SlideShare a Scribd company logo
1 of 8
Download to read offline
Zahra Shokouh et al. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 5, Issue 7, (Part - 2) July 2015, pp.153-160
www.ijera.com 153 | P a g e
GTSH: A New Channel Assignment Algorithm in Multi-Radio
Multi-channel Wireless Mesh Networks
Zahra Shokouh*, Seyed Javad Mirabedini**, Ali Haroun Abadi***
*(Department of Computer, Science and research branch , Islamic Azad University, Bushehr,Iran
**,*** (Islamic Azad University ,Central Tehran Branch, Tehran, Iran
ABSTRACT
One of the complexities in a wireless mesh networks is its low throughput. For this reason and due to the fact
that throughput is highly reduced by increased number of nodes, it is difficult to extend such networks.
Therefore, providing a high throughput in these networks is an essential goal. The main lowering cause of
efficiency of such networks is interference between wireless links. A high interference leads to a reduced
throughput. In this research, two channel assignment methods were presented using genetic and tabu search
algorithms and their advantages and disadvantages were assessed. Finally, a new method combining the
advantages of both methods was proposed. With the help of NS2 network simulator, our work was simulated and
the combination results of the two methods were compared. The results were indicative of the better performance
of the hybrid method and significant increase of throughput in the network.
Keywords: interference, multi-channel, multi-radio, channel assignment, Throughput
I. INTRODUCTION
With the growth of communication technology
and the need of permanent, high-speed connectivity
to global networks and information exchange in
every time and place, the need to develop wireless
networks capable of connecting users to the Internet
easily in any locations becomes more evident day by
day. Generally, due to their specific capabilities and
features, wireless mesh networks have been
proposed as a novel growing and promising
technology to promote next-generation wireless
networks [1].
Wireless mesh networks consist of the two parts
of mesh router and mesh client. A mesh router is
assumed to be fixed and equipped with one or more
wireless interfaces called gateways. These interfaces
are directly connected to the Internet, while mesh
routers provide coverage between the neighboring
clients. They also connect with each other to form a
multi-backbone wireless network to be able to create
network traffic between mesh routers or between
mesh routers and Internet through gateways. On the
other hand, mesh clients can be fixed or mobile and
connect to the network through mesh routers.
A major problem facing a wireless mesh network is
reducing the backbone network capacity caused by
wireless interference. using multiple channels can
solve this problem since the links can transmit their
data simultaneously on different channels.
Therefore, many studies have been conducted on
multi-radio multi-channel wireless mesh network
[2]. A major problem faced by these networks is
reducing capacity caused by interference between
simultaneous transmissions. To solve this problem,
the router is equipped with a radio interface and set
on different channels to enhance network throughput
[3].
By setting different radios on non-overlapping
channels, mesh routers can simultaneously send and
receive in a neighborhood. Therefore, using
multiple radios and channels lead to spectral
efficiency and augmented actual bandwidth
available on the network [4].
A key aspect of the architecture of a multi-radio
multi-channel wireless mesh network is channel
assignment, including assignment of each radio to a
channel in a way that to achieve suitable efficiencies
of the existing channels. In particular, the objective
of channel assignment in multi-step communications
is minimizing interference on each given channel
[5]. 802.11 b/g and 802.11 a standards provide 3 and
12 non-overlapping (non-interfered) channels,
respectively. Although number of channels in 802.11
a standard is greater than that of 802.11 b/g standard,
802.11 b/g standard is used because of providing a
higher transmission range and cheaper interface [6].
II. CHANNEL ASSIGNMENT
Channel assignment is an NP-hard optimization
problem which different algorithms try to solve
using heuristic methods [7]. Channel assignment,
several conditions must be met that are described
below:
RESEARCH RESEARCH OPEN
ACCESS
Zahra Shokouh et al. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 5, Issue 7, (Part - 2) July 2015, pp.153-160
www.ijera.com 154 | P a g e
1. There are a limited number of radio interfaces of
each node, which are often less than the available
channels. 2. Ensuring topology preservation.
Therefore, a balance should occur between
maximizing connection and minimizing interference.
Fig.1 shows 3 states of the mentioned balance. A
depicts a network communication when a channel is
used. In this case, if a node is located within the
transmission distance, it can create an
communication. This would establish maximum
communication in case of using a channel. B and C
are 4 separate channels for an available connection.
Each node is also equipped with 2 network cards
acting on different radio frequencies. In B,
assignment of a channel to a radio creates a
maximum communication. However, this condition
is fulfilled by choosing at most 3 from 4 channels.
Fig.1: balance between connections and
interference
For example, suppose that there is a direct
connection between each pair of nodes. Yet, all these
interfaces cannot be active at the same time because
of the existence of interference on Channel 2.
Nevertheless, C demonstrates how the interference
between connections can be eliminated so that all of
them are active concurrently though they cannot
create a direct connection between b and d
neighbors.
Channel assignment process can be considered to
assign different colors for interference graph nodes.
Each color represents an orthogonal channel. Thus,
any monochromatic edges in the graph display a pair
of interfering links that cannot be active
simultaneously. A number of monochromatic edges
would reflect a number of interfering link pairs that
can be used to assess the network performance [2].
Classification of channel assignment has been
generally shown in Fig.2. Our proposed algorithm is
a sub-category of all-directional antennas of a static
type.
Fig.2:Categorization of channel assignment
algorithms
There are 3 ways to assign a channel: 1) dynamic
assignment; 2) pseudo-dynamic/static assignment;
and 3) hybrid assignment [8].
1. Dynamic assignment: This method allows each
interface to be set on each channel, while the
interfaces can change frequently from one channel to
another. The discussion on the synchronization
between the nodes to communicate data and the
issue of what channel should be selected for each
interface will be of the existing challenges. The
delay for switching a channel in an interface will be
to the extent that might be unacceptable in some
cases [9].
2. Static/pseudo-dynamic channel assignment: In
this method, the channels are assigned to interfaces
permanently or for a long time. The static methods
are appropriate when the delay caused by changes in
the interface is great. In addition, if the number of
available channels is equal to the number of
interfaces, the problem of channel assignment would
be a simple one. Methods of static assignment do not
require any special coordination for data
communication between the nodes since the
channels have already been assigned so as to readily
transfer data. This is often simpler than other
approaches since it does not consider changes such
as those of traffic patterns or external interferences.
A static channel assignment leads to a stable
network topology, thus preventing the problems of
network fragmentation and non-convergence
behavior [10].
3. Hybrid approach: This method utilizes a
combination of static and dynamic assignments. It
employs the static channel assignment for some
interfaces, while the other interfaces are assigned
frequently to other channels.
Zahra Shokouh et al. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 5, Issue 7, (Part - 2) July 2015, pp.153-160
www.ijera.com 155 | P a g e
III. Definitions used in this Research
3.1 Connectivity graph
To solve the problem of channel assignment, a
network is considered to be a graph which is called a
connectivity graph. The purpose is to assignment
channels to the wireless links between the mesh
routers. In these networks, a transmission range of
𝑅𝑡 is considered for each router node. Depending
on 𝑅𝑡 value, a link is placed between the two nodes
of less distance than 𝑅𝑡 in a connectivity graph. A
graph is defined as 𝐺 = (𝑉, 𝐸), where 𝑉 shows
the vertices of the graph, actually acting as router
nodes and 𝐸 portrays the graph edges to represent
the links between the routers.
3.2 Interference
After establishing a connectivity graph, the
interference present in the network is calculated. To
calculate the interference in the graph, an
interference model is needed besides a transmission
model for each node, which is defined as an
interference range ( 𝑅𝑖). When two nodes in the
network occur within the same range of interference
and use a shared frequency channel to transmit data,
interference happens. There are two different
interference models defined as follows:
1. Protocol model: This model indicates a transfer of
Node A to node B would be successful if:
• A link used for transmission exists between them
in the network topology.
• Each node C, in which DCB ≤ R, is not transferred
on a channel utilized by A and B, where DCB
represents the distance between nodes C and B, and
R shows the interference range, which is considered
identical for all nodes for simplicity. In this model,
to avoid collisions, RTS/CTS mechanism is applied.
2. Physical model: This model indicates a transfer of
node A to node B would be successful if:
• SNIR (Signal-Noise-Interference Ratio) received at
the receiver node is defined to be greater than the
threshold.
• Noise power and receiver interference include the
noise created by other transfers and the limited noise
on the network.
Due to the complexity of physical models,
applications of channel allocations mostly use
protocol models.
3.3 Interference graph
An interference graph is defined as = ( , ),
where is corresponding to the links present
within the connectivity graph and shows the edge
between two vertices, provided that the vertices in
graph (in fact, the edges in the connectivity
graph) are interfering. According to Rt value and the
interference model presented, the favorite network
interference graph is created. For instance, Fig.3
displays an interference graph when transmission
and interference ranges are identical.
As it can be seen, each edge is regarded as a vertex,
between each pair of which a link is created.
Fig.3: A view of a connectivity graph and its
relevant interference graph
4.3 Fitness function
Another problem involved in algorithms is the
method of evaluating how well the solutions are
obtained by an algorithm. For this purpose, a fitness
function is utilized. Fitness function must consider
two issues. An optimal answer is an answer that: (1)
minimizes interference; and (2) eliminates all
restrictions. Fitness function is defined as follows:
(1)
Total interference: this quantity indicates the degree
of interference on the network after channel
assignment. any answer with less interference has a
lower value of objective function and is thus more
appropriate.
MoreNum (MN): It is the number of nodes of any
solution not complied with the limited number of
channels. MN quantity should be zero in the result
obtained as the ultimate answer at the final step so as
to demonstrate compliance with all restrictions
LessNum (LN): This quantity shows the nodes to
which the number of assigned channels is less than
their number of radio interfaces. It is not necessary
for all nodes to use all their allowed number of
channels; yet, if a node is to use all its channels, a
greater reduction of interference would certainly
occur.
IV. Related Works
In [7], Ananad has designed a centralized
algorithm based on tabu search and a distributed
greedy algorithm. In both algorithms, frequency
channels are assigned to the radio interfaces of nodes
to minimize interference. In [11], Wei Wang
employed a genetic algorithm to solve the problem
of a static channel assignment. The network is
Zahra Shokouh et al. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 5, Issue 7, (Part - 2) July 2015, pp.153-160
www.ijera.com 156 | P a g e
intended as a graph. At first, a few random solutions
are generated and evaluated and then better solutions
will be selected from among them. At this part, new
solutions arise from the selected solutions. This
process is repeated several times depending on the
problem size. In [12], a new genetic algorithm based
on tabu algorithm has been introduced. The purpose
of this algorithm is to maximize the number of
active links in a network, for which the idea of a
maximal independent set is employed.
V. The algorithms used in this research
5.1 Genetic algorithm
The general steps of a genetic algorithm are as
follows:
1) Generation of a random population of n
chromosomes
2) Evaluation of the fitness function of each
chromosome in the population
3) Creation of a new population by repeating the
following steps:
• Selection of a few pairs of parent chromosomes of
a population based on their degree of desirability
• Application of a crossover operator on a selected
pairs of chromosomes and generation of two new
offspring from each pair of chromosomes
• Calculation of a mutation probability for each
offspring and changing the existing genes in the
offspring based on the comparison of their mutation
probabilities and the overall mutation probability
4) Utilization of the new population for the next
iterations of the algorithm
5) Stopping the algorithm process in case of
observing stop conditions and returning the best
response
6) Going to step 2
The various components of the genetic algorithm for
channel assignment are as follows:
Chromosome: In fact, each chromosome represents
one of the solutions. each chromosome can indicate
the channel assigned to each link. Chromosomes are
composed of a number of genes. The number of
genes in each chromosome is equal to the number of
links present in a network and a gene value
demonstrates an assigned channel. An example of
chromosomes can be seen in Fig.4.
Fig.4: Channel assignment and its corresponding
chromosome
As it can be seen, the left-side figure displays a
connectivity graph and assigned channels to links
with IEEE 802.11 b standard (Channel 11,6,1) and
the right-side figure indicates the corresponding
chromosome of this assignment.
Population: The different states of channel
assignment to links create various chromosomes,
which form a population. The population size
(number of chromosomes) in each iteration depends
on the problem size (number of nodes). In the
beginning, the initial population is randomly
generated (by selecting a random channel for each
gene in a chromosome).
Fitness function: Fitness function was discussed in
4.3. Based on a chromosome fitness function, the
