SlideShare a Scribd company logo
1 of 3
Download to read offline
International Journal of Science and Research (IJSR)
ISSN (Online): 2319-7064
Index Copernicus Value (2013): 6.14 | Impact Factor (2013): 4.438
Volume 4 Issue 1, January 2015
www.ijsr.net
Licensed Under Creative Commons Attribution CC BY
A Review on Coexistence of WI-FI and WIMAX
Using Simulation OF HMM
Gourav Gupta1
, Garima Khanna2
1
Associate Professor, MIT Ujjain, Madhya Pradesh, India
2
PG Student, MIT, Ujjain, Madhya Pradesh, India
Abstract: In the past few years the Wireless local area Network (WLAN) has been the most popular selection of communication among
users. WLAN that is based on the IEEE 802.11standard additionally referred to as wireless fidelity (Wi-Fi), offers quality and flexibility
with a comparatively low value tousers. Additionally, wireless technology is providing easier web access that is too tough and expensive
to reach with ancient wired infrastructure. IEEE 802.16, additionally referred to as Worldwide Interoperability for Microwave Access
(WiMAX), is another standard with similar general principles as WIFI with the most blessings being it covers bigger area and contains a
higher rate. WLAN and WiMax beneath optimum conditions when compared, the quickest WLAN association is 54 megabits/sec
whereas WiMAX is regarding 75Mbit/s. WLAN contains vary of regarding 30 meters and WiMAX will cover up to 50 kilometers.
Although WiMAX greatly outperforms Wi-Fi, user devices like desktops, laptops and cell phones got to have WiMAX capability to be
able to hook up with WiMAX sources. Currently, not several user devices have WiMAX capability; the majority has Wi-Fi capability.
This paper describes the approaches for enabling the coexistence of WiFi and wimax in unlicensed ISM spectrum. We will begin with
learning HMM (hidden markov model) supported traces of the network. Then comes the estimation of performance of Wi-Fi in presence
of interference from WIMAX. In conclusion we are going to develop unique frame management protocol Known as HMM driven white
space aware frame management protocol for coexistence of Wi-Fi and wimax.
Keywords: WiFi, Wimax, coexistence, HMM, white space
1. Introduction
The coexistence in ISM band of different wireless systems is
a hot topic. Many related works has been done for
coexistence of different wireless systems. “Coexistence,”
may be defined as ability for many protocols to operate in
the same frequency band without significant degradation to
either’s operation, has recently become a important topic of
analysis. The reason may be that Both protocols are
expecting rapid growth, and because they both operate in the
2.4 GHz frequency band, the chances for interference
between them is high. Wi-Fi could potentially experience
interference from WiMax traffic given that while both
protocols can transmit on the same channel, WiMax
transmissions usually occur at much higher power level.
2. WIMAX
IEEE 802.16 [1] could be a radio standard for WMANs
operational within the frequencies between 2 and 11
gigahertz usually brought up as a WiMAX. It specifies four
totally different physical layer (PHYs), whereas during this
paper the OFDM layer is taken into account
solely.IEEE802.16 includes a centralized design provided by
a central Base Station (BS) with associated Subscriber
Stations (SS). Typically, a SB is connected either directly or
Via further BSs to the core network. 802.16offer so
associate degree no mandatory mesh preparation that
introduces multi-hop connections via relaying BSs. With its
centrally controlled, frame primarily based Mack
approach802.16 offers warranted multimedia system Quos.
802.16 supports non line-of-sight operation and large
coverage areas, that allows a apace deployable
infrastructure. WiMAX operates in between ten and sixty six
gigahertz Line of Sight (LOS) at a variety up to fifty
kilometer (30 miles) and a pair of to 11GHz non Line-of-
Sight (NLOS) usually - ten kilometer (4 - 6 miles) Each
fastened client premises instrumentation (CPE).Each the
fastened and mobile standards embrace the authorized (2.5,
3.5, and 10.5 GHz) and unauthorized (2.4 and 5.8 GHz)
frequency spectrum.
3. WI-FI
Wi-Fi[3] stands for “wireless fidelity” but since most of our
WLANs area unit supported those standards, the term Wi-Fi
is employed usually as a word for LAN. Wi-Fi may be a
standard technology that permits any device to exchange and
transfer information wirelessly over the network giving rise
to high speed net connections. Any device that is Wi-Fi
enabled (like personal computers, game consoles,
Smartphone, tablet etc.) will connect with a network
resource just like the net through a wireless network access
purpose. Currently such access points additionally referred
to as hotspots have a coverage space of regarding twenty
meters inside and even a larger space vary outdoors, this is
often achieved by victimisation multiple overlapping access
points (Chan,2005),(Intel house,2003).
However with all such options, Wi-Fi additionally suffers
from bound shortcomings. Wi-Fi is understood to be less
secure than wired affiliations (such as Ethernet) as a result of
associate trespasser doesn't want a physical connection. Sites
that use SSL area unit secure however unencrypted net
access will simply be detected by intruders. As a result of
this, Wi-Fi has adopted numerous cryptography
technologies. The first cryptography WEP, proved
straightforward to interrupt. Higher quality protocols (WPA,
WPA2) were supplemental in a while. associate elective
feature supplemental in 2007, known as Wi-Fi Protected
Setup(WPS) was deployed, however it additionally had a
Paper ID: SUB1540 368
International Journal of Science and Research (IJSR)
ISSN (Online): 2319-7064
Index Copernicus Value (2013): 6.14 | Impact Factor (2013): 4.438
Volume 4 Issue 1, January 2015
www.ijsr.net
Licensed Under Creative Commons Attribution CC BY
significant flaw that allowed associate assailant to recover
the router's positive identification. The Wi-Fi Alliance has
since updated its check set up and certification program to
make sure all recently certified devices resist attacks. How
ever security remains a significant concern. There are three
802.11 wireless family customary wide used nowadays.
Figure 1
4. White Space
White space refers to the unused broadcasting frequencies
within the wireless spectrum. TV networks leave gaps
between channels for buffering functions, and this house
within the wireless spectrum is analogous to what is used for
4G and then it are often accustomed deliver widespread
