SlideShare a Scribd company logo
ACEEE International Journal on Network Security, Vol 1, No. 1, Jan 2010




    A New Approach to Improve the Efficiency of
    Distributed Scheduling in IEEE 802.16 Mesh
                     Networks
                                     S. Lakani1, M. Fathy2, and H. Ghaffarian2
     1
         Department of Computer Engineering, Science and Research Branch, Islamic Azad University, Tehran, Iran
                                             Email: s.lakani@srbiau.ac.ir
                2
                  Computer Engineering School, Iran University of Science and Technology, Tehran, Iran
                                      Email: {mahFathy, Ghaffarian}@iust.ac.ir


Abstract— The recent standard for broadband wireless               mesh, two different coordination modes are defined:
access networks, IEEE 802.16, which resulted in the                centralized and distributed. In the centralized mode the
development of metropolitan area wireless networks,                BS is responsible for defining the schedule of
includes two network organization modes: Point to Multi            transmissions in the entire network [2]. In the distributed
Point and Mesh. The mesh mode provides distributed
channel access operations of peering nodes and uses TDMA
                                                                   mode transmissions are scheduled in a fully distributed
technique for channel access modulation. According to              fashion without requiring any interaction with the BS. In
IEEE 802.16 MAC protocol, there are two scheduling                 this paper the focus is on the distributed mode, which is
algorithms for assigning TDMA slots to each network node:          much more flexible and responsive than the centralized
centralized and distributed. In distributed scheduling             mode, since decisions are taken locally by SSs according
algorithm, network nodes have to transmit scheduling               to their current traffic load and physical channel status.
message in order to inform other nodes about their transfer        The bandwidth modulation in IEEE 802.16 mesh mode is
schedule. In this paper a new approach is proposed to              based on TDMA in which bandwidth is divided into
improve distributed scheduling efficiency in IEEE 802.16           frames of fixed duration and each frame is partitioned
mesh mode, with respect to network condition in every
transferring opportunity. For evaluating the proposed
                                                                   into two subframes: control subframe and data subframe
algorithm efficiency, several extensive simulations are            and each subframe is divided into equal size time slots.
performed in various network configurations and the most           The number of control slots is ranging from 2 to 16 and
important system parameters which affect the network               data slots’ number is up to 256 depending on the physical
performance are analyzed.                                          layer profile and employed system parameters. Every
                                                                   node who is ready for data transfer, initially, broadcasts
Index Terms— IEEE 802.16, WiMAX, Wireless Mesh                     bandwidth allocation messages into the control slots.
Networks, MAC protocol, Time Division Multiple Access,             Therefore two types of bandwidth allocation message are
Distributed scheduling procedure.                                  used in this process: Mesh Network Configuration and
                                                                   Mesh Distributed Scheduling message. The latter is used
                     I. INTRODUCTION                               to identify the nodes which are waiting to access control
   The IEEE 802.16 standard [1], also known as                     slots. Therewith, the procedure used by nodes to access
Worldwide Interoperability for Microwave Access                    the control slots and transmit control messages is named
(WiMAX), is a recently developed standard for                      the mesh distributed scheduling procedure. The mesh
Broadband Wireless Access (BWA) in fixed and mobile                distributed scheduling procedure is a distributed
networks. The IEEE 802.16 specifies two different modes            algorithm which provides a collision-free access to
of sharing the wireless medium: Point-to-Multipoint                control slots.
(PMP) and mesh. In PMP mode, the network                              In Ref. [3] the authors analyzed the performance of the
organization operations are performed by a node namely             mesh distributed scheduling procedure through a
Base Station (BS) that has to coordinate Subscriber                stochastic model. This allowed the estimation of the time
Stations (SSs). On the other hand, in mesh mode the SSs            interval between two consecutive accesses to the control
can communicate with each other directly. This mode has            sub-frame, i.e. the access interval. Then the model is
been designed to be employed as a technology for                   validated through simulation, and can be used to gain
Wireless Mesh Networks (WMNs) and can accommodate                  insights into the properties of the mesh distributed
longer distance coverage than the PMP mode by                      scheduling procedure, in terms of the mean access
exploiting cooperative packet relaying. The interest in            interval. However, the model is unable to capture all the
WMN is rapidly increasing due to the growing potential             details of the mesh scheduling procedure due to its
of its recently envisaged applications[1].In IEEE 802.16           simplifying assumptions, which are nonetheless