present solutions in a population are evaluated.
Selection function for a crossover operation: Of the
existing solutions in a population, selection function
selects several solutions to create new ones. After
calculation of the fitness of the present
chromosomes, the chromosomes are sorted in an
ascending or descending order on a list based on the
fitness function value. Then, the list is divided into
two better and worse halves. In 40% of choices, 2
parents are randomly selected from among the better
half and combined together, but in the remaining
60%, one parent is randomly selected from among
the better half and another parent from among the
worse half. The aim is to utilize the solutions with a
low fitness function since it is possible to arrive at
good results by combining them with good answers.
Crossover function: The selected solutions are
combined in pairs to create new solutions. The
number of pairs selected is the same size as half of
the population. The method used to combine the
solutions is called a 1-point crossover function that
can be seen in Fig.5.
Fig.5: Method of a 1-point crossover operator
Mutation function: after the combination of two
parent chromosomes and generation of a new
chromosome, the value of a gene on the
chromosome may change. a random number is
produced for each chromosome. Also, a mutation
probability is defined as desired. If the random
number selected for each chromosome is less than
that of a mutation probability, a genetic mutation
occurs in that chromosome. The value of a
chromosome selected for a mutation changes to a
Zahra Shokouh et al. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 5, Issue 7, (Part - 2) July 2015, pp.153-160
www.ijera.com 157 | P a g e
value other than the current value. For example, if
the value is 1 and 3 channels exist (1-6-11), its value
can change to 6 or 11 (Fig. 6).
Fig.6: Method of mutation operator
Population selection for each next step: the
beginning of each step of a GA, the present
population is kept in memory. After creating a new
population at the end of each step of the algorithm,
the existing solutions in the new population are fitted
and compared with the population in the memory.
From among the answers, the best chromosomes are
selected and then sent to the next step as a
population. The advantage of this method is that the
best solutions are always retained.
End: Genetic algorithm ends when no improvement
is attained in the fitness function at a specified
period. in some cases, it is seen that the results
obtained are not observing all the constraints and in
fact, the answer falls in a local minimum.
VI. Tabu search algorithm
Similarly, network topology is considered as a
graph in this algorithm. Each solution is in a way
that is regarded as a one-dimensional array
corresponding to the links in the network and the
channels assigned to them as it can be seen in Fig.7.
Fig. 7 Channel assignment and the corresponding
arrangement
At first, a random solution is created. Then, this
solution is assayed by the fitness function and is
considered as its best value (Fbest). This value and its
corresponding solution are kept in memory.
Afterwards, several new solutions are created from
the current solution, each of which is called a
neighboring solution. The method of generating a
neighboring solution is selecting a link and giving it
a new value other than its own. For example, in the
figure above, channel 2 can be replaced by link 2
(frequency channel 6) and thus a new solution can
be created. The fitness function value of this solution
is compared with the best value (Fbest) in the
memory. If it is less, it will be taken as a new value
and the value in memory is subsequently replaced by
its corresponding solution which is selected as the
best value. Otherwise, the best value does not
change. The solution selected in this step is then
used as the basis for the next step. The neighboring
solutions are created from this solution in the next
step. This process continues until no improvement in
the fitness function is achieved at the specified time.
The number of the neighboring solutions produced
in each step is the same as the number of links in the
network topology. Fig.8 displays the creation of 4
neighboring solutions from 1 solution. The fitness
function for each of the 4 solutions is calculated and
the solution with the best fitness function (lowest
value) is applied as the basic solution for the next
step.
Fig. 8 creation of neighboring solutions from the
current solution
Tabu List: To prevent a loop and quick convergence
to a solution in tabu algorithms, creation of repeated
solutions is prevented. For this purpose, a tabu list is
employed. In each iteration, when a neighboring
solution is chosen as the best solution, its
corresponding change is recorded on the list. For
example, if the solution is selected with a new
channel assignment to link , pair ) will
be recorded on the tabu list. If these changes are
reselected in the later steps, their presence or
absence on the tabu list is checked and they will be
applied if absent. The values do not remain on the
tabu list permanently and they are thus removed
from the list after a specified time interval (after a
certain number of running steps). For example, if in
the second iteration of the algorithm, the value
) is recorded on the list and the lasting time
is 10 iterations, then, the value 10 is given to pair
) on the tabu list. Figure 9 represents an
example of a tabu list implemented by a table, the
Zahra Shokouh et al. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 5, Issue 7, (Part - 2) July 2015, pp.153-160
www.ijera.com 158 | P a g e
rows and columns of which demonstrate the links
and channels, respectively.
Fig.9: A view of a tabu list
After the end of the algorithm, the best value stored
is selected as the optimal solution. However, all
restrictions are not usually observed by this solution.
It means that several nodes in the network are seen
to have utilized more channels than their
corresponding interfaces in the end. Therefore, this
algorithm requires a second phase by which the
nodes not having observed the limits are identified
and the number of their channels is reduced to the
number of their radio interfaces.
5.2 Advantages and disadvantages of the
two algorithms
• Genetic Algorithm (GA): As the search space of a
genetic algorithm is a global space, i.e. it uses a
global search, it is possible for one of the answers to
approach the objective solution. the initial results are
scattered at different points, each of which is
improved until one ultimately reaches a general
minimum value (objective). The main problem of a
genetic algorithm related to the issue of channel
assignment is its slow convergence to an optimal
solution. According to what was said, a crossover
function is used for the production of new offspring.
This function selects a random point, on which two
parent chromosomes are combined together in a
crossover form. Since the crossover point is selected
randomly and is not done intelligently, combining of
two solutions sometimes provide solutions worse
than the existing ones.
• Tabu algorithm: A tabu method starts from a
random point in the search space and tries to find an
optimal solution in its neighborhood. In fact, a tabu
algorithm performs a local search around that very
initial result. Arriving at an optimal solution in a
tabu algorithm depends on the initial selected
solution to a large degree. The results of this study
revealed that a tabu algorithm mostly occurs in a
local minimum and an optimal solution cannot be
achieved, i.e. all limits are not observed in the final
answer obtained and a number of nodes will possess
a greater number of channels than their interfaces. A
tabu algorithm has the advantage of a rapid
convergence to an answer. Since it uses a local
search mostly around a point, it quickly reaches a
minimum response close to that point, especially
when the initial point is made near to the minimum
objective.
VII. Hybrid algorithm (GTSH)
The advantage of a genetic algorithm is its
global search and the use of multiple solutions
scattered in the search space simultaneously. Tabu
algorithm advantage relates to the rapid convergence
of each solution to a near optimal solution.
Combination of these two solutions produces a new
hybrid algorithm called GTSH. The main structure
of this algorithm is like the genetic algorithm. It
utilizes both the property of a global search and
multiple solutions at each step. Nevertheless, it does
not use crossover and mutation functions to create
new solutions at each step. Its method of generating
offspring is based on a tabu algorithm. Several
random solutions are generated in the first step, each
of which is improved in parallel using the tabu
algorithm. Since the solutions are scattered in the
search space, it is possible that at least one solution
approaches the minimum objective solution. This
solution is improved until it reaches the objective
solution and then the algorithm ends at this point.
The process of producing the solution is shown in
fig.10.
Fig.10: An overview of the steps in a hybrid
function
VIII. Simulation
To evaluate the proposed algorithm, a relative
interference criterion was used. Relative interference
is defined as the ratio of the number of interfering
links after channel assignment to their number
before channel assignment. At first, using the
connectivity and interference graphs, the
interference was calculated before channel
assignment. After assignment of the channels, using
the 3 genetic, tabu search, and hybrid algorithms, the
degree of interference was calculated in the network.
Zahra Shokouh et al. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 5, Issue 7, (Part - 2) July 2015, pp.153-160
www.ijera.com 159 | P a g e
The criterion for relative interference was a number
smaller than 1. The more this number is closer to
zero, the method used to assign the channels is more
appropriate.
Simulation parameters: After creation of a random
network, 50 nodes with a dimension of 800 × 800 m2
were distributed. The degree of each node was 5, i.e.
it was associated with 5 other nodes. Transmission
and interference ranges were assumed to be equal for
all the nodes. These ranges were considered to be
150 m and 300 m (double the transmission range),
respectively. No two nodes could send their data
within their own interference ranges simultaneously.
Calculations were done based on IEEE 802.11b/g
standard. In this standard, 3 orthogonal frequency
channels existed. The coefficient values of and
in the fitness function were set to 1000 and 1,
respectively. The population size and mutation
probability rate in GA were assumed to be 500
chromosomes and 0.01, respectively, the lasting time
on the tabu list was set to 16 steps, and the number
of neighboring solutions was regarded equal to the
number of links at each step. These values were
experimentally obtained using trial-and-error tests.
MAC protocol used in NS-2 was based on
CSMA/CA, which employed RTS/CTS mechanism
and the routing protocol utilized was AODV
protocol.
Graph.1: Diagram of relative interference in a 3-
channel mode
IX. Conclusion and suggestions
In this research, Genetic and Tabu Search
Algorithms were assessed. These algorithms are
from among centralized algorithms dealing with
channel assignment in a static way. They employ
random search methods to find optimal solutions.
Genetic and tabu algorithms utilize population-based
and local search methods, respectively. They greatly
reduce the overall interference between wireless
links within a mesh network, while this increases the
end-to-end throughput of a network. The common
problem with these two algorithms is their inabilities
to find the main optimum solution and thus they do
not often produce the desired result. Therefore, in
this project, after careful consideration of these two
algorithms, a new hybrid algorithm was presented,
which tries to utilize their advantages and provide a
better performance.
In this research, interference was only considered as
a factor affecting the throughput and reducing it was
thus the aim of the selected algorithms. To this goal,
it was assumed that the traffic load is equally
distributed in all parts of the network, i.e. the traffic
conditions are assimilated all over the network.
Nonetheless, it is not mostly the case and the traffic
conditions are not the same everywhere in the
network. In addition to interference, the traffic load
present at different parts of the network should be
considered in channel assignment and in fact, a load-
aware channel assignment should take place so as to
attempt to further reduce interference at points with
a more traffic load than any other parts in the
network. This requires combining the two layers of
MAC and routing to allow the algorithms to work on
them together.
REFERENCES
[1] Krishnamurthy.L, Conner.S, Yarvis.M,
Chhabra.J Ellison.C, Brabenac.C, Tsui.E,''
Meeting the demands of the digital home with
high-speed multi-hop wireless networks'',
Journal Of Intel Technology,Vol.4, No.6,
pp.57-68, 2002.
[2] Yong Ding, Li Xiao, " Channel allocation in
multi-channel wireless mesh networks",
ScienceDirect Computer Communications,
Vol.54,No.1,pp.803–815, 2011.
[3] Y. Ding, Y. Huang, G. Zeng, L. Xiao, ''Using
Partially Overlapping Channel to Improve
Throughput in Wireless Mesh Network'',
IEEE Transactions on Mobile computing,
Vol.11, No.11, pp.1720-1733, 2012
[4] Zhang. Y, Luo. J, Hu. H, ''Wireless mesh
networking architectures protocols and
standards'', Auerbach Publications is an
imprint of the Taylor & Francis Group, an
informa business, 2007.
[5] Akyildiz. I, Wang. X, and Wang. W
,''Wireless mesh networks: a survey",
Computer Networks, Vol.47, No.5, pp.445-
487, 2005.
[6] G.Zeng, B. Wang, Y. Ding, L.Xiao, M. W.
Mutka, ''Efficient Multicast Algorithms for
Multi Channel Wireless Mesh networks",
IEEE Transactions on parallel and Distributed
Systems, Vol.21, pp.86-99, 2010.
[7] A. P. Subramanian, H. Gupta, S. R. Das, J.
Cao, " Minimum Interference Channel
Assignment in Multi-Radio Wireless Mesh
Networks”, in Fourth Annual IEEE
Communications Society Conference on
Zahra Shokouh et al. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 5, Issue 7, (Part - 2) July 2015, pp.153-160
www.ijera.com 160 | P a g e
Sensor, Mesh, and AdHoc Communications
and Networks(SECON2007), 2008.
[8] A. Pal, A. Nasipuri, '' JRCA: A joint routing
and channel assignment scheme for wireless
mesh networks", IEEE IPCCC, pp. 1-8, 2011.
[9] J. Shi, T. Salonidis, and E. Knightly,
''Starvation Mitigation through Multi-Channel
Coordination in CSMA Multi-Hop Wireless
Networks'' ,Proc. ACM MobiHoc, 2006.
[10]R. Draves J. Padhye, B. Zill, ''Routing in
multi-radio multi-hop wireless mesh
networks'', In MobiCom '04: Proceedings of
the 10th Annual International Conference on
Mobile computing and networking , pp. 114-
128, 2004.
[11]Wei wang, Jun Zhang and Supeng Huang.
“Optimization of Static Channel Assignment
in Multi-Radio Multi-Channel Wireless Mesh
Network”, ICCS 2008, pp. 71-75, 2008.
[12]Li Zhang, Xinheng Wang, Caixing Liu,
“Channel Assignment in Multi-Radio Multi-
Channel Wireless Mesh Network by Topology
Approach”, Proc. 2009 international
conference on communication and mobile,
2009.