broad-band net. The Federal Communications Commission
(FCC) recently united to guage the legal operation of
unaccr-edited devices in “white spaces”, i.e., parts of the
commissioned TV bands that don't seem to be in active use
by incumbent users, like the TV broadcasters[4], [5]. Sub-
GHz spect-rum has several properties appropriate for
electronic communication. Systems should have a sturdy
theme for determining the white-spaces, and second, these
systems should have a spectrum-aware protocol that utilizes
white-spaces of varied bandwidths The arrival of Wi-Fi
frames is very bursty and clustered. We tend to observe that
frames square measure clustered at the side of short intervals
typically but one ms, whereas the idle periods between
clusters square measure considerably longer. The short
frame intervals square measure attributed to the layer
competition mechanism of 802.11, within which senders go
into reverse for a brief random time before every
transmission. we tend to outline the interval between frame
clusters as inter-cluster space whiles the interval between the
frames among identical cluster as intra-cluster space.
Moreover, white space hereafter refers to inter-cluster space
unless otherwise indicated.
Figure 2
5. HMM (Hidden Markov Model)
We will 1st study the Vilfredo Pareto Model of LAN white
area projected in [6], and so we'll propose our advanced
HMM model of WiMax white space. Earlier projected
Vilfredo Pareto Model of Wi-Fi white area supported the
actual fact that the arrival method of Wi-Fi frame clusters
has the feature of self-similarity and consistent with [6], the
self-similarity could be a feature of beginning method with
heavy-tailed inter-arrival time. Projected model says that
each one white space at intervals window follows Vilfredo
Pareto distribution: Hear α and β area unit the size and form
of Vilfredo Pareto model and x is the time of the white
space. They set α to one time unit. In Vilfredo Pareto model,
β is about by λ / (λ-α),wherever λ is that the average inter-
onset time of frame cluster. Fig. three shows Associate in
Nursing example of HMM. In an HMM, there area unit a
collection of states say , every state has Associate in Nursing
initial state probability that determines that state would be a
lot of possible to be the primary state. And every state
contains a probabilistic distribution of its observation
vectors. We tend to adopt to explain the parameters of the
states distributions. The transition chance matrix M
wherever Mij = Pr(S(t+1)=Sj ǀ S(t)=Si) determines however
a state may transit to a different state. we are going to 1st
study the Vilfredo Pareto Model of LAN white space
proposed in [6], and so we'll propose our advanced HMM
model of Wi-Fi white space. Earlier projected Vilfredo
Pareto Model of Wi- Fi white area supported the actual fact
that the arrival method of Wi-Fi frame clusters has the
feature of self-similarity and according to [6], the self-
similarity could be a feature of beginning method with
heavy-tailed inter-arrival time. projected model says that
each one white area at intervals window follows Vilfredo
Pareto distribution i.e. Hear α and β area unit the size and
form of Vilfredo Pareto model and x is that the time of the
white area. They set α to one time unit.
Figure 2: An example of HMM
In Pareto model, β is about by λ / (λ-α), wherever λ is that
the average inter-onset time of frame cluster. Fig.three
shows Associate in Nursing example of HMM. In an HMM,
there area unit a collection of states say , every state has
Associate in Nursing initial state probability that determines
that state would be a lot of possible to be the primary state.
And every state contains a probabilistic distribution of its
observation vectors. we tend to adopt to explain the
parameters of the states distributions. The transition chance
matrix M wherever Mij = Pr(S(t+1)=Sj ǀ S(t)=Si) determines
however a state may transit to a different state. The states
area unit hidden, rather we are able to infer them from the
observations by HMM illation algorithmic program. Let the
durations of the white areas (Δt1, Δt2, Δt3,...,ΔtN) is the
observation sequence (O1,O2,O3,...,ON) .Using the Vilfredo
Pareto model because the observation distribution for every
state. With preobtained information traces of the traffic
Paper ID: SUB1540 369
International Journal of Science and Research (IJSR)
ISSN (Online): 2319-7064
Index Copernicus Value (2013): 6.14 | Impact Factor (2013): 4.438
Volume 4 Issue 1, January 2015
www.ijsr.net
Licensed Under Creative Commons Attribution CC BY
within the current network, we are able to learn all the
parameters of this HMM model.
6. Conclusion
This paper has bestowed an explicit description of two of the
foremost outstanding developing wireless access networks
Associate in nursing the even mentioned on however these
technologies might collaborate along to create alternatives
for implementing last-mile wireless broadband services.
Careful technical comparative analysis between the 802.11
(Wi-Fi) and 802.16 (WiMAX) wireless networks that offer
various answer to the matter of data access in remote
inaccessible areas wherever wired networks aren't value
effective has been looked into. This work has verified that
the WiMAX commonplace goal isn't to switch WiFiin its
applications however rather to supplement it so as to create a
wireless network net.
References
[1] Intel Corp, “IEEE 802.16 and WiMAX: Broadband
Wireless Access for Everyone”, [Online] Available
http://
www.intel.com/ebusiness/pdf/wireless/intel/80216_wima
x.pdf (2003).
[2] S. Mangold, J. Habetha, S. Choi, and C. Ngo, "Co-
existence and Interworking of IEEE 802.11a and ETSI
BRAN HiperLAN/2 in MultiHop Scenarios," in Proc. of
IEEE 3rd Workshop in Wireless Local Area Networks,
Boston, USA, 27-28 September 2001
[3] Wireless LAN Medium Access Control (MAC) and
Physical Layer (PHY) Specifications, IEEE Std
802.11,2007
[4] Fcc, unlicenced Operation in TV transmission band
become aware of Proposed Rulemaking (NPRM), ET
Docket No. 04-186, May, 2004.
[5] Office of Engineering and Technology. “Projected
Schedule for Proceeding on Unlicensed Operation in the
TV Broadcast Bands” , 2006.
[6] Jun Huang, Guoliang Xing, Gang Zhou, Ruogu Zhou.
Beyond Coexistence: Exploiting WiFi White Space for
ZigBee Performance Assurance. In ICNP, 2010
[7] HMM-driven Smart White Space-aware Frame Control
Protocol for Coexistence of ZigBee and WiFiJieYuan ,
Department of Computer Science , Oklahoma State
University, USA ,IEEE journal,2013
Paper ID: SUB1540 370