                                                              26
© 2010 ACEEE
DOI: 01.ijns.01.01.06
ACEEE International Journal on Network Security, Vol 1, No. 1, Jan 2010



indispensable to reduce the complexity of the problem so           one-hop neighbor but are not linked directly, are called
that it can be solved. Afzali et al. [4] have improved             two-hop or extended neighbors.
scalability problems of stochastic model which were                   As already introduced, the distributed scheduling
introduced in [3]. Bayer et al. carried out a preliminary          procedure is applied to coordinate the access to the
investigation of the mesh distributed scheduling                   control slots in a distributed collision-free manner. For
procedure through simulation[6]. Wei et al. [7] suggested          this reason a node cannot transmit into a control slot that
a load-aware and interference aware scheduling algorithm           is reserved by one- or two-hop neighbors which are
for IEEE 802.16 mesh mode. Their simulation results                referred to as competitors of that node. Specifically, each
show that the provided schemes effectively improve the             node performs a virtual contention by propagating the
network throughput performance in IEEE 802.16 mesh                 control information of its neighbors which is sent during
networks and achieve high spectral utilization. Tao et al.         previous control slots. This contention based procedure
[8] proposed a concurrent transmission algorithm to                enforces a strict precedence among competitors. While
promote spatial resource reuse, which increases the                every node contends until it wins; only one competitor
overall end-to-end throughput. Simulation results indicate         can win and access a specific control slot. The procedure
that different constructions of routing tree impact the            of performing this contention is described in [1] and isn’t
performance of the concurrent algorithm. Fu et al. [9]             the matter of interest in this paper. The major concern in
used the concept of collision metric to model the                  this article is the delay time after which a node contends
interference level and prepared a novel routing algorithm          again since last access to a control slot.
to increase the degree of spatial reuse in wireless mesh              Every node must defer its transmission by a holdoff
networks. Both the scheduling and routing schemes are              time, namely Hx (referring to node x) in units of time
based on IEEE 802.16 mesh mode. In Ref. [10] a linear              slots. Waiting for a period of Hx, guarantees a collision
programming model for optimum routing and scheduling               free access to time slots.
of flows in a wireless mesh network that include the                  As specified by the IEEE 802.16 standard, the holdoff
effect of interference and allow for variable-rate                 time Hx is calculated as (1):
transmissions was propounded. Cicconetti et al. [11]
investigated network scalability and tried to minimize the                                   H x = 2 4+ E x .                (1)
end to end delay problems by means of performance
analysis. Due to the importance of an efficient distributed           Where Ex        [0, 7] is a system parameter called
scheduling algorithm in IEEE 802.16 network                        XmtHoldoffExponent which can be configured on a per
performance, in this paper a heuristic scheduling                  node basis. Thus, two consecutive slot accesses by the
algorithm is proposed that can reduce transmission delay.          same node are separated by at least 16 slots according to
The performance of the mesh distributed scheduling                 formula (1), when Ex=0. The challenge is whether the
procedure is evaluated, using extensive simulations in a           delay of 16 slots is efficient or not?
wide variety of scenarios. Our analysis covers some
aspects of the mesh distributed scheduling procedure that                        III. THE HEURISTIC APPROACH
have not been yet thoroughly addressed in the literature.
                                                                      As mentioned in previous section, when Ex=0, a node
    The remainder of the paper is organized as follows. In
                                                                   has to wait for at least 16 slots to access next slot for its
Section II we describe the IEEE 802.16 mesh distributed
                                                                   transmission. But waiting for 16 slot isn't efficient,
scheduling procedure in details. The novel approach is
                                                                   particularly when there is not even one competitor node
discussed in section III. The performance of the new
                                                                   for using these 16 empty slots. For example consider a
approach of mesh distributed scheduling procedure is
                                                                   typical WiMAX mesh network (Fig.1 section IV.B) that
analyzed in Section IV, with respect to relevant factors,
                                                                   each node has two one-hop neighbors. Therefore, at max,
such as the network topology and system configuration
                                                                   every node can have up to four neighbors and extended
parameters. We conclude the paper in Section V.
                                                                   neighbors. If we divided sixteen into four, in average we
                                                                   obtain 4 slots per each neighbor for transmission. What
    II. MESH DISTRIBUTED SCHEDULING PROCEDURE
                                                                   happens if some of those nodes do not want to use their
   Hereafter in the mesh distributed scheduling procedure          opportunity to send any data?
node x is assumed as a generic node of the network which              Therefore the standard scheduling mechanism does
is referred to both BS and SSs. Additionally the common            not perform well and causes a significant delay on data
name for mesh BS and SSs in the literature of WMNs is              packets. On this point of view, we focus on the constant
node.                                                              value 4 and make this value adaptive with the number of
   In IEEE 802.16, a logical link is set up between each           competitor nodes i.e. nodes competing to access the same
couple of nodes, so the directly linked nodes are called           slot.
one-hop neighbors also they called simply neighbors. On               The basic method of IEEE 802.16 standard for
the other hand, nodes which have at least one common               calculating hold off time is obtained from (1). The new
                                                                   approach is computing the logarithm of number of
                                                              27
© 2010 ACEEE
DOI: 01.ijns.01.01.06
ACEEE International Journal on Network Security, Vol 1, No. 1, Jan 2010