More Related Content

What's hot

Efficient routing mechanism using cycle based network and k hop security in a...
Efficient routing mechanism using cycle based network and k hop security in a...Efficient routing mechanism using cycle based network and k hop security in a...
Efficient routing mechanism using cycle based network and k hop security in a...ijait
 
MULTI-HOP BANDWIDTH MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKS
MULTI-HOP BANDWIDTH MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKSMULTI-HOP BANDWIDTH MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKS
MULTI-HOP BANDWIDTH MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKSIJMIT JOURNAL
 
EBCD: A ROUTING ALGORITHM BASED ON BEE COLONY FOR ENERGY CONSUMPTION REDUCTIO...
EBCD: A ROUTING ALGORITHM BASED ON BEE COLONY FOR ENERGY CONSUMPTION REDUCTIO...EBCD: A ROUTING ALGORITHM BASED ON BEE COLONY FOR ENERGY CONSUMPTION REDUCTIO...
EBCD: A ROUTING ALGORITHM BASED ON BEE COLONY FOR ENERGY CONSUMPTION REDUCTIO...ijasuc
 
VIRTUAL ROUTING FUNCTION DEPLOYMENT IN NFV-BASED NETWORKS UNDER NETWORK DELAY...
VIRTUAL ROUTING FUNCTION DEPLOYMENT IN NFV-BASED NETWORKS UNDER NETWORK DELAY...VIRTUAL ROUTING FUNCTION DEPLOYMENT IN NFV-BASED NETWORKS UNDER NETWORK DELAY...
VIRTUAL ROUTING FUNCTION DEPLOYMENT IN NFV-BASED NETWORKS UNDER NETWORK DELAY...IJCNC Journal
 
RESOURCE ALLOCATION TECHNIQUE USING LOAD MATRIX METHOD IN WIRELESS CELLULAR S...
RESOURCE ALLOCATION TECHNIQUE USING LOAD MATRIX METHOD IN WIRELESS CELLULAR S...RESOURCE ALLOCATION TECHNIQUE USING LOAD MATRIX METHOD IN WIRELESS CELLULAR S...
RESOURCE ALLOCATION TECHNIQUE USING LOAD MATRIX METHOD IN WIRELESS CELLULAR S...cscpconf
 
A New Paradigm for Load Balancing in WMNs
A New Paradigm for Load Balancing in WMNsA New Paradigm for Load Balancing in WMNs
A New Paradigm for Load Balancing in WMNsCSCJournals
 
General Model for Single and Multiple Channels WLANs with Quality of Service ...
General Model for Single and Multiple Channels WLANs with Quality of Service ...General Model for Single and Multiple Channels WLANs with Quality of Service ...
General Model for Single and Multiple Channels WLANs with Quality of Service ...ijwmn
 