More Related Content

What's hot

A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...
A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...
A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...ijeei-iaes
 
BER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONS
BER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONSBER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONS
BER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONSijistjournal
 
Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...eSAT Publishing House
 
A Review of Network Layer Attacks and Countermeasures in WSN
A Review of Network Layer Attacks and Countermeasures in WSNA Review of Network Layer Attacks and Countermeasures in WSN
A Review of Network Layer Attacks and Countermeasures in WSNiosrjce
 
A Hybrid Approach for Performance Enhancement of VANET using CSMA-MACA: a Review
A Hybrid Approach for Performance Enhancement of VANET using CSMA-MACA: a ReviewA Hybrid Approach for Performance Enhancement of VANET using CSMA-MACA: a Review
A Hybrid Approach for Performance Enhancement of VANET using CSMA-MACA: a Reviewiosrjce
 
To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...
To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...
To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...IRJET Journal
 
COMPUTER NETWORKS - SHORT NOTES
COMPUTER NETWORKS - SHORT NOTESCOMPUTER NETWORKS - SHORT NOTES
COMPUTER NETWORKS - SHORT NOTESsuthi
 
Detection and prevention of wormhole attack in mobile adhoc networks
Detection and prevention of wormhole attack in mobile adhoc networksDetection and prevention of wormhole attack in mobile adhoc networks
Detection and prevention of wormhole attack in mobile adhoc networksambitlick
 
Mobile ad hoc network
Mobile ad hoc networkMobile ad hoc network
Mobile ad hoc networkskobu
 
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...ijsrd.com
 
Heterogeneous Networks(HetNets)
Heterogeneous Networks(HetNets)Heterogeneous Networks(HetNets)
Heterogeneous Networks(HetNets)MNIT Jaipur
 
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Editor IJCATR
 

What's hot (15)

A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...
A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...
A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...
 
BER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONS
BER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONSBER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONS
BER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONS
 
Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...
 
A Review of Network Layer Attacks and Countermeasures in WSN
A Review of Network Layer Attacks and Countermeasures in WSNA Review of Network Layer Attacks and Countermeasures in WSN
A Review of Network Layer Attacks and Countermeasures in WSN
 
1410
14101410
1410
 
A Hybrid Approach for Performance Enhancement of VANET using CSMA-MACA: a Review
A Hybrid Approach for Performance Enhancement of VANET using CSMA-MACA: a ReviewA Hybrid Approach for Performance Enhancement of VANET using CSMA-MACA: a Review
A Hybrid Approach for Performance Enhancement of VANET using CSMA-MACA: a Review
 
Bi36358362
Bi36358362Bi36358362
Bi36358362
 
Br33421423
Br33421423Br33421423
Br33421423
 
To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...
To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...
To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...
 