competitor nodes and using the result instead of constant             replications are run. The duration of each simulation run
4 in (1). So the new formula is introduced as follows:                varied depending on how the specific system was
                                                                      configured.
                        H x = 2(log2 cm+ Ex ) .            (2)
                                                                      B. Chain
   where cm is the number of competing nodes.                            In order to decrease the number of idle slots and
   By computing the number of competing nodes, it is                  improve the network performance, in this scenario a spars
evaluated that how many nodes want to transmit                        and narrow topology i.e. chain is considered. Fig.1 shows
message(s) in the current competitive slot. So every node             the connections between nodes in chain topology.
that wins the competition, after sending data in regarded
slot, has to wait as long as hold off time (Hx). This
mechanism guarantees the efficient use of channel by
reducing idle slots in control subframe. Simulations in the
following section show that the adoption of this                      Figure 1. Schematic representation of nodes connection in chain
                                                                      topology
mechanism       reduces     the    transmission   interval.
Furthermore the delay on data packets caused by the                      To obtain the network performance parameters, six
MAC layer is reduced significantly.                                   simulations are run with respectively 4, 9, 16, 25, 36, 49
                                                                      number of network nodes. To be compatible with grid-
             IV. PERFORMANCE EVALUATION                               full, in chain topology, numbers are selected complete
                                                                      squared. Fig.2 shows the average frame intervals between
   In this section, the settings under which the simulation           two consecutive mesh distributed scheduling messages, in
analysis is carried out and the used performance metrics              basic standard IEEE 802.16 and heuristic method. There
are defined. Then the performance of the mesh distributed             is an obvious drop in access interval that is originated by
scheduling procedure is evaluated in several scenarios                decrement of idle slots with applying proposed method.
with varied network configurations. The analysis is aimed             Additionally, in the heuristic method, the average access
at identifying the effect of applying this solution in IEEE           interval rises with the number of nodes increasing, while
802.16 based WMN. The preliminary information on                      in basic method this metric is almost constant. This
network configuration for evaluation setting is provided              implies that the average number of nodes competing to
in Part A. Specifically, the simulation are run, with the             access a certain slot increases while network being more
following network topologies: a spars and narrow                      populated.
network topology i.e. chain in Part B, a complicated and
dense network topology i.e. grid-full in Part C.
A. Evaluation Setting
   The parameters used in the simulations are compliant
with the IEEE 802.16 standard [1]. Specifically, the
frame duration is 10 ms and the channel bandwidth is 10
MHz According to the standard, only one channel is used
to transmit control information, thus the use of multiple
channels is not considered. Furthermore, the traffic
considered is of Voice over IP (VOIP) and Video on
Demand (VOD) type; however, they did not have any
impact on the transmission in control slots.
   We now define the performance indices that have been
considered in order to assess the distributed scheduling              Figure 2. Average frame intervals between two consecutive mesh
procedure performance in new approach. First metric is                distributed scheduling messages for chain
average interval (in slot units) between two consecutive                 The comparison of end-to-end one-way delay between
mesh distributed scheduling messages sent by a node.                  the standard and heuristic method is shown in Fig.3. The
Second one is the average end-to-end one-way delay (in                chart implies that delay increases with the network
seconds). Third metric is the average number of                       extension. It can be observed that the proposed algorithm
competitors per slot during virtual contention and the last           has smaller end-to-end one-way delay as a result of
one is average of end-to-end throughput per flow (in                  reducing Hold off time and unused control slots.
bytes/seconds).
   The patch program [12] of coordinated distributed
mode of IEEE 802.16 mesh is used in NS2 simulator
[13]. The simulation output analysis is carried out using
the method of independent replications. Specifically, for
each scenario a variable number of independent
                                                                 28
© 2010 ACEEE
DOI: 01.ijns.01.01.06
ACEEE International Journal on Network Security, Vol 1, No. 1, Jan 2010



                                                                        frame intervals become smaller in heuristic method
                                                                        because the nodes can sooner return to competition
                                                                        situation. Additionally, the average access interval
                                                                        growth in grid-full topology is more than in chain. The
                                                                        reason is that the average number of competitors of every
                                                                        node at each slot increases because in grid-full there are
                                                                        more neighbors than chain.