A NOVEL HYBRID OPPORTUNISTIC SCALABLE ENERGY EFFICIENT ROUTING DESIGN FOR LOW...
A NOVEL HYBRID OPPORTUNISTIC SCALABLE ENERGY EFFICIENT ROUTING DESIGN FOR LOW...A NOVEL HYBRID OPPORTUNISTIC SCALABLE ENERGY EFFICIENT ROUTING DESIGN FOR LOW...
A NOVEL HYBRID OPPORTUNISTIC SCALABLE ENERGY EFFICIENT ROUTING DESIGN FOR LOW...IJCNCJournal
 
EFFICIENT ANALYSIS OF THE ERGODIC CAPACITY OF COOPERATIVE NON-REGENERATIVE RE...
EFFICIENT ANALYSIS OF THE ERGODIC CAPACITY OF COOPERATIVE NON-REGENERATIVE RE...EFFICIENT ANALYSIS OF THE ERGODIC CAPACITY OF COOPERATIVE NON-REGENERATIVE RE...
EFFICIENT ANALYSIS OF THE ERGODIC CAPACITY OF COOPERATIVE NON-REGENERATIVE RE...ijwmn
 
Path loss exponent estimation
Path loss exponent estimationPath loss exponent estimation
Path loss exponent estimationNguyen Minh Thu
 
PERFORMANCES OF AD HOC NETWORKS UNDER DETERMINISTIC AND PROBABILISTIC CHANNEL...
PERFORMANCES OF AD HOC NETWORKS UNDER DETERMINISTIC AND PROBABILISTIC CHANNEL...PERFORMANCES OF AD HOC NETWORKS UNDER DETERMINISTIC AND PROBABILISTIC CHANNEL...
PERFORMANCES OF AD HOC NETWORKS UNDER DETERMINISTIC AND PROBABILISTIC CHANNEL...IJCNCJournal
 
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSNOptimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSNIJCNCJournal
 
Performance evaluation of interference aware topology power and flow control ...
Performance evaluation of interference aware topology power and flow control ...Performance evaluation of interference aware topology power and flow control ...
Performance evaluation of interference aware topology power and flow control ...IJECEIAES
 

What's hot (17)

Ijetcas14 357
Ijetcas14 357Ijetcas14 357
Ijetcas14 357
 
Efficient routing mechanism using cycle based network and k hop security in a...
Efficient routing mechanism using cycle based network and k hop security in a...Efficient routing mechanism using cycle based network and k hop security in a...
Efficient routing mechanism using cycle based network and k hop security in a...
 
MULTI-HOP BANDWIDTH MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKS
MULTI-HOP BANDWIDTH MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKSMULTI-HOP BANDWIDTH MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKS
MULTI-HOP BANDWIDTH MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKS
 
EBCD: A ROUTING ALGORITHM BASED ON BEE COLONY FOR ENERGY CONSUMPTION REDUCTIO...
EBCD: A ROUTING ALGORITHM BASED ON BEE COLONY FOR ENERGY CONSUMPTION REDUCTIO...EBCD: A ROUTING ALGORITHM BASED ON BEE COLONY FOR ENERGY CONSUMPTION REDUCTIO...
EBCD: A ROUTING ALGORITHM BASED ON BEE COLONY FOR ENERGY CONSUMPTION REDUCTIO...
 
VIRTUAL ROUTING FUNCTION DEPLOYMENT IN NFV-BASED NETWORKS UNDER NETWORK DELAY...
VIRTUAL ROUTING FUNCTION DEPLOYMENT IN NFV-BASED NETWORKS UNDER NETWORK DELAY...VIRTUAL ROUTING FUNCTION DEPLOYMENT IN NFV-BASED NETWORKS UNDER NETWORK DELAY...
VIRTUAL ROUTING FUNCTION DEPLOYMENT IN NFV-BASED NETWORKS UNDER NETWORK DELAY...
 
Enhancing Power Unbiased Cooperative Media Access Control Protocol in Manets
Enhancing Power Unbiased Cooperative Media Access Control Protocol in ManetsEnhancing Power Unbiased Cooperative Media Access Control Protocol in Manets
Enhancing Power Unbiased Cooperative Media Access Control Protocol in Manets
 
RESOURCE ALLOCATION TECHNIQUE USING LOAD MATRIX METHOD IN WIRELESS CELLULAR S...
RESOURCE ALLOCATION TECHNIQUE USING LOAD MATRIX METHOD IN WIRELESS CELLULAR S...RESOURCE ALLOCATION TECHNIQUE USING LOAD MATRIX METHOD IN WIRELESS CELLULAR S...
RESOURCE ALLOCATION TECHNIQUE USING LOAD MATRIX METHOD IN WIRELESS CELLULAR S...
 
A New Paradigm for Load Balancing in WMNs
A New Paradigm for Load Balancing in WMNsA New Paradigm for Load Balancing in WMNs
A New Paradigm for Load Balancing in WMNs
 
General Model for Single and Multiple Channels WLANs with Quality of Service ...
General Model for Single and Multiple Channels WLANs with Quality of Service ...General Model for Single and Multiple Channels WLANs with Quality of Service ...
General Model for Single and Multiple Channels WLANs with Quality of Service ...
 
A NETWORK DATA AND COMMUNICATION ANALYSIS BASED COMBINED APPROACH TO IMPROVE ...
A NETWORK DATA AND COMMUNICATION ANALYSIS BASED COMBINED APPROACH TO IMPROVE ...A NETWORK DATA AND COMMUNICATION ANALYSIS BASED COMBINED APPROACH TO IMPROVE ...
A NETWORK DATA AND COMMUNICATION ANALYSIS BASED COMBINED APPROACH TO IMPROVE ...
 
Lte
LteLte
Lte
 
A NOVEL HYBRID OPPORTUNISTIC SCALABLE ENERGY EFFICIENT ROUTING DESIGN FOR LOW...
A NOVEL HYBRID OPPORTUNISTIC SCALABLE ENERGY EFFICIENT ROUTING DESIGN FOR LOW...A NOVEL HYBRID OPPORTUNISTIC SCALABLE ENERGY EFFICIENT ROUTING DESIGN FOR LOW...
A NOVEL HYBRID OPPORTUNISTIC SCALABLE ENERGY EFFICIENT ROUTING DESIGN FOR LOW...
 
EFFICIENT ANALYSIS OF THE ERGODIC CAPACITY OF COOPERATIVE NON-REGENERATIVE RE...
EFFICIENT ANALYSIS OF THE ERGODIC CAPACITY OF COOPERATIVE NON-REGENERATIVE RE...EFFICIENT ANALYSIS OF THE ERGODIC CAPACITY OF COOPERATIVE NON-REGENERATIVE RE...
EFFICIENT ANALYSIS OF THE ERGODIC CAPACITY OF COOPERATIVE NON-REGENERATIVE RE...
 
Path loss exponent estimation
Path loss exponent estimationPath loss exponent estimation
Path loss exponent estimation
 
PERFORMANCES OF AD HOC NETWORKS UNDER DETERMINISTIC AND PROBABILISTIC CHANNEL...
PERFORMANCES OF AD HOC NETWORKS UNDER DETERMINISTIC AND PROBABILISTIC CHANNEL...PERFORMANCES OF AD HOC NETWORKS UNDER DETERMINISTIC AND PROBABILISTIC CHANNEL...
PERFORMANCES OF AD HOC NETWORKS UNDER DETERMINISTIC AND PROBABILISTIC CHANNEL...
 
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSNOptimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSN
 
Performance evaluation of interference aware topology power and flow control ...
Performance evaluation of interference aware topology power and flow control ...Performance evaluation of interference aware topology power and flow control ...
Performance evaluation of interference aware topology power and flow control ...
 

Viewers also liked

xailabs MMConnector - The Connector to bridge Magento with Magnolia
xailabs MMConnector - The Connector to bridge Magento with Magnoliaxailabs MMConnector - The Connector to bridge Magento with Magnolia
xailabs MMConnector - The Connector to bridge Magento with MagnoliaTim Friedrich
 
Xarxes pr3-transicions
Xarxes pr3-transicionsXarxes pr3-transicions
Xarxes pr3-transicionsEnric Martín
 
Water-Wise Food Gardening Sonoma County - University of California
Water-Wise Food Gardening Sonoma County - University of CaliforniaWater-Wise Food Gardening Sonoma County - University of California
Water-Wise Food Gardening Sonoma County - University of CaliforniaKaila694m
 
X2TV Service Overview
X2TV Service Overview X2TV Service Overview
X2TV Service Overview X2TV
 
xadrez aula 1
xadrez aula 1xadrez aula 1
xadrez aula 1djuylyodm
 
X5 user manual v1.0a
X5 user manual v1.0aX5 user manual v1.0a
X5 user manual v1.0aNeder Burgos
 
X430 611-intro summary-infosession
X430 611-intro summary-infosessionX430 611-intro summary-infosession
X430 611-intro summary-infosessionBMLP
 
오피사이트 『 Bamcafe2.net』종로오피,역곡오피,매니져실사,신논현오피,안산오피Å
오피사이트 『 Bamcafe2.net』종로오피,역곡오피,매니져실사,신논현오피,안산오피Å오피사이트 『 Bamcafe2.net』종로오피,역곡오피,매니져실사,신논현오피,안산오피Å
오피사이트 『 Bamcafe2.net』종로오피,역곡오피,매니져실사,신논현오피,안산오피Åhans5762
 
Solar Thermochemical Conversion of CO2 into C via SnO2/SnO Redox Cycle: A The...
Solar Thermochemical Conversion of CO2 into C via SnO2/SnO Redox Cycle: A The...Solar Thermochemical Conversion of CO2 into C via SnO2/SnO Redox Cycle: A The...
Solar Thermochemical Conversion of CO2 into C via SnO2/SnO Redox Cycle: A The...IJERA Editor
 
