load of node) * (Priority of node) = L* ; = (A-R) * ; Therefore, ORP= min {£i} for all i. F. Link state routing protocol In each cluster the cluster head keeps the track of different information of the nodes in the cluster discussed previously. As the transmission continues, the acceptance and rejection of the nodes keep on changing depending on traffic. The priorities of the nodes may also be changed explicitly due to changing demand or due to swapping to cluster head. The updated information has to be transmitted to every cluster head of the network which will then update the information locally among the nodes in that cluster. So the base cluster head containing the MT is provided with updated link state packet (ULSP) which keeps this update information. This LSP gets flooded to all the neighbouring cluster heads in higher radius except the one from which it has received. The cluster head keeps this LSP if it’s the updated version of the previous LSP else it keeps the previous one by checking the reference number associated with each LSP. This flooding of LSP will take place after a certain time interval (tm).So the flooding stops when every cluster head retains the updated LSP. E.Call transmission procedure Initially the call request comes to the MT. The cluster head (Ci ) to which MT belongs reads the uid of the destination node. It then reads the Rei and Lei of MT and if Lei<=uid<=Rei then computation proceeds else the call is dropped instantly by that cluster head. If the above said criterion is satisfied then least cost ORP is calculated by the cluster head in the following way: First all the candidate paths from the lower radius (radi), to the immediate higher radius (radi +1) are computed, which proceeds in the direction of the destination. Then the cost of each path is computed according to the previous discussion. £i =1/ [(Ai-Ri) * i] Here, i denote the node in radius (radi+ 1) adjacent to MT node present in the same cluster Ci. The cluster head Ci selects the £i with least cost and forwards the incoming request from MT. This process continues until the ultimate destination node is reached or unless the call gets blocked by any cluster head. This procedure is described by the following algorithm. Algorithm: /* Selection of ORP */ Path_Selection (MT, destination_node) { Source_nodeßMT; Countß0; Set int_node ! 0; While (destination_node!=int_node or Count<=Max) { CheadßCluster_head of Source_node; Flagßforwarding (Chead,Source_node,destination_node); If (Flag=-1) { Block_Request(); break; } Int_node=Flag; } } Forwarding (Chead, Source_node, destination_node) { If (Le Source_node <= destination_node <= Re Source_node) { Max=0; For (all nodes i in next radius in that cluster adjacent to Source_node) Cost = (Ai-Ri)* ÷i; If (max<Cost) { Max=Cost; Node =i; } If (Max==0) Return -1; © 2013 ACEEE DOI: 01.IJNS.4.1. 1160 G. Delay Computation In order to compare the performance and speed of the proposed model with those of the previous model, we need to compute the overall delay while transmission through MT to destination node. The overall delay is a sum of two types of delay. These are:(a)Propagation Delay: Delay incurred due to traversal of the physical topology. So the parameter on which propagation delay depends is the number of physical hops traversed. Let the number of nodes from MT to destination node be n. So the total number of hops traversed is log(n). Hence Propagation Delay is (h*d) where d is propagation delay per edge. (b) Computation Delay: Delay incurred due to computation analysis by the cluster head. Hence Computation delay is (h*k) where k is computation delay per node. Hence, overall delay: Propagation Delay + Computation Delay. DELAY (D) = [ {Log (n)*d} + [ {Log (n)-1}* k] ] Delay incurred when the cluster-head remains static: As discussed in section 2.1.5 when the cluster head becomes busy in call transmission, the computation and decisions to be taken remain pending as long as the cluster head is busy with its transmission. This will lead to an additional delay which can be termed as Waiting Time Delay (WTD) and can be defined as follows: WTD=f(Li,Tt) Where f () is a variable function of Li and Tt and will vary from network to network. 46
  • 5. Short Paper ACEEE Int. J. on Network Security , Vol. 4, No. 1, July 2013 Fig. 4: Time Delay Vs Traffic Load Li=It is the load on that particular cluster head and can be formulated as Ai-Ri Tt =Unit of time the cluster head is occupied with call transmission only and not computation. So while using only static cluster-head, our overall delay equation will become: DELAY (D) = {Log (n)*d} + {Log (n)-1}* k + WTD DELAY (D) = {Log (n)*d} + {Log (n)-1}* k + f (Li,Tt)- - (1) The main problem here is that the WTD delay completely depends on network traffic and we have no control over it. It may happen that the cluster head may remain busy for greater time period and may increase the delay for indefinite period of time. Delay reduction on dynamically cluster head approach: When dynamic approach is used along with static approach, the WTD delay will disappear, because when the cluster head becomes busy, the idlest node in the cluster is made the cluster head. But