Figure 3. Average end-to-end one-way delay for chain




                                                                        Figure 6. Average frame intervals between two consecutive mesh
                                                                        distributed scheduling messages in grid-full

                                                                           The comparison of end-to-end one-way delay is shown
                                                                        in Fig.7. As expected, the heuristic algorithm has smaller
                                                                        end-to-end one-way delay, caused by reduction of Hold
                                                                        off time due to decreasing the empty control slots. In
                                                                        other hand in grid-full topology, the value of delay is less
Figure 4. Average end-to-end throughput for chain                       than chain topology as number of nodes in the network
   Fig.4 indicates the average of end-to-end throughput.                becomes greater. Because of dense nature of grid-full
As expected, the network throughput in proposed                         topology, with the number of nodes increasing the hop
algorithm is better than basic standard scheduler. This                 distance between nodes do not increase significantly.
improved result is due to the fact that nodes can quickly                  The average of end-to-end throughput is indicated in
return to the competition state, thus the usage of network              Fig.8. It can be seen that the network throughput in
free opportunities become more efficient.                               proposed algorithm has an improvement comparing to the
                                                                        basic standard scheduler. The reason is the same as
C. Grid-Full                                                            explained for the chain in part B and This can be
   Another simulation scenario is using a dense network                 explained by a decreased network contention and thus a
topology i.e. grid-full as Fig.5 shows the nodes                        decreased MSH-DSCH transmission interval.
connection in a schematic way.                                             The remarkable point in two recent charts is optimum
                                                                        values in grid-full topology with 9 nodes. As it can be
                                                                        seen, the lowest delay as well as the highest throughput is
                                                                        obtained in network with 9 nodes. That can be the result
                                                                        of the most efficient use of network resources in this
                                                                        specific situation. Therefore we can say this is the
                                                                        optimum network configuration among studied networks
                                                                        in which the highest value of about 140000 bytes per
                                                                        second of throughput and the least delay of about 0.063
                                                                        seconds are computed.
Figure 5. Scheme of nodes connection in grid-full topology

   In such networks, every node has more than two
neighbors that affect the performance of network
transmission scheduling. The simulations with grid-full
topology are run with respectively 4, 9, 16, 25, 36, 49
number of network nodes. Fig.6 shows the distinction
between average frame intervals in basic IEEE 802.16
standard and heuristic method. It can be seen that the
                                                                   29
© 2010 ACEEE
DOI: 01.ijns.01.01.06
ACEEE International Journal on Network Security, Vol 1, No. 1, Jan 2010



                                                                                                     REFERENCES
                                                                            [1] IEEE 802.16-2004. “IEEE standard for Local and
                                                                                 Metropolitan Area Networks – Part 16: Air interface for
                                                                                 Fixed Broadband Wireless Access systems,” Oct. 2004.
                                                                            [2] R. Bruno, M. Conti and E. Gregori, “Mesh networks:
                                                                                 Commodity multihop ad hoc networks,” IEEE
                                                                                 Communications, vol. 43, no. 3, Mar. 2005, pp. 23–131.
                                                                            [3] M. Cao, V. Raghunathan and P. R. Kumar, “A tractable
                                                                                 algorithm for fair and efficient uplink scheduling of multi-
                                                                                 hop WiMax mesh networks,” Proc. WiMesh 2006, Reston
                                                                                 (VA), USA, Sep. 25, 2006, pp. 101–108.
                                                                            [4] M. Cao, W. Ma, Q. Zhang, X. Wang and W. Zhu,
                                                                                 “Modeling and performance analysis of the distributed
                                                                                 scheduler in IEEE 802.16 mesh mode,” Proc. ACM
Figure 7. Average end-to-end one-way delay for grid-full                         MobiHoc 2005, Urbana-Champaign (IL), USA, May 25–
                                                                                 28, 2005, pp. 78–89.
                                                                            [5] M. Afzali, H. Ghaffarian and M. Fathy, “Maximum
                                                                                 utilization of channel bandwidth using maximum
                                                                                 likelihood in concurrent communication in WIMAX,”
                                                                                 Proc. The 13th CSI international computer conference,
                                                                                 Kish Island, Persian Gulf, Iran, 9-11 March, 2008.
                                                                            [6] N. Bayer, D. Sivchenko, B. Xu, V. Rakocevic and J.
                                                                                 Habermann, “Transmission timing of signaling messages
                                                                                 in IEEE 802.16 based mesh networks,” Proc. European
                                                                                 Wireless 2006, Athens, Greece, Apr. 2–5, 2006.
                                                                            [7] H. Wei, S. Ganguly, R. Izmailove and Z. Haas,
                                                                                 “Interference-Aware IEEE 802.16 WiMax Mesh
                                                                                 Networks,” The 61st IEEE Vehicular Technology
                                                                                 Conference, vol 5, pp 3102-3106, May 2005.
                                                                            [8] J. Tao, F. Liu, Z. Zeng and Z. Lin, “Throughput
Figure 8. Average of end-to-end throughput for grid-full
                                                                                 Enhancement in WiMax Mesh Networks Using Concurrent
                                                                                 Transmission,” International conference on Wireless
                       V. CONCLUSIONS                                            Communications, Networking and Mobile Computing, pp
                                                                                 871-874, September 2005.
   For solving the scheduling problems of wireless                          [9] L. Fu, Z. Cao and P. Fan, “Spatial Reuse in IEEE 802.16
metropolitan area networks, a new approach in IEEE                               Based Wireless Mesh Networks,” IEEE International
802.16 distributed scheduling algorithm in mesh mode is                          Symposium on Communications and Information
proposed and the method of calculating hold off time                             Technology, pp 1311-1314, October 2005.
between two consecutive channel accesses is improved.                       [10] H. Viswanathan and S. Mukherjee, “Throughput-Rang
                                                                                 Tradeoff of Wireless Mesh Backhaul Networks,” IEEE
Simulations with various network configuration and                               journal on selected areas in communications, vol 24, no 3,
scenarios show that, applying this solution, inefficient use                     pp 593-602, march 2006.
of channel is effectively decreased. It is observed that the                [11] C. Cicconetti, A. Erta and L. Lenzini, “Performance
proposed method provides efficient use of network                                Evaluation of the Mesh Election Procedure of IEEE
resources and decreases end-to-end delay. Thus, the                              802.16/WiMAX,” Proc. 10th ACM Symposium on
proposed distributed scheduling method improves the                              Modeling, analysis, and simulation of wireless and mobile
performance of IEEE 802.16 networks, comparing to the                            systems, pp 323-327, October 2007.
basic standard scheduling.                                                  [12] IEEE 802.16d Wireless Mesh Networks patch for NS2,
    The utilization of IEEE 802.16 scheduler with respect                        http://info.iet.unipi.it/~cng/ns2mesh80216
                                                                            [13] http://www.isi.edu/nsnam/ns/, last version 2.31, Mar. 2007.
to accumulated network load is considered as future
work.