COMPUTER NETWORKS - SHORT NOTES
COMPUTER NETWORKS - SHORT NOTESCOMPUTER NETWORKS - SHORT NOTES
COMPUTER NETWORKS - SHORT NOTES
 
Detection and prevention of wormhole attack in mobile adhoc networks
Detection and prevention of wormhole attack in mobile adhoc networksDetection and prevention of wormhole attack in mobile adhoc networks
Detection and prevention of wormhole attack in mobile adhoc networks
 
Mobile ad hoc network
Mobile ad hoc networkMobile ad hoc network
Mobile ad hoc network
 
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
 
Heterogeneous Networks(HetNets)
Heterogeneous Networks(HetNets)Heterogeneous Networks(HetNets)
Heterogeneous Networks(HetNets)
 
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
 

Viewers also liked

Viewers also liked (16)

Sub1525
Sub1525Sub1525
Sub1525
 
Carbon Financing for Renewable Energy Projects in Zimbabwe – A Case of Chipen...
Carbon Financing for Renewable Energy Projects in Zimbabwe – A Case of Chipen...Carbon Financing for Renewable Energy Projects in Zimbabwe – A Case of Chipen...
Carbon Financing for Renewable Energy Projects in Zimbabwe – A Case of Chipen...
 
Sub1571
Sub1571Sub1571
Sub1571
 
Sub1520
Sub1520Sub1520
Sub1520
 
Assessment and Mitigation of Risks Involved in Electronics Payment Systems
Assessment and Mitigation of Risks Involved in Electronics Payment Systems Assessment and Mitigation of Risks Involved in Electronics Payment Systems
Assessment and Mitigation of Risks Involved in Electronics Payment Systems
 
Sub1536
Sub1536Sub1536
Sub1536
 
Sub1522
Sub1522Sub1522
Sub1522
 
Unascended Left Kidney with Malrotation: A Rare Congenital Anomaly
Unascended Left Kidney with Malrotation: A Rare Congenital AnomalyUnascended Left Kidney with Malrotation: A Rare Congenital Anomaly
Unascended Left Kidney with Malrotation: A Rare Congenital Anomaly
 
Predicting Movie Success Using Neural Network
Predicting Movie Success Using Neural NetworkPredicting Movie Success Using Neural Network
Predicting Movie Success Using Neural Network
 
Effects of Risk Management Practices on the Performance of Insurance Firms in...
Effects of Risk Management Practices on the Performance of Insurance Firms in...Effects of Risk Management Practices on the Performance of Insurance Firms in...
Effects of Risk Management Practices on the Performance of Insurance Firms in...
 
Sub1521
Sub1521Sub1521
Sub1521
 
Effects of Spondias Mombin Leaf Extract on the Cytoarchitecture of the Cereba...
Effects of Spondias Mombin Leaf Extract on the Cytoarchitecture of the Cereba...Effects of Spondias Mombin Leaf Extract on the Cytoarchitecture of the Cereba...
Effects of Spondias Mombin Leaf Extract on the Cytoarchitecture of the Cereba...
 
Caspase Dependent Apoptosis is Only Inhibited on Γ Irradiation of Cells Condi...
Caspase Dependent Apoptosis is Only Inhibited on Γ Irradiation of Cells Condi...Caspase Dependent Apoptosis is Only Inhibited on Γ Irradiation of Cells Condi...
Caspase Dependent Apoptosis is Only Inhibited on Γ Irradiation of Cells Condi...
 
Sub14249
Sub14249Sub14249
Sub14249
 
Proposing an Encryption Algorithm based on DES
Proposing an Encryption Algorithm based on DESProposing an Encryption Algorithm based on DES
Proposing an Encryption Algorithm based on DES
 
Study on Emotional Maturity and Coping Strategies among the Students Pursuing...
Study on Emotional Maturity and Coping Strategies among the Students Pursuing...Study on Emotional Maturity and Coping Strategies among the Students Pursuing...
Study on Emotional Maturity and Coping Strategies among the Students Pursuing...
 