Xamarin user group san diego kick-off!
Xamarin user group san diego   kick-off!Xamarin user group san diego   kick-off!
Xamarin user group san diego kick-off!Seamgen
 
Xamarin App and Microsoft Graph
Xamarin App and Microsoft GraphXamarin App and Microsoft Graph
Xamarin App and Microsoft GraphHector Luciano Jr
 

Viewers also liked (15)

xailabs MMConnector - The Connector to bridge Magento with Magnolia
xailabs MMConnector - The Connector to bridge Magento with Magnoliaxailabs MMConnector - The Connector to bridge Magento with Magnolia
xailabs MMConnector - The Connector to bridge Magento with Magnolia
 
X2 T08 02 induction
X2 T08 02 inductionX2 T08 02 induction
X2 T08 02 induction
 
Xarxes pr3-transicions
Xarxes pr3-transicionsXarxes pr3-transicions
Xarxes pr3-transicions
 
Water-Wise Food Gardening Sonoma County - University of California
Water-Wise Food Gardening Sonoma County - University of CaliforniaWater-Wise Food Gardening Sonoma County - University of California
Water-Wise Food Gardening Sonoma County - University of California
 
X2TV Service Overview
X2TV Service Overview X2TV Service Overview
X2TV Service Overview
 
Xarxen
XarxenXarxen
Xarxen
 
xadrez aula 1
xadrez aula 1xadrez aula 1
xadrez aula 1
 
X5 user manual v1.0a
X5 user manual v1.0aX5 user manual v1.0a
X5 user manual v1.0a
 
インフラジスティックスおよび Xamarin.Forms コントロールのご紹介
インフラジスティックスおよび Xamarin.Forms コントロールのご紹介インフラジスティックスおよび Xamarin.Forms コントロールのご紹介
インフラジスティックスおよび Xamarin.Forms コントロールのご紹介
 
X430 611-intro summary-infosession
X430 611-intro summary-infosessionX430 611-intro summary-infosession
X430 611-intro summary-infosession
 
오피사이트 『 Bamcafe2.net』종로오피,역곡오피,매니져실사,신논현오피,안산오피Å
오피사이트 『 Bamcafe2.net』종로오피,역곡오피,매니져실사,신논현오피,안산오피Å오피사이트 『 Bamcafe2.net』종로오피,역곡오피,매니져실사,신논현오피,안산오피Å
오피사이트 『 Bamcafe2.net』종로오피,역곡오피,매니져실사,신논현오피,안산오피Å
 
Solar Thermochemical Conversion of CO2 into C via SnO2/SnO Redox Cycle: A The...
Solar Thermochemical Conversion of CO2 into C via SnO2/SnO Redox Cycle: A The...Solar Thermochemical Conversion of CO2 into C via SnO2/SnO Redox Cycle: A The...
Solar Thermochemical Conversion of CO2 into C via SnO2/SnO Redox Cycle: A The...
 
Xamarin user group san diego kick-off!
Xamarin user group san diego   kick-off!Xamarin user group san diego   kick-off!
Xamarin user group san diego kick-off!
 
SOMOS DA UNITA
SOMOS DA UNITASOMOS DA UNITA
SOMOS DA UNITA
 
Xamarin App and Microsoft Graph
Xamarin App and Microsoft GraphXamarin App and Microsoft Graph
Xamarin App and Microsoft Graph
 

Similar to GTSH: A New Channel Assignment Algorithm in Multi-Radio Multi-channel Wireless Mesh Networks

INTERFERENCE-AWARE CHANNEL ASSIGNMENT FOR MAXIMIZING THROUGHPUT IN WMN
INTERFERENCE-AWARE CHANNEL ASSIGNMENT FOR MAXIMIZING THROUGHPUT IN WMN INTERFERENCE-AWARE CHANNEL ASSIGNMENT FOR MAXIMIZING THROUGHPUT IN WMN
INTERFERENCE-AWARE CHANNEL ASSIGNMENT FOR MAXIMIZING THROUGHPUT IN WMN pijans
 
Ijarcet vol-2-issue-7-2277-2280
Ijarcet vol-2-issue-7-2277-2280Ijarcet vol-2-issue-7-2277-2280
Ijarcet vol-2-issue-7-2277-2280Editor IJARCET
 
Ijarcet vol-2-issue-7-2277-2280
Ijarcet vol-2-issue-7-2277-2280Ijarcet vol-2-issue-7-2277-2280
Ijarcet vol-2-issue-7-2277-2280Editor IJARCET
 
An Overview Of Channel Assignment Methods For Multi-Radio Multi-Channel Wirel...
An Overview Of Channel Assignment Methods For Multi-Radio Multi-Channel Wirel...An Overview Of Channel Assignment Methods For Multi-Radio Multi-Channel Wirel...
An Overview Of Channel Assignment Methods For Multi-Radio Multi-Channel Wirel...Darian Pruitt
 
Channel Allocation and Routing in Wireless Mesh Networks: A survey and qualit...
Channel Allocation and Routing in Wireless Mesh Networks: A survey and qualit...Channel Allocation and Routing in Wireless Mesh Networks: A survey and qualit...
Channel Allocation and Routing in Wireless Mesh Networks: A survey and qualit...ijwmn
 
Multi-Channel Multi-Interface Wireless Network Architecture
Multi-Channel Multi-Interface Wireless Network ArchitectureMulti-Channel Multi-Interface Wireless Network Architecture
Multi-Channel Multi-Interface Wireless Network Architectureijsrd.com
 
Energy saving in cooperative transmission using opportunistic protocol in MANET
Energy saving in cooperative transmission using opportunistic protocol in MANETEnergy saving in cooperative transmission using opportunistic protocol in MANET
Energy saving in cooperative transmission using opportunistic protocol in MANETIOSR Journals
 
BROADBAND POWER LINE COMMUNICATION: THE CHANNEL AND NOISE ANALYSIS FOR A POWE...
BROADBAND POWER LINE COMMUNICATION: THE CHANNEL AND NOISE ANALYSIS FOR A POWE...BROADBAND POWER LINE COMMUNICATION: THE CHANNEL AND NOISE ANALYSIS FOR A POWE...
BROADBAND POWER LINE COMMUNICATION: THE CHANNEL AND NOISE ANALYSIS FOR A POWE...IJCNCJournal
 
Efficient and stable route selection by using cross layer concept for highly...
 Efficient and stable route selection by using cross layer concept for highly... Efficient and stable route selection by using cross layer concept for highly...
Efficient and stable route selection by using cross layer concept for highly...Roopali Singh
 
Wireless Mesh Network
Wireless Mesh NetworkWireless Mesh Network
Wireless Mesh Networksheenammiddha
 
LINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORK
LINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORKLINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORK
LINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORKijwmn
 
LINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORK
LINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORKLINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORK
LINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORKijwmn
 
BROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKS
BROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKSBROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKS
BROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKSIJCNCJournal
 
Broadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc Networks
Broadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc NetworksBroadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc Networks
Broadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc NetworksIJCNCJournal
 
AN EFFICIENT SPECTRUM SHARING METHOD BASED ON GENETIC ALGORITHM IN HETEROGENE...
AN EFFICIENT SPECTRUM SHARING METHOD BASED ON GENETIC ALGORITHM IN HETEROGENE...AN EFFICIENT SPECTRUM SHARING METHOD BASED ON GENETIC ALGORITHM IN HETEROGENE...
AN EFFICIENT SPECTRUM SHARING METHOD BASED ON GENETIC ALGORITHM IN HETEROGENE...IJCNCJournal
 
A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid W...
A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid W...A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid W...
A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid W...1crore projects
 
Iaetsd increasing network life span of manet by using
Iaetsd increasing network life span of manet by usingIaetsd increasing network life span of manet by using
Iaetsd increasing network life span of manet by usingIaetsd Iaetsd
 
Secure data storage over distributed nodes in network through broadcast techn...
Secure data storage over distributed nodes in network through broadcast techn...Secure data storage over distributed nodes in network through broadcast techn...
Secure data storage over distributed nodes in network through broadcast techn...eSAT Publishing House
 

Similar to GTSH: A New Channel Assignment Algorithm in Multi-Radio Multi-channel Wireless Mesh Networks (20)

INTERFERENCE-AWARE CHANNEL ASSIGNMENT FOR MAXIMIZING THROUGHPUT IN WMN
INTERFERENCE-AWARE CHANNEL ASSIGNMENT FOR MAXIMIZING THROUGHPUT IN WMN INTERFERENCE-AWARE CHANNEL ASSIGNMENT FOR MAXIMIZING THROUGHPUT IN WMN
INTERFERENCE-AWARE CHANNEL ASSIGNMENT FOR MAXIMIZING THROUGHPUT IN WMN
 
Ijarcet vol-2-issue-7-2277-2280
Ijarcet vol-2-issue-7-2277-2280Ijarcet vol-2-issue-7-2277-2280
Ijarcet vol-2-issue-7-2277-2280
 
Ijarcet vol-2-issue-7-2277-2280
Ijarcet vol-2-issue-7-2277-2280Ijarcet vol-2-issue-7-2277-2280
Ijarcet vol-2-issue-7-2277-2280
 
An Overview Of Channel Assignment Methods For Multi-Radio Multi-Channel Wirel...
An Overview Of Channel Assignment Methods For Multi-Radio Multi-Channel Wirel...An Overview Of Channel Assignment Methods For Multi-Radio Multi-Channel Wirel...
An Overview Of Channel Assignment Methods For Multi-Radio Multi-Channel Wirel...
 