                                                                       30
© 2010 ACEEE
DOI: 01.ijns.01.01.06

More Related Content

What's hot

Ccna day1
Ccna day1Ccna day1
Ccna day1
danishrafiq
 
Ccna day1
Ccna day1Ccna day1
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
IOSR Journals
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
Chaynika Verma
 
Priority based bandwidth allocation in wireless sensor networks
Priority based bandwidth allocation in wireless sensor networksPriority based bandwidth allocation in wireless sensor networks
Priority based bandwidth allocation in wireless sensor networks
IJCNCJournal
 
Dcn data link_layer
Dcn data link_layerDcn data link_layer
Dcn data link_layer
mangal das
 
A New Paradigm for Load Balancing in WMNs
A New Paradigm for Load Balancing in WMNsA New Paradigm for Load Balancing in WMNs
A New Paradigm for Load Balancing in WMNs
CSCJournals
 
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
IJCNCJournal
 
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHMY-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
IJNSA Journal
 
TransparentInterconnectionsofLotofLinks
TransparentInterconnectionsofLotofLinksTransparentInterconnectionsofLotofLinks
TransparentInterconnectionsofLotofLinks
Swapnil Raut
 
Chap 1 introduction
Chap 1 introductionChap 1 introduction
Chap 1 introduction
Mukesh Tekwani
 
Three dimension hamiltonian broadcast
Three dimension hamiltonian broadcastThree dimension hamiltonian broadcast
Three dimension hamiltonian broadcast
IJCNCJournal
 
Osi(1)
Osi(1)Osi(1)
Osi(1)
Nitesh Singh
 
[IJCT-V3I2P21] Authors: Swati Govil, Dr.Paramjeet Rawat
[IJCT-V3I2P21] Authors: Swati Govil, Dr.Paramjeet Rawat[IJCT-V3I2P21] Authors: Swati Govil, Dr.Paramjeet Rawat
[IJCT-V3I2P21] Authors: Swati Govil, Dr.Paramjeet Rawat
IJET - International Journal of Engineering and Techniques
 
A cross layer optimized reliable multicast routing protocol in wireless mesh ...
A cross layer optimized reliable multicast routing protocol in wireless mesh ...A cross layer optimized reliable multicast routing protocol in wireless mesh ...
A cross layer optimized reliable multicast routing protocol in wireless mesh ...
ijdpsjournal
 
Types of topology
Types of topologyTypes of topology
Types of topology
MuskanDiwan2
 
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3
ijwmn
 
Wired and Wireless Computer Network Performance Evaluation Using OMNeT++ Simu...
Wired and Wireless Computer Network Performance Evaluation Using OMNeT++ Simu...Wired and Wireless Computer Network Performance Evaluation Using OMNeT++ Simu...
Wired and Wireless Computer Network Performance Evaluation Using OMNeT++ Simu...
Jaipal Dhobale
 
Broadcast wormhole routed 3-d mesh
Broadcast wormhole routed 3-d meshBroadcast wormhole routed 3-d mesh
Broadcast wormhole routed 3-d mesh
IJCNCJournal
 