Similar to Sub1540

A countermeasure for flooding
A countermeasure for floodingA countermeasure for flooding
A countermeasure for floodingijcsa
 
53415140 a-paper-presentation-on-wimax
53415140 a-paper-presentation-on-wimax53415140 a-paper-presentation-on-wimax
53415140 a-paper-presentation-on-wimaxSuneel Dogra
 
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKS
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKSTHE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKS
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKSijwmn
 
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...IOSR Journals
 
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...IOSR Journals
 
Latest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless SecurityLatest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless SecurityIOSR Journals
 
Analysis of wifi and wimax and wireless network coexistence
Analysis of wifi and wimax and wireless network coexistenceAnalysis of wifi and wimax and wireless network coexistence
Analysis of wifi and wimax and wireless network coexistenceIJCNCJournal
 
BER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONS
BER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONSBER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONS
BER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONSijistjournal
 
Presentation of-wimax
Presentation of-wimaxPresentation of-wimax
Presentation of-wimaxRubab Fatima
 
Brief introduction of wi max technology
Brief introduction of wi max technologyBrief introduction of wi max technology
Brief introduction of wi max technologyMd. Tamim Haider
 
Paper id 2720146
Paper id 2720146Paper id 2720146
Paper id 2720146IJRAT
 
Ct3210321037
Ct3210321037Ct3210321037
Ct3210321037IJMER
 
WI-FI and Wi Max
WI-FI and Wi MaxWI-FI and Wi Max
WI-FI and Wi MaxSiyad Ca
 
Seamless ho within wifi wimax
Seamless ho within wifi wimaxSeamless ho within wifi wimax
Seamless ho within wifi wimaxWily Langit
 

Similar to Sub1540 (20)

A countermeasure for flooding
A countermeasure for floodingA countermeasure for flooding
A countermeasure for flooding
 
IJET-V2I6P3
IJET-V2I6P3IJET-V2I6P3
IJET-V2I6P3
 
53415140 a-paper-presentation-on-wimax
53415140 a-paper-presentation-on-wimax53415140 a-paper-presentation-on-wimax
53415140 a-paper-presentation-on-wimax
 
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKS
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKSTHE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKS
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKS
 
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
 
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
 
Latest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless SecurityLatest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless Security
 
Analysis of wifi and wimax and wireless network coexistence
Analysis of wifi and wimax and wireless network coexistenceAnalysis of wifi and wimax and wireless network coexistence
Analysis of wifi and wimax and wireless network coexistence
 
BER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONS
BER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONSBER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONS
BER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONS
 
Presentation of-wimax
Presentation of-wimaxPresentation of-wimax
Presentation of-wimax
 
Whitepaper WiFi Meshing
Whitepaper WiFi MeshingWhitepaper WiFi Meshing
Whitepaper WiFi Meshing
 
Brief introduction of wi max technology
Brief introduction of wi max technologyBrief introduction of wi max technology
Brief introduction of wi max technology
 
Paper id 2720146
Paper id 2720146Paper id 2720146
Paper id 2720146
 
Ct3210321037
Ct3210321037Ct3210321037
Ct3210321037
 
Advanced Networking on GloMoSim
Advanced Networking on GloMoSimAdvanced Networking on GloMoSim
Advanced Networking on GloMoSim
 
WI-FI and Wi Max
WI-FI and Wi MaxWI-FI and Wi Max
WI-FI and Wi Max
 
Wi max by yogijicreations
Wi max by yogijicreationsWi max by yogijicreations
Wi max by yogijicreations
 
Aj32242252
Aj32242252Aj32242252
Aj32242252
 
Wimax 2
Wimax 2Wimax 2
Wimax 2
 
Seamless ho within wifi wimax
Seamless ho within wifi wimaxSeamless ho within wifi wimax
Seamless ho within wifi wimax
 

More from International Journal of Science and Research (IJSR)

More from International Journal of Science and Research (IJSR) (20)

Innovations in the Diagnosis and Treatment of Chronic Heart Failure
Innovations in the Diagnosis and Treatment of Chronic Heart FailureInnovations in the Diagnosis and Treatment of Chronic Heart Failure
Innovations in the Diagnosis and Treatment of Chronic Heart Failure
 
Design and implementation of carrier based sinusoidal pwm (bipolar) inverter
Design and implementation of carrier based sinusoidal pwm (bipolar) inverterDesign and implementation of carrier based sinusoidal pwm (bipolar) inverter
Design and implementation of carrier based sinusoidal pwm (bipolar) inverter
 
Polarization effect of antireflection coating for soi material system
Polarization effect of antireflection coating for soi material systemPolarization effect of antireflection coating for soi material system
Polarization effect of antireflection coating for soi material system
 
Image resolution enhancement via multi surface fitting
Image resolution enhancement via multi surface fittingImage resolution enhancement via multi surface fitting
Image resolution enhancement via multi surface fitting
 
Ad hoc networks technical issues on radio links security & qo s
Ad hoc networks technical issues on radio links security & qo sAd hoc networks technical issues on radio links security & qo s
Ad hoc networks technical issues on radio links security & qo s
 
Microstructure analysis of the carbon nano tubes aluminum composite with diff...
Microstructure analysis of the carbon nano tubes aluminum composite with diff...Microstructure analysis of the carbon nano tubes aluminum composite with diff...
Microstructure analysis of the carbon nano tubes aluminum composite with diff...
 