Channel Allocation and Routing in Wireless Mesh Networks: A survey and qualit...
Channel Allocation and Routing in Wireless Mesh Networks: A survey and qualit...Channel Allocation and Routing in Wireless Mesh Networks: A survey and qualit...
Channel Allocation and Routing in Wireless Mesh Networks: A survey and qualit...
 
Multi-Channel Multi-Interface Wireless Network Architecture
Multi-Channel Multi-Interface Wireless Network ArchitectureMulti-Channel Multi-Interface Wireless Network Architecture
Multi-Channel Multi-Interface Wireless Network Architecture
 
Energy saving in cooperative transmission using opportunistic protocol in MANET
Energy saving in cooperative transmission using opportunistic protocol in MANETEnergy saving in cooperative transmission using opportunistic protocol in MANET
Energy saving in cooperative transmission using opportunistic protocol in MANET
 
BROADBAND POWER LINE COMMUNICATION: THE CHANNEL AND NOISE ANALYSIS FOR A POWE...
BROADBAND POWER LINE COMMUNICATION: THE CHANNEL AND NOISE ANALYSIS FOR A POWE...BROADBAND POWER LINE COMMUNICATION: THE CHANNEL AND NOISE ANALYSIS FOR A POWE...
BROADBAND POWER LINE COMMUNICATION: THE CHANNEL AND NOISE ANALYSIS FOR A POWE...
 
Efficient and stable route selection by using cross layer concept for highly...
 Efficient and stable route selection by using cross layer concept for highly... Efficient and stable route selection by using cross layer concept for highly...
Efficient and stable route selection by using cross layer concept for highly...
 
F04503057062
F04503057062F04503057062
F04503057062
 
Wireless Mesh Network
Wireless Mesh NetworkWireless Mesh Network
Wireless Mesh Network
 
LINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORK
LINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORKLINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORK
LINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORK
 
LINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORK
LINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORKLINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORK
LINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORK
 
BROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKS
BROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKSBROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKS
BROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKS
 
Broadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc Networks
Broadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc NetworksBroadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc Networks
Broadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc Networks
 
AN EFFICIENT SPECTRUM SHARING METHOD BASED ON GENETIC ALGORITHM IN HETEROGENE...
AN EFFICIENT SPECTRUM SHARING METHOD BASED ON GENETIC ALGORITHM IN HETEROGENE...AN EFFICIENT SPECTRUM SHARING METHOD BASED ON GENETIC ALGORITHM IN HETEROGENE...
AN EFFICIENT SPECTRUM SHARING METHOD BASED ON GENETIC ALGORITHM IN HETEROGENE...
 
A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid W...
A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid W...A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid W...
A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid W...
 
R33092099
R33092099R33092099
R33092099
 
Iaetsd increasing network life span of manet by using
Iaetsd increasing network life span of manet by usingIaetsd increasing network life span of manet by using
Iaetsd increasing network life span of manet by using
 
Secure data storage over distributed nodes in network through broadcast techn...
Secure data storage over distributed nodes in network through broadcast techn...Secure data storage over distributed nodes in network through broadcast techn...
Secure data storage over distributed nodes in network through broadcast techn...
 

Recently uploaded

Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 

Recently uploaded (20)

Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 

GTSH: A New Channel Assignment Algorithm in Multi-Radio Multi-channel Wireless Mesh Networks