ENERGY EFFICIENT MULTICAST ROUTING IN MANET
ENERGY EFFICIENT MULTICAST ROUTING IN MANET ENERGY EFFICIENT MULTICAST ROUTING IN MANET
ENERGY EFFICIENT MULTICAST ROUTING IN MANET
ijac journal
 

What's hot (20)

Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Priority based bandwidth allocation in wireless sensor networks
Priority based bandwidth allocation in wireless sensor networksPriority based bandwidth allocation in wireless sensor networks
Priority based bandwidth allocation in wireless sensor networks
 
Dcn data link_layer
Dcn data link_layerDcn data link_layer
Dcn data link_layer
 
A New Paradigm for Load Balancing in WMNs
A New Paradigm for Load Balancing in WMNsA New Paradigm for Load Balancing in WMNs
A New Paradigm for Load Balancing in WMNs
 
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
 
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHMY-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
 
TransparentInterconnectionsofLotofLinks
TransparentInterconnectionsofLotofLinksTransparentInterconnectionsofLotofLinks
TransparentInterconnectionsofLotofLinks
 
Chap 1 introduction
Chap 1 introductionChap 1 introduction
Chap 1 introduction
 
Three dimension hamiltonian broadcast
Three dimension hamiltonian broadcastThree dimension hamiltonian broadcast
Three dimension hamiltonian broadcast
 
Osi(1)
Osi(1)Osi(1)
Osi(1)
 
[IJCT-V3I2P21] Authors: Swati Govil, Dr.Paramjeet Rawat
[IJCT-V3I2P21] Authors: Swati Govil, Dr.Paramjeet Rawat[IJCT-V3I2P21] Authors: Swati Govil, Dr.Paramjeet Rawat
[IJCT-V3I2P21] Authors: Swati Govil, Dr.Paramjeet Rawat
 
A cross layer optimized reliable multicast routing protocol in wireless mesh ...
A cross layer optimized reliable multicast routing protocol in wireless mesh ...A cross layer optimized reliable multicast routing protocol in wireless mesh ...
A cross layer optimized reliable multicast routing protocol in wireless mesh ...
 
Types of topology
Types of topologyTypes of topology
Types of topology
 
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3
 
Wired and Wireless Computer Network Performance Evaluation Using OMNeT++ Simu...
Wired and Wireless Computer Network Performance Evaluation Using OMNeT++ Simu...Wired and Wireless Computer Network Performance Evaluation Using OMNeT++ Simu...
Wired and Wireless Computer Network Performance Evaluation Using OMNeT++ Simu...
 
Broadcast wormhole routed 3-d mesh
Broadcast wormhole routed 3-d meshBroadcast wormhole routed 3-d mesh
Broadcast wormhole routed 3-d mesh
 
ENERGY EFFICIENT MULTICAST ROUTING IN MANET
ENERGY EFFICIENT MULTICAST ROUTING IN MANET ENERGY EFFICIENT MULTICAST ROUTING IN MANET
ENERGY EFFICIENT MULTICAST ROUTING IN MANET
 

Viewers also liked

Comparison of Normal and Ventricular Tachyarrhythmic Electrocardiograms using...
Comparison of Normal and Ventricular Tachyarrhythmic Electrocardiograms using...Comparison of Normal and Ventricular Tachyarrhythmic Electrocardiograms using...
Comparison of Normal and Ventricular Tachyarrhythmic Electrocardiograms using...
IDES Editor
 
The Effect of Network Topology on Geographic Routing Performance in Localized...
The Effect of Network Topology on Geographic Routing Performance in Localized...The Effect of Network Topology on Geographic Routing Performance in Localized...
The Effect of Network Topology on Geographic Routing Performance in Localized...
IDES Editor
 
Performance Improvement Technique in Column-Store
Performance Improvement Technique in Column-StorePerformance Improvement Technique in Column-Store
Performance Improvement Technique in Column-Store
IDES Editor
 
Intuition – Based Teaching Mathematics for Engineers
Intuition – Based Teaching Mathematics for EngineersIntuition – Based Teaching Mathematics for Engineers
Intuition – Based Teaching Mathematics for Engineers
IDES Editor
 
A New Method to Stop Spam Emails in Sender Side
A New Method to Stop Spam Emails in Sender SideA New Method to Stop Spam Emails in Sender Side
A New Method to Stop Spam Emails in Sender Side
IDES Editor
 
Despeckling of Ultrasound Imaging using Median Regularized Coupled Pde
Despeckling of Ultrasound Imaging using Median Regularized Coupled PdeDespeckling of Ultrasound Imaging using Median Regularized Coupled Pde
Despeckling of Ultrasound Imaging using Median Regularized Coupled Pde
IDES Editor
 
An RSS Based Localization Algorithm in Cellular Networks
An RSS Based Localization Algorithm in Cellular NetworksAn RSS Based Localization Algorithm in Cellular Networks
An RSS Based Localization Algorithm in Cellular Networks
IDES Editor
 
AGPM: An Authenticated Secure Group Communication Protocol for MANETs
AGPM: An Authenticated Secure Group Communication Protocol for MANETsAGPM: An Authenticated Secure Group Communication Protocol for MANETs
AGPM: An Authenticated Secure Group Communication Protocol for MANETs
IDES Editor
 

Viewers also liked (8)

Comparison of Normal and Ventricular Tachyarrhythmic Electrocardiograms using...
Comparison of Normal and Ventricular Tachyarrhythmic Electrocardiograms using...Comparison of Normal and Ventricular Tachyarrhythmic Electrocardiograms using...
Comparison of Normal and Ventricular Tachyarrhythmic Electrocardiograms using...
 
The Effect of Network Topology on Geographic Routing Performance in Localized...
The Effect of Network Topology on Geographic Routing Performance in Localized...The Effect of Network Topology on Geographic Routing Performance in Localized...
The Effect of Network Topology on Geographic Routing Performance in Localized...
 
Performance Improvement Technique in Column-Store
Performance Improvement Technique in Column-StorePerformance Improvement Technique in Column-Store
Performance Improvement Technique in Column-Store
 
Intuition – Based Teaching Mathematics for Engineers
Intuition – Based Teaching Mathematics for EngineersIntuition – Based Teaching Mathematics for Engineers
Intuition – Based Teaching Mathematics for Engineers
 
A New Method to Stop Spam Emails in Sender Side
A New Method to Stop Spam Emails in Sender SideA New Method to Stop Spam Emails in Sender Side
A New Method to Stop Spam Emails in Sender Side
 
Despeckling of Ultrasound Imaging using Median Regularized Coupled Pde
Despeckling of Ultrasound Imaging using Median Regularized Coupled PdeDespeckling of Ultrasound Imaging using Median Regularized Coupled Pde
Despeckling of Ultrasound Imaging using Median Regularized Coupled Pde
 
An RSS Based Localization Algorithm in Cellular Networks
An RSS Based Localization Algorithm in Cellular NetworksAn RSS Based Localization Algorithm in Cellular Networks
An RSS Based Localization Algorithm in Cellular Networks
 
AGPM: An Authenticated Secure Group Communication Protocol for MANETs
AGPM: An Authenticated Secure Group Communication Protocol for MANETsAGPM: An Authenticated Secure Group Communication Protocol for MANETs
AGPM: An Authenticated Secure Group Communication Protocol for MANETs
 

Similar to A New Approach to Improve the Efficiency of Distributed Scheduling in IEEE 802.16 Mesh Networks

7 satishkumar final_paper--75-84
7 satishkumar final_paper--75-847 satishkumar final_paper--75-84
7 satishkumar final_paper--75-84
Alexander Decker
 
Handover Behaviour of Transparent Relay in WiMAX Networks
Handover Behaviour of Transparent Relay in WiMAX NetworksHandover Behaviour of Transparent Relay in WiMAX Networks
Handover Behaviour of Transparent Relay in WiMAX Networks
IDES Editor
 
Achieving Transmission Fairness in Distributed Medium Access Wireless Mesh Ne...
Achieving Transmission Fairness in Distributed Medium Access Wireless Mesh Ne...Achieving Transmission Fairness in Distributed Medium Access Wireless Mesh Ne...
Achieving Transmission Fairness in Distributed Medium Access Wireless Mesh Ne...
ijwmn
 
Performance Analysis of MAC Layer Protocols for WSN with Considering the Effe...
Performance Analysis of MAC Layer Protocols for WSN with Considering the Effe...Performance Analysis of MAC Layer Protocols for WSN with Considering the Effe...
Performance Analysis of MAC Layer Protocols for WSN with Considering the Effe...
BRNSSPublicationHubI
 
Design And Evaluation of Time Slot Assignment Algorithm For IEEE 802.16j Rela...
Design And Evaluation of Time Slot Assignment Algorithm For IEEE 802.16j Rela...Design And Evaluation of Time Slot Assignment Algorithm For IEEE 802.16j Rela...
Design And Evaluation of Time Slot Assignment Algorithm For IEEE 802.16j Rela...
CSCJournals
 
Aj32242252
Aj32242252Aj32242252
Aj32242252
IJERA Editor
 
International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions www.ijeijournal.com
 
DYNAMIC HYBRID CHANNEL (WMN) FOR BANDWIDTH GUARANTEES IN AD_HOC NETWORKS
DYNAMIC HYBRID CHANNEL (WMN) FOR BANDWIDTH GUARANTEES IN AD_HOC NETWORKSDYNAMIC HYBRID CHANNEL (WMN) FOR BANDWIDTH GUARANTEES IN AD_HOC NETWORKS
DYNAMIC HYBRID CHANNEL (WMN) FOR BANDWIDTH GUARANTEES IN AD_HOC NETWORKS
pharmaindexing
 
WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF
WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF
WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF
ijwmn
 
A20345606_Shah_Bonus_Report
A20345606_Shah_Bonus_ReportA20345606_Shah_Bonus_Report
A20345606_Shah_Bonus_Report
Panth Shah
 
Energy-efficient routing protocol for wireless sensor networks based on prog...
Energy-efficient routing protocol for wireless sensor networks  based on prog...Energy-efficient routing protocol for wireless sensor networks  based on prog...
Energy-efficient routing protocol for wireless sensor networks based on prog...
International Journal of Reconfigurable and Embedded Systems
 
A secure and service oriented
A secure and service orientedA secure and service oriented
A secure and service oriented
Jayanta Khumanthem
 
Traffic Engineering in Metro Ethernet
Traffic Engineering in Metro EthernetTraffic Engineering in Metro Ethernet
Traffic Engineering in Metro Ethernet
CSCJournals
 
A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...
A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...
A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...
csandit
 
A CROSS-LAYER BASED SCALABLE CHANNEL SLOT RE-UTILIZATION TECHNIQUE FOR WIRELE...
A CROSS-LAYER BASED SCALABLE CHANNEL SLOT RE-UTILIZATION TECHNIQUE FOR WIRELE...A CROSS-LAYER BASED SCALABLE CHANNEL SLOT RE-UTILIZATION TECHNIQUE FOR WIRELE...
A CROSS-LAYER BASED SCALABLE CHANNEL SLOT RE-UTILIZATION TECHNIQUE FOR WIRELE...
cscpconf
 
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless NetworksEfficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
CSCJournals
 
Channel Allocation and Routing in Wireless Mesh Networks: A survey and qualit...
Channel Allocation and Routing in Wireless Mesh Networks: A survey and qualit...Channel Allocation and Routing in Wireless Mesh Networks: A survey and qualit...
Channel Allocation and Routing in Wireless Mesh Networks: A survey and qualit...
ijwmn
 
5113jgraph01
5113jgraph015113jgraph01
5113jgraph01
graphhoc
 
Modified q aware scheduling algorithm for improved fairness in 802.16 j networks
Modified q aware scheduling algorithm for improved fairness in 802.16 j networksModified q aware scheduling algorithm for improved fairness in 802.16 j networks
Modified q aware scheduling algorithm for improved fairness in 802.16 j networks
IJCNCJournal
 
Mq3624532158
Mq3624532158Mq3624532158
Mq3624532158
IJERA Editor
 

Similar to A New Approach to Improve the Efficiency of Distributed Scheduling in IEEE 802.16 Mesh Networks (20)

7 satishkumar final_paper--75-84
7 satishkumar final_paper--75-847 satishkumar final_paper--75-84
7 satishkumar final_paper--75-84
 
Handover Behaviour of Transparent Relay in WiMAX Networks
Handover Behaviour of Transparent Relay in WiMAX NetworksHandover Behaviour of Transparent Relay in WiMAX Networks
Handover Behaviour of Transparent Relay in WiMAX Networks
 
Achieving Transmission Fairness in Distributed Medium Access Wireless Mesh Ne...
Achieving Transmission Fairness in Distributed Medium Access Wireless Mesh Ne...Achieving Transmission Fairness in Distributed Medium Access Wireless Mesh Ne...
Achieving Transmission Fairness in Distributed Medium Access Wireless Mesh Ne...
 
Performance Analysis of MAC Layer Protocols for WSN with Considering the Effe...
Performance Analysis of MAC Layer Protocols for WSN with Considering the Effe...Performance Analysis of MAC Layer Protocols for WSN with Considering the Effe...
Performance Analysis of MAC Layer Protocols for WSN with Considering the Effe...
 
Design And Evaluation of Time Slot Assignment Algorithm For IEEE 802.16j Rela...
Design And Evaluation of Time Slot Assignment Algorithm For IEEE 802.16j Rela...Design And Evaluation of Time Slot Assignment Algorithm For IEEE 802.16j Rela...
Design And Evaluation of Time Slot Assignment Algorithm For IEEE 802.16j Rela...
 
Aj32242252
Aj32242252Aj32242252
Aj32242252
 
International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)
 
DYNAMIC HYBRID CHANNEL (WMN) FOR BANDWIDTH GUARANTEES IN AD_HOC NETWORKS
DYNAMIC HYBRID CHANNEL (WMN) FOR BANDWIDTH GUARANTEES IN AD_HOC NETWORKSDYNAMIC HYBRID