Improving the life of lm13 using stainless spray ii coating for engine applic...
Improving the life of lm13 using stainless spray ii coating for engine applic...Improving the life of lm13 using stainless spray ii coating for engine applic...
Improving the life of lm13 using stainless spray ii coating for engine applic...
 
An overview on development of aluminium metal matrix composites with hybrid r...
An overview on development of aluminium metal matrix composites with hybrid r...An overview on development of aluminium metal matrix composites with hybrid r...
An overview on development of aluminium metal matrix composites with hybrid r...
 
Pesticide mineralization in water using silver nanoparticles incorporated on ...
Pesticide mineralization in water using silver nanoparticles incorporated on ...Pesticide mineralization in water using silver nanoparticles incorporated on ...
Pesticide mineralization in water using silver nanoparticles incorporated on ...
 
Comparative study on computers operated by eyes and brain
Comparative study on computers operated by eyes and brainComparative study on computers operated by eyes and brain
Comparative study on computers operated by eyes and brain
 
T s eliot and the concept of literary tradition and the importance of allusions
T s eliot and the concept of literary tradition and the importance of allusionsT s eliot and the concept of literary tradition and the importance of allusions
T s eliot and the concept of literary tradition and the importance of allusions
 
Effect of select yogasanas and pranayama practices on selected physiological ...
Effect of select yogasanas and pranayama practices on selected physiological ...Effect of select yogasanas and pranayama practices on selected physiological ...
Effect of select yogasanas and pranayama practices on selected physiological ...
 
Grid computing for load balancing strategies
Grid computing for load balancing strategiesGrid computing for load balancing strategies
Grid computing for load balancing strategies
 
A new algorithm to improve the sharing of bandwidth
A new algorithm to improve the sharing of bandwidthA new algorithm to improve the sharing of bandwidth
A new algorithm to improve the sharing of bandwidth
 
Main physical causes of climate change and global warming a general overview
Main physical causes of climate change and global warming   a general overviewMain physical causes of climate change and global warming   a general overview
Main physical causes of climate change and global warming a general overview
 
Performance assessment of control loops
Performance assessment of control loopsPerformance assessment of control loops
Performance assessment of control loops
 
Capital market in bangladesh an overview
Capital market in bangladesh an overviewCapital market in bangladesh an overview
Capital market in bangladesh an overview
 
Faster and resourceful multi core web crawling
Faster and resourceful multi core web crawlingFaster and resourceful multi core web crawling
Faster and resourceful multi core web crawling
 
Extended fuzzy c means clustering algorithm in segmentation of noisy images
Extended fuzzy c means clustering algorithm in segmentation of noisy imagesExtended fuzzy c means clustering algorithm in segmentation of noisy images
Extended fuzzy c means clustering algorithm in segmentation of noisy images
 
Parallel generators of pseudo random numbers with control of calculation errors
Parallel generators of pseudo random numbers with control of calculation errorsParallel generators of pseudo random numbers with control of calculation errors
Parallel generators of pseudo random numbers with control of calculation errors
 