  • 1. Zahra Shokouh et al. Int. Journal of Engineering Research and Applications www.ijera.com ISSN: 2248-9622, Vol. 5, Issue 7, (Part - 2) July 2015, pp.153-160 www.ijera.com 153 | P a g e GTSH: A New Channel Assignment Algorithm in Multi-Radio Multi-channel Wireless Mesh Networks Zahra Shokouh*, Seyed Javad Mirabedini**, Ali Haroun Abadi*** *(Department of Computer, Science and research branch , Islamic Azad University, Bushehr,Iran **,*** (Islamic Azad University ,Central Tehran Branch, Tehran, Iran ABSTRACT One of the complexities in a wireless mesh networks is its low throughput. For this reason and due to the fact that throughput is highly reduced by increased number of nodes, it is difficult to extend such networks. Therefore, providing a high throughput in these networks is an essential goal. The main lowering cause of efficiency of such networks is interference between wireless links. A high interference leads to a reduced throughput. In this research, two channel assignment methods were presented using genetic and tabu search algorithms and their advantages and disadvantages were assessed. Finally, a new method combining the advantages of both methods was proposed. With the help of NS2 network simulator, our work was simulated and the combination results of the two methods were compared. The results were indicative of the better performance of the hybrid method and significant increase of throughput in the network. Keywords: interference, multi-channel, multi-radio, channel assignment, Throughput I. INTRODUCTION With the growth of communication technology and the need of permanent, high-speed connectivity to global networks and information exchange in every time and place, the need to develop wireless networks capable of connecting users to the Internet easily in any locations becomes more evident day by day. Generally, due to their specific capabilities and features, wireless mesh networks have been proposed as a novel growing and promising technology to promote next-generation wireless networks [1]. Wireless mesh networks consist of the two parts of mesh router and mesh client. A mesh router is assumed to be fixed and equipped with one or more wireless interfaces called gateways. These interfaces are directly connected to the Internet, while mesh routers provide coverage between the neighboring clients. They also connect with each other to form a multi-backbone wireless network to be able to create network traffic between mesh routers or between mesh routers and Internet through gateways. On the other hand, mesh clients can be fixed or mobile and connect to the network through mesh routers. A major problem facing a wireless mesh network is reducing the backbone network capacity caused by wireless interference. using multiple channels can solve this problem since the links can transmit their data simultaneously on different channels. Therefore, many studies have been conducted on multi-radio multi-channel wireless mesh network [2]. A major problem faced by these networks is reducing capacity caused by interference between simultaneous transmissions. To solve this problem, the router is equipped with a radio interface and set on different channels to enhance network throughput [3]. By setting different radios on non-overlapping channels, mesh routers can simultaneously send and receive in a neighborhood. Therefore, using multiple radios and channels lead to spectral efficiency and augmented actual bandwidth available on the network [4]. A key aspect of the architecture of a multi-radio multi-channel wireless mesh network is channel assignment, including assignment of each radio to a channel in a way that to achieve suitable efficiencies of the existing channels. In particular, the objective of channel assignment in multi-step communications is minimizing interference on each given channel [5]. 802.11 b/g and 802.11 a standards provide 3 and 12 non-overlapping (non-interfered) channels, respectively. Although number of channels in 802.11 a standard is greater than that of 802.11 b/g standard, 802.11 b/g standard is used because of providing a higher transmission range and cheaper interface [6]. II. CHANNEL ASSIGNMENT Channel assignment is an NP-hard optimization problem which different algorithms try to solve using heuristic methods [7]. Channel assignment, several conditions must be met that are described below: RESEARCH RESEARCH OPEN ACCESS
  • 2. Zahra Shokouh et al. Int. Journal of Engineering Research and Applications www.ijera.com ISSN: 2248-9622, Vol. 5, Issue 7, (Part - 2) July 2015, pp.153-160 www.ijera.com 154 | P a g e 1. There are a limited number of radio interfaces of each node, which are often less than the available channels. 2. Ensuring topology preservation. Therefore, a balance should occur between maximizing connection and minimizing interference. Fig.1 shows 3 states of the mentioned balance. A depicts a network communication when a channel is used. In this case, if a node is located within the transmission distance, it can create an communication. This would establish maximum communication in case of using a channel. B and C are 4 separate channels for an available connection. Each node is also equipped with 2 network cards acting on different radio frequencies. In B, assignment of a channel to a radio creates a maximum communication. However, this condition is fulfilled by choosing at most 3 from 4 channels. Fig.1: balance between connections and interference For example, suppose that there is a direct connection between each pair of nodes. Yet, all these interfaces cannot be active at the same time because of the existence of interference on Channel 2. Nevertheless, C demonstrates how the interference between connections can be eliminated so that all of them are active concurrently though they cannot create a direct connection between b and d neighbors. Channel assignment process can be considered to assign different colors for interference graph nodes. Each color represents an orthogonal channel. Thus, any monochromatic edges in the graph display a pair of interfering links that cannot be active simultaneously. A number of monochromatic edges would reflect a number of interfering link pairs that can be used to assess the network performance [2]. Classification of channel assignment has been generally shown in Fig.2. Our proposed algorithm is a sub-category of all-directional antennas of a static type. Fig.2:Categorization of channel assignment algorithms There are 3 ways to assign a channel: 1) dynamic assignment; 2) pseudo-dynamic/static assignment; and 3) hybrid assignment [8]. 1. Dynamic assignment: This method allows each interface to be set on each channel, while the interfaces can change frequently from one channel to another. The discussion on the synchronization between the nodes to communicate data and the issue of what channel should be selected for each interface will be of the existing challenges. The delay for switching a channel in an interface will be to the extent that might be unacceptable in some cases [9]. 2. Static/pseudo-dynamic channel assignment: In this method, the channels are assigned to interfaces permanently or for a long time. The static methods are appropriate when the delay caused by changes in the interface is great. In addition, if the number of available channels is equal to the number of interfaces, the problem of channel assignment would be a simple one. Methods of static assignment do not require any special coordination for data communication between the nodes since the channels have already been assigned so as to readily transfer data. This is often simpler than other approaches since it does not consider changes such as those of traffic patterns or external interferences. A static channel assignment leads to a stable network topology, thus preventing the problems of network fragmentation and non-convergence behavior [10]. 3. Hybrid approach: This method utilizes a combination of static and dynamic assignments. It employs the static channel assignment for some interfaces, while the other interfaces are assigned frequently to other channels.
  • 3. Zahra Shokouh et al. Int. Journal of Engineering Research and Applications www.ijera.com ISSN: 2248-9622, Vol. 5, Issue 7, (Part - 2) July 2015, pp.153-160 www.ijera.com 155 | P a g e III. Definitions used in this Research 3.1 Connectivity graph To solve the problem of channel assignment, a network is considered to be a graph which is called a connectivity graph. The purpose is to assignment channels to the wireless links between the mesh routers. In these networks, a transmission range of 𝑅𝑡 is considered for each router node. Depending on 𝑅𝑡 value, a link is placed between the two nodes of less distance than 𝑅𝑡 in a connectivity graph. A graph is defined as 𝐺 = (𝑉, 𝐸), where 𝑉 shows the vertices of the graph, actually acting as router nodes and 𝐸 portrays the graph edges to represent the links between the routers. 3.2 Interference After establishing a connectivity graph, the interference present in the network is calculated. To calculate the interference in the graph, an interference model is needed besides a transmission model for each node, which is defined as an interference range ( 𝑅𝑖). When two nodes in the network occur within the same range of interference and use a shared frequency channel to transmit data, interference happens. There are two different interference models defined as follows: 1. Protocol model: This model indicates a transfer of Node A to node B would be successful if: • A link used for transmission exists between them in the network topology. • Each node C, in which DCB ≤ R, is not transferred on a channel utilized by A and B, where DCB represents the distance between nodes C and B, and R shows the interference range, which is considered identical for all nodes for simplicity. In this model, to avoid collisions, RTS/CTS mechanism is applied. 2. Physical model: This model indicates a transfer of node A to node B would be successful if: • SNIR (Signal-Noise-Interference Ratio) received at the receiver node is defined to be greater than the threshold. • Noise power and receiver interference include the noise created by other transfers and the limited noise on the network. Due to the complexity of physical models, applications of channel allocations mostly use protocol models. 3.3 Interference graph An interference graph is defined as = ( , ), where is corresponding to the links present within the connectivity graph and shows the edge between two vertices, provided that the vertices in graph (in fact, the edges in the connectivity graph) are interfering. According to Rt value and the interference model presented, the favorite network interference graph is created. For instance, Fig.3 displays an interference graph when transmission and interference ranges are identical. As it can be seen, each edge is regarded as a vertex, between each pair of which a link is created. Fig.3: A view of a connectivity graph and its relevant interference graph 4.3 Fitness function Another problem involved in algorithms is the method of evaluating how well the solutions are obtained by an algorithm. For this purpose, a fitness function is utilized. Fitness function must consider two issues. An optimal answer is an answer that: (1) minimizes interference; and (2) eliminates all restrictions. Fitness function is defined as follows: (1) Total interference: this quantity indicates the degree of interference on the network after channel assignment. any answer with less interference has a lower value of objective function and is thus more appropriate. MoreNum (MN): It is the number of nodes of any solution not complied with the limited number of channels. MN quantity should be zero in the result obtained as the ultimate answer at the final step so as to demonstrate compliance with all restrictions LessNum (LN): This quantity shows the nodes to which the number of assigned channels is less than their number of radio interfaces. It is not necessary for all nodes to use all their allowed number of channels; yet, if a node is to use all its channels, a greater reduction of interference would certainly occur. IV. Related Works In [7], Ananad has designed a centralized algorithm based on tabu search and a distributed greedy algorithm. In both algorithms, frequency channels are assigned to the radio interfaces of nodes to minimize interference. In [11], Wei Wang employed a genetic algorithm to solve the problem of a static channel assignment. The network is
  • 4. Zahra Shokouh et al. Int. Journal of Engineering Research and Applications www.ijera.com ISSN: 2248-9622, Vol. 5, Issue 7, (Part - 2) July 2015, pp.153-160 www.ijera.com 156 | P a g e intended as a graph. At first, a few random solutions are generated and evaluated and then better solutions will be selected from among them. At this part, new solutions arise from the selected solutions. This process is repeated several times depending on the problem size. In [12], a new genetic algorithm based on tabu algorithm has been introduced. The purpose of this algorithm is to maximize the number of active links in a network, for which the idea of a maximal independent set is employed. V. The algorithms used in this research 5.1 Genetic algorithm The general steps of a genetic algorithm are as follows: 1) Generation of a random population of n chromosomes 2) Evaluation of the fitness function of each chromosome in the population 3) Creation of a new population by repeating the following steps: • Selection of a few pairs of parent chromosomes of a population based on their degree of desirability • Application of a crossover operator on a selected pairs of chromosomes and generation of two new offspring from each pair of chromosomes • Calculation of a mutation probability for each offspring and changing the existing genes in the offspring based on the comparison of their mutation probabilities and the overall mutation probability 4) Utilization of the new population for the next iterations of the algorithm 5) Stopping the algorithm process in case of observing stop conditions and returning the best response 6) Going to step 2 The various components of the genetic algorithm for channel assignment are as follows: Chromosome: In fact, each chromosome represents one of the solutions. each chromosome can indicate the channel assigned to each link. Chromosomes are composed of a number of genes. The number of genes in each chromosome is equal to the number of links present in a network and a gene value demonstrates an assigned channel. An example of chromosomes can be seen in Fig.4. Fig.4: Channel assignment and its corresponding chromosome As it can be seen, the left-side figure displays a connectivity graph and assigned channels to links with IEEE 802.11 b standard (Channel 11,6,1) and the right-side figure indicates the corresponding chromosome of this assignment. Population: The different states of channel assignment to links create various chromosomes, which form a population. The population size (number of chromosomes) in each iteration depends on the problem size (number of nodes). In the beginning, the initial population is randomly generated (by selecting a random channel for each gene in a chromosome). Fitness function: Fitness function was discussed in 4.3. Based on a chromosome fitness function, the present solutions in a population are evaluated. Selection function for a crossover operation: Of the existing solutions in a population, selection function selects several solutions to create new ones. After calculation of the fitness of the present chromosomes, the chromosomes are sorted in an ascending or descending order on a list based on the fitness function value. Then, the list is divided into two better and worse halves. In 40% of choices, 2 parents are randomly selected from among the better half and combined together, but in the remaining 60%, one parent is randomly selected from among the better half and another parent from among the worse half. The aim is to utilize the solutions with a low fitness function since it is possible to arrive at good results by combining them with good answers. Crossover function: The selected solutions are combined in pairs to create new solutions. The number of pairs selected is the same size as half of the population. The method used to combine the solutions is called a 1-point crossover function that can be seen in Fig.5. Fig.5: Method of a 1-point crossover operator Mutation function: after the combination of two parent chromosomes and generation of a new chromosome, the value of a gene on the chromosome may change. a random number is produced for each chromosome. Also, a mutation probability is defined as desired. If the random number selected for each chromosome is less than that of a mutation probability, a genetic mutation occurs in that chromosome. The value of a chromosome selected for a mutation changes to a
  • 5. Zahra Shokouh et al. Int. Journal of Engineering Research and Applications www.ijera.com ISSN: 2248-9622, Vol. 5, Issue 7, (Part - 2) July 2015, pp.153-160 www.ijera.com 157 | P a g e value other than the current value. For example, if the value is 1 and 3 channels exist (1-6-11), its value can change to 6 or 11 (Fig. 6). Fig.6: Method of mutation operator Population selection for each next step: the beginning of each step of a GA, the present population is kept in memory. After creating a new population at the end of each step of the algorithm, the existing solutions in the new population are fitted and compared with the population in the memory. From among the answers, the best chromosomes are selected and then sent to the next step as a population. The advantage of this method is that the best solutions are always retained. End: Genetic algorithm ends when no improvement is attained in the fitness function at a specified period. in some cases, it is seen that the results obtained are not observing all the constraints and in fact, the answer falls in a local minimum. VI. Tabu search algorithm Similarly, network topology is considered as a graph in this algorithm. Each solution is in a way that is regarded as a one-dimensional array corresponding to the links in the network and the channels assigned to them as it can be seen in Fig.7. Fig. 7 Channel assignment and the corresponding arrangement At first, a random solution is created. Then, this solution is assayed by the fitness function and is considered as its best value (Fbest). This value and its corresponding solution are kept in memory. Afterwards, several new solutions are created from the current solution, each of which is called a neighboring solution. The method of generating a neighboring solution is selecting a link and giving it a new value other than its own. For example, in the figure above, channel 2 can be replaced by link 2 (frequency channel 6) and thus a new solution can be created. The fitness function value of this solution is compared with the best value (Fbest) in the memory. If it is less, it will be taken as a new value and the value in memory is subsequently replaced by its corresponding solution which is selected as the best value. Otherwise, the best value does not change. The solution selected in this step is then used as the basis for the next step. The neighboring solutions are created from this solution in the next step. This process continues until no improvement in the fitness function is achieved at the specified time. The number of the neighboring solutions produced in each step is the same as the number of links in the network topology. Fig.8 displays the creation of 4 neighboring solutions from 1 solution. The fitness function for each of the 4 solutions is calculated and the solution with the best fitness function (lowest value) is applied as the basic solution for the next step. Fig. 8 creation of neighboring solutions from the current solution Tabu List: To prevent a loop and quick convergence to a solution in tabu algorithms, creation of repeated solutions is prevented. For this purpose, a tabu list is employed. In each iteration, when a neighboring solution is chosen as the best solution, its corresponding change is recorded on the list. For example, if the solution is selected with a new channel assignment to link , pair ) will be recorded on the tabu list. If these changes are reselected in the later steps, their presence or absence on the tabu list is checked and they will be applied if absent. The values do not remain on the tabu list permanently and they are thus removed from the list after a specified time interval (after a certain number of running steps). For example, if in the second iteration of the algorithm, the value ) is recorded on the list and the lasting time is 10 iterations, then, the value 10 is given to pair ) on the tabu list. Figure 9 represents an example of a tabu list implemented by a table, the
  • 6. Zahra Shokouh et al. Int. Journal of Engineering Research and Applications www.ijera.com ISSN: 2248-9622, Vol. 5, Issue 7, (Part - 2) July 2015, pp.153-160 www.ijera.com 158 | P a g e rows and columns of which demonstrate the links and channels, respectively. Fig.9: A view of a tabu list After the end of the algorithm, the best value stored is selected as the optimal solution. However, all restrictions are not usually observed by this solution. It means that several nodes in the network are seen to have utilized more channels than their corresponding interfaces in the end. Therefore, this algorithm requires a second phase by which the nodes not having observed the limits are identified and the number of their channels is reduced to the number of their radio interfaces. 5.2 Advantages and disadvantages of the two algorithms • Genetic Algorithm (GA): As the search space of a genetic algorithm is a global space, i.e. it uses a global search, it is possible for one of the answers to approach the objective solution. the initial results are scattered at different points, each of which is improved until one ultimately reaches a general minimum value (objective). The main problem of a genetic algorithm related to the issue of channel assignment is its slow convergence to an optimal solution. According to what was said, a crossover function is used for the production of new offspring. This function selects a random point, on which two parent chromosomes are combined together in a crossover form. Since the crossover point is selected randomly and is not done intelligently, combining of two solutions sometimes provide solutions worse than the existing ones. • Tabu algorithm: A tabu method starts from a random point in the search space and tries to find an optimal solution in its neighborhood. In fact, a tabu algorithm performs a local search around that very initial result. Arriving at an optimal solution in a tabu algorithm depends on the initial selected solution to a large degree. The results of this study revealed that a tabu algorithm mostly occurs in a local minimum and an optimal solution cannot be achieved, i.e. all limits are not observed in the final answer obtained and a number of nodes will possess a greater number of channels than their interfaces. A tabu algorithm has the advantage of a rapid convergence to an answer. Since it uses a local search mostly around a point, it quickly reaches a minimum response close to that point, especially when the initial point is made near to the minimum objective. VII. Hybrid algorithm (GTSH) The advantage of a genetic algorithm is its global search and the use of multiple solutions scattered in the search space simultaneously. Tabu algorithm advantage relates to the rapid convergence of each solution to a near optimal solution. Combination of these two solutions produces a new hybrid algorithm called GTSH. The main structure of this algorithm is like the genetic algorithm. It utilizes both the property of a global search and multiple solutions at each step. Nevertheless, it does not use crossover and mutation functions to create new solutions at each step. Its method of generating offspring is based on a tabu algorithm. Several random solutions are generated in the first step, each of which is improved in parallel using the tabu algorithm. Since the solutions are scattered in the search space, it is possible that at least one solution approaches the minimum objective solution. This solution is improved until it reaches the objective solution and then the algorithm ends at this point. The process of producing the solution is shown in fig.10. Fig.10: An overview of the steps in a hybrid function VIII. Simulation To evaluate the proposed algorithm, a relative interference criterion was used. Relative interference is defined as the ratio of the number of interfering links after channel assignment to their number before channel assignment. At first, using the connectivity and interference graphs, the interference was calculated before channel assignment. After assignment of the channels, using the 3 genetic, tabu search, and hybrid algorithms, the degree of interference was calculated in the network.
  • 7. Zahra Shokouh et al. Int. Journal of Engineering Research and Applications www.ijera.com ISSN: 2248-9622, Vol. 5, Issue 7, (Part - 2) July 2015, pp.153-160 www.ijera.com 159 | P a g e The criterion for relative interference was a number smaller than 1. The more this number is closer to zero, the method used to assign the channels is more appropriate. Simulation parameters: After creation of a random network, 50 nodes with a dimension of 800 × 800 m2 were distributed. The degree of each node was 5, i.e. it was associated with 5 other nodes. Transmission and interference ranges were assumed to be equal for all the nodes. These ranges were considered to be 150 m and 300 m (double the transmission range), respectively. No two nodes could send their data within their own interference ranges simultaneously. Calculations were done based on IEEE 802.11b/g standard. In this standard, 3 orthogonal frequency channels existed. The coefficient values of and in the fitness function were set to 1000 and 1, respectively. The population size and mutation probability rate in GA were assumed to be 500 chromosomes and 0.01, respectively, the lasting time on the tabu list was set to 16 steps, and the number of neighboring solutions was regarded equal to the number of links at each step. These values were experimentally obtained using trial-and-error tests. MAC protocol used in NS-2 was based on CSMA/CA, which employed RTS/CTS mechanism and the routing protocol utilized was AODV protocol. Graph.1: Diagram of relative interference in a 3- channel mode IX. Conclusion and suggestions In this research, Genetic and Tabu Search Algorithms were assessed. These algorithms are from among centralized algorithms dealing with channel assignment in a static way. They employ random search methods to find optimal solutions. Genetic and tabu algorithms utilize population-based and local search methods, respectively. They greatly reduce the overall interference between wireless links within a mesh network, while this increases the end-to-end throughput of a network. The common problem with these two algorithms is their inabilities to find the main optimum solution and thus they do not often produce the desired result. Therefore, in this project, after careful consideration of these two algorithms, a new hybrid algorithm was presented, which tries to utilize their advantages and provide a better performance. In this research, interference was only considered as a factor affecting the throughput and reducing it was thus the aim of the selected algorithms. To this goal, it was assumed that the traffic load is equally distributed in all parts of the network, i.e. the traffic conditions are assimilated all over the network. Nonetheless, it is not mostly the case and the traffic conditions are not the same everywhere in the network. In addition to interference, the traffic load present at different parts of the network should be considered in channel assignment and in fact, a load- aware channel assignment should take place so as to attempt to further reduce interference at points with a more traffic load than any other parts in the network. This requires combining the two layers of MAC and routing to allow the algorithms to work on them together. REFERENCES [1] Krishnamurthy.L, Conner.S, Yarvis.M, Chhabra.J Ellison.C, Brabenac.C, Tsui.E,'' Meeting the demands of the digital home with high-speed multi-hop wireless networks'', Journal Of Intel Technology,Vol.4, No.6, pp.57-68, 2002. [2] Yong Ding, Li Xiao, " Channel allocation in multi-channel wireless mesh networks", ScienceDirect Computer Communications, Vol.54,No.1,pp.803–815, 2011. [3] Y. Ding, Y. Huang, G. Zeng, L. Xiao, ''Using Partially Overlapping Channel to Improve Throughput in Wireless Mesh Network'', IEEE Transactions on Mobile computing, Vol.11, No.11, pp.1720-1733, 2012 [4] Zhang. Y, Luo. J, Hu. H, ''Wireless mesh networking architectures protocols and standards'', Auerbach Publications is an imprint of the Taylor & Francis Group, an informa business, 2007. [5] Akyildiz. I, Wang. X, and Wang. W ,''Wireless mesh networks: a survey", Computer Networks, Vol.47, No.5, pp.445- 487, 2005. [6] G.Zeng, B. Wang, Y. Ding, L.Xiao, M. W. Mutka, ''Efficient Multicast Algorithms for Multi Channel Wireless Mesh networks", IEEE Transactions on parallel and Distributed Systems, Vol.21, pp.86-99, 2010. [7] A. P. Subramanian, H. Gupta, S. R. Das, J. Cao, " Minimum Interference Channel Assignment in Multi-Radio Wireless Mesh Networks”, in Fourth Annual IEEE Communications Society Conference on
  • 8. Zahra Shokouh et al. Int. Journal of Engineering Research and Applications www.ijera.com ISSN: 2248-9622, Vol. 5, Issue 7, (Part - 2) July 2015, pp.153-160 www.ijera.com 160 | P a g e Sensor, Mesh, and AdHoc Communications and Networks(SECON2007), 2008. [8] A. Pal, A. Nasipuri, '' JRCA: A joint routing and channel assignment scheme for wireless mesh networks", IEEE IPCCC, pp. 1-8, 2011. [9] J. Shi, T. Salonidis, and E. Knightly, ''Starvation Mitigation through Multi-Channel Coordination in CSMA Multi-Hop Wireless Networks'' ,Proc. ACM MobiHoc, 2006. [10]R. Draves J. Padhye, B. Zill, ''Routing in multi-radio multi-hop wireless mesh networks'', In MobiCom '04: Proceedings of the 10th Annual International Conference on Mobile computing and networking , pp. 114- 128, 2004. [11]Wei wang, Jun Zhang and Supeng Huang. “Optimization of Static Channel Assignment in Multi-Radio Multi-Channel Wireless Mesh Network”, ICCS 2008, pp. 71-75, 2008. [12]Li Zhang, Xinheng Wang, Caixing Liu, “Channel Assignment in Multi-Radio Multi- Channel Wireless Mesh Network by Topology Approach”, Proc. 2009 international conference on communication and mobile, 2009.