this transition of cluster head entails selection of the least loaded node and also transferring the entire set of information of the cluster from previous to current cluster head. So, all these tasks will lead a new type of delay which can be termed as Transition Delay [TD] and can be defined as: TD=f (|C|, Li) where, |C|=cardinality of that cluster and Li is the load of the ith cluster. But this delay will only happen after TR time interval, when this dynamic procedure will work. So, our new delay equation after every TR time interval will be: DELAY (D) = {Log (n)*d} + {Log (n)-1}* k +TD DELAY (D) = {Log (n)*d} + {Log (n)-1}* k + f (|C|) —- (2) But the indefinite Waiting Time Delay (WTD) is completely removed. As a result the delay reduces considerably when the network becomes busy or saturated. III. EXPERIMENTAL RESULTS: The results of the proposed model have been plotted in a graph (series 1) as shown in Fig 4. Here, X-axis represents the Traffic load in terms of cumulative calls/second and the Y-axis represents the corresponding time delay (µs).It has also been compared with the results of the previous two models [2] and [4] which have been plotted in series 2 and series 3 respectively. The plot can be subdivide into four regions as shown in Fig 4.These regions are described as below: Reg 1: Region of Dormancy: It’s the pre-computation period so delay is more in series 1 and 2, compared to series 3, as the calls are made to wait till pre-computation is over completely. Reg 2: Incremental Region: As the pre-computation is already done, so the calls are accepted by the free nodes at a rate faster in series 1 and 2 than the previous model(series 3). Reg 3: Saturation Region: As the Traffic Load increases, so more nodes are being engaged in accepting calls, resulting in utilization of free resources, so in this region, the calls have to suffer an almost steady delay due to unavailability of resources. Reg 4: Decrementing Region: As the previous accepted calls release their resources after their bound time, so the availability of free nodes increases.These results in increase in call acceptance rate and hence delay decreases. On comparing series 1 and series 2, we can see that in saturated region the delay is more in series 2 where only static selection of cluster head approach is used, than on series 1 where combined static and dynamic selection of But rest of the time the delay will be a normal delay as discussed above: DELAY (D) = [ {Log (n)*d} + [ {Log (n)-1}* k] ] So when we are using the combined dynamic and static approach rather than only static approach we only have to incur Translation delay (TD), that to after every TR interval. © 2013 ACEEE DOI: 01.IJNS.4.1. 1160 47
  • 6. Short Paper ACEEE Int. J. on Network Security , Vol. 4, No. 1, July 2013 [2]. Subhajit Sadhu, Sushovon Maity ,Vivek Agarwal and P K Guha Thakurta,”A New Cluster Based Approach on Load Balancing Technique with Congestion Control Schema for Mobile Networks”, IEEE MNCApps Conference, August 2012. [3]. Saravut Yaipairoj and Fotios C.Harmantzis, “A Dynamic Pricing Model for Data Services in GPRS Networks”, Globecom Workshops, IEEE Communication Society, 2004 [4]. Sarah Kabahuma and Olabisi E. Falowo, “Analysis of Network Operators’ Revenue with a Dynamic Pricing Model Based on User Behaviour in NGWN Using JCAC”, SATNAC, 2010. [5]. P.K. GuhaThakurta, Prothoma Sinha, Nilesh Mallick and Subhansu Bandyopadhyay, “An Approach towards Reduction of Routing Paths for Mobile Networks”, ICMOC, 2010. [6]. Andrew McCallum, Kamal Nigam, Lyle H. Ungar, “Efficient Clustering of High Dimensional Data Sets with Application to Reference Matching”, 6 th ACM SIGKDD International Conference on Knowledge discovery and Data Mining, 2000. [7]. Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest, and Clifford Stein “Introduction to Algorithms”, Third Edition 2010. cluster head approach is used this is due to the absence of WTD delay. Also if we closely watch the series 1, we can see than, at some points the delay suddenly increases for very minute period of time and this is due to Transition Delay [TD] which appears after TR interval. IV. CONCLUSION In this model, cluster heads are being dynamically chosen, so that even during heavy traffic hours, both call transmissions and ORP computation can be carried out with ease. When the cluster head is busy in transmitting calls through it, a new least loaded node is chosen to be the new cluster head. Hence, the efficiency of the model has been improved with the reduction of delay due to least probable backtracking and also by discarding the delay caused due to busy cluster-head. So, by using combined static and dynamic selection of cluster head approach the delay is considerable reduced in saturated region compared to our previous approach [2], where we have only used the static selection of cluster head approach. The experimental result of series 1, 2 and 3 proves our point. REFERENCES [1]. P.K.Guha Thakurta and Subhansu Bandyopadhyay, “A New Dynamic Pricing Scheme with Priority based Tree Generation and Scheduling for Mobile Networks”, IEEE Advanced Computing Conference, March 2009. © 2013 ACEEE DOI: 01.IJNS.4.1. 1160 48