Sub1540

  • 1. International Journal of Science and Research (IJSR) ISSN (Online): 2319-7064 Index Copernicus Value (2013): 6.14 | Impact Factor (2013): 4.438 Volume 4 Issue 1, January 2015 www.ijsr.net Licensed Under Creative Commons Attribution CC BY A Review on Coexistence of WI-FI and WIMAX Using Simulation OF HMM Gourav Gupta1 , Garima Khanna2 1 Associate Professor, MIT Ujjain, Madhya Pradesh, India 2 PG Student, MIT, Ujjain, Madhya Pradesh, India Abstract: In the past few years the Wireless local area Network (WLAN) has been the most popular selection of communication among users. WLAN that is based on the IEEE 802.11standard additionally referred to as wireless fidelity (Wi-Fi), offers quality and flexibility with a comparatively low value tousers. Additionally, wireless technology is providing easier web access that is too tough and expensive to reach with ancient wired infrastructure. IEEE 802.16, additionally referred to as Worldwide Interoperability for Microwave Access (WiMAX), is another standard with similar general principles as WIFI with the most blessings being it covers bigger area and contains a higher rate. WLAN and WiMax beneath optimum conditions when compared, the quickest WLAN association is 54 megabits/sec whereas WiMAX is regarding 75Mbit/s. WLAN contains vary of regarding 30 meters and WiMAX will cover up to 50 kilometers. Although WiMAX greatly outperforms Wi-Fi, user devices like desktops, laptops and cell phones got to have WiMAX capability to be able to hook up with WiMAX sources. Currently, not several user devices have WiMAX capability; the majority has Wi-Fi capability. This paper describes the approaches for enabling the coexistence of WiFi and wimax in unlicensed ISM spectrum. We will begin with learning HMM (hidden markov model) supported traces of the network. Then comes the estimation of performance of Wi-Fi in presence of interference from WIMAX. In conclusion we are going to develop unique frame management protocol Known as HMM driven white space aware frame management protocol for coexistence of Wi-Fi and wimax. Keywords: WiFi, Wimax, coexistence, HMM, white space 1. Introduction The coexistence in ISM band of different wireless systems is a hot topic. Many related works has been done for coexistence of different wireless systems. “Coexistence,” may be defined as ability for many protocols to operate in the same frequency band without significant degradation to either’s operation, has recently become a important topic of analysis. The reason may be that Both protocols are expecting rapid growth, and because they both operate in the 2.4 GHz frequency band, the chances for interference between them is high. Wi-Fi could potentially experience interference from WiMax traffic given that while both protocols can transmit on the same channel, WiMax transmissions usually occur at much higher power level. 2. WIMAX IEEE 802.16 [1] could be a radio standard for WMANs operational within the frequencies between 2 and 11 gigahertz usually brought up as a WiMAX. It specifies four totally different physical layer (PHYs), whereas during this paper the OFDM layer is taken into account solely.IEEE802.16 includes a centralized design provided by a central Base Station (BS) with associated Subscriber Stations (SS). Typically, a SB is connected either directly or Via further BSs to the core network. 802.16offer so associate degree no mandatory mesh preparation that introduces multi-hop connections via relaying BSs. With its centrally controlled, frame primarily based Mack approach802.16 offers warranted multimedia system Quos. 802.16 supports non line-of-sight operation and large coverage areas, that allows a apace deployable infrastructure. WiMAX operates in between ten and sixty six gigahertz Line of Sight (LOS) at a variety up to fifty kilometer (30 miles) and a pair of to 11GHz non Line-of- Sight (NLOS) usually - ten kilometer (4 - 6 miles) Each fastened client premises instrumentation (CPE).Each the fastened and mobile standards embrace the authorized (2.5, 3.5, and 10.5 GHz) and unauthorized (2.4 and 5.8 GHz) frequency spectrum. 3. WI-FI Wi-Fi[3] stands for “wireless fidelity” but since most of our WLANs area unit supported those standards, the term Wi-Fi is employed usually as a word for LAN. Wi-Fi may be a standard technology that permits any device to exchange and transfer information wirelessly over the network giving rise to high speed net connections. Any device that is Wi-Fi enabled (like personal computers, game consoles, Smartphone, tablet etc.) will connect with a network resource just like the net through a wireless network access purpose. Currently such access points additionally referred to as hotspots have a coverage space of regarding twenty meters inside and even a larger space vary outdoors, this is often achieved by victimisation multiple overlapping access points (Chan,2005),(Intel house,2003). However with all such options, Wi-Fi additionally suffers from bound shortcomings. Wi-Fi is understood to be less secure than wired affiliations (such as Ethernet) as a result of associate trespasser doesn't want a physical connection. Sites that use SSL area unit secure however unencrypted net access will simply be detected by intruders. As a result of this, Wi-Fi has adopted numerous cryptography technologies. The first cryptography WEP, proved straightforward to interrupt. Higher quality protocols (WPA, WPA2) were supplemental in a while. associate elective feature supplemental in 2007, known as Wi-Fi Protected Setup(WPS) was deployed, however it additionally had a Paper ID: SUB1540 368
  • 2. International Journal of Science and Research (IJSR) ISSN (Online): 2319-7064 Index Copernicus Value (2013): 6.14 | Impact Factor (2013): 4.438 Volume 4 Issue 1, January 2015 www.ijsr.net Licensed Under Creative Commons Attribution CC BY significant flaw that allowed associate assailant to recover the router's positive identification. The Wi-Fi Alliance has since updated its check set up and certification program to make sure all recently certified devices resist attacks. How ever security remains a significant concern. There are three 802.11 wireless family customary wide used nowadays. Figure 1 4. White Space White space refers to the unused broadcasting frequencies within the wireless spectrum. TV networks leave gaps between channels for buffering functions, and this house within the wireless spectrum is analogous to what is used for 4G and then it are often accustomed deliver widespread broad-band net. The Federal Communications Commission (FCC) recently united to guage the legal operation of unaccr-edited devices in “white spaces”, i.e., parts of the commissioned TV bands that don't seem to be in active use by incumbent users, like the TV broadcasters[4], [5]. Sub- GHz spect-rum has several properties appropriate for electronic communication. Systems should have a sturdy theme for determining the white-spaces, and second, these systems should have a spectrum-aware protocol that utilizes white-spaces of varied bandwidths The arrival of Wi-Fi frames is very bursty and clustered. We tend to observe that frames square measure clustered at the side of short intervals typically but one ms, whereas the idle periods between clusters square measure considerably longer. The short frame intervals square measure attributed to the layer competition mechanism of 802.11, within which senders go into reverse for a brief random time before every transmission. we tend to outline the interval between frame clusters as inter-cluster space whiles the interval between the frames among identical cluster as intra-cluster space. Moreover, white space hereafter refers to inter-cluster space unless otherwise indicated. Figure 2 5. HMM (Hidden Markov Model) We will 1st study the Vilfredo Pareto Model of LAN white area projected in [6], and so we'll propose our advanced HMM model of WiMax white space. Earlier projected Vilfredo Pareto Model of Wi-Fi white area supported the actual fact that the arrival method of Wi-Fi frame clusters has the feature of self-similarity and consistent with [6], the self-similarity could be a feature of beginning method with heavy-tailed inter-arrival time. Projected model says that each one white space at intervals window follows Vilfredo Pareto distribution: Hear α and β area unit the size and form of Vilfredo Pareto model and x is the time of the white space. They set α to one time unit. In Vilfredo Pareto model, β is about by λ / (λ-α),wherever λ is that the average inter- onset time of frame cluster. Fig. three shows Associate in Nursing example of HMM. In an HMM, there area unit a collection of states say , every state has Associate in Nursing initial state probability that determines that state would be a lot of possible to be the primary state. And every state contains a probabilistic distribution of its observation vectors. We tend to adopt to explain the parameters of the states distributions. The transition chance matrix M wherever Mij = Pr(S(t+1)=Sj ǀ S(t)=Si) determines however a state may transit to a different state. we are going to 1st study the Vilfredo Pareto Model of LAN white space proposed in [6], and so we'll propose our advanced HMM model of Wi-Fi white space. Earlier projected Vilfredo Pareto Model of Wi- Fi white area supported the actual fact that the arrival method of Wi-Fi frame clusters has the feature of self-similarity and according to [6], the self- similarity could be a feature of beginning method with heavy-tailed inter-arrival time. projected model says that each one white area at intervals window follows Vilfredo Pareto distribution i.e. Hear α and β area unit the size and form of Vilfredo Pareto model and x is that the time of the white area. They set α to one time unit. Figure 2: An example of HMM In Pareto model, β is about by λ / (λ-α), wherever λ is that the average inter-onset time of frame cluster. Fig.three shows Associate in Nursing example of HMM. In an HMM, there area unit a collection of states say , every state has Associate in Nursing initial state probability that determines that state would be a lot of possible to be the primary state. And every state contains a probabilistic distribution of its observation vectors. we tend to adopt to explain the parameters of the states distributions. The transition chance matrix M wherever Mij = Pr(S(t+1)=Sj ǀ S(t)=Si) determines however a state may transit to a different state. The states area unit hidden, rather we are able to infer them from the observations by HMM illation algorithmic program. Let the durations of the white areas (Δt1, Δt2, Δt3,...,ΔtN) is the observation sequence (O1,O2,O3,...,ON) .Using the Vilfredo Pareto model because the observation distribution for every state. With preobtained information traces of the traffic Paper ID: SUB1540 369
  • 3. International Journal of Science and Research (IJSR) ISSN (Online): 2319-7064 Index Copernicus Value (2013): 6.14 | Impact Factor (2013): 4.438 Volume 4 Issue 1, January 2015 www.ijsr.net Licensed Under Creative Commons Attribution CC BY within the current network, we are able to learn all the parameters of this HMM model. 6. Conclusion This paper has bestowed an explicit description of two of the foremost outstanding developing wireless access networks Associate in nursing the even mentioned on however these technologies might collaborate along to create alternatives for implementing last-mile wireless broadband services. Careful technical comparative analysis between the 802.11 (Wi-Fi) and 802.16 (WiMAX) wireless networks that offer various answer to the matter of data access in remote inaccessible areas wherever wired networks aren't value effective has been looked into. This work has verified that the WiMAX commonplace goal isn't to switch WiFiin its applications however rather to supplement it so as to create a wireless network net. References [1] Intel Corp, “IEEE 802.16 and WiMAX: Broadband Wireless Access for Everyone”, [Online] Available http:// www.intel.com/ebusiness/pdf/wireless/intel/80216_wima x.pdf (2003). [2] S. Mangold, J. Habetha, S. Choi, and C. Ngo, "Co- existence and Interworking of IEEE 802.11a and ETSI BRAN HiperLAN/2 in MultiHop Scenarios," in Proc. of IEEE 3rd Workshop in Wireless Local Area Networks, Boston, USA, 27-28 September 2001 [3] Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, IEEE Std 802.11,2007 [4] Fcc, unlicenced Operation in TV transmission band become aware of Proposed Rulemaking (NPRM), ET Docket No. 04-186, May, 2004. [5] Office of Engineering and Technology. “Projected Schedule for Proceeding on Unlicensed Operation in the TV Broadcast Bands” , 2006. [6] Jun Huang, Guoliang Xing, Gang Zhou, Ruogu Zhou. Beyond Coexistence: Exploiting WiFi White Space for ZigBee Performance Assurance. In ICNP, 2010 [7] HMM-driven Smart White Space-aware Frame Control Protocol for Coexistence of ZigBee and WiFiJieYuan , Department of Computer Science , Oklahoma State University, USA ,IEEE journal,2013 Paper ID: SUB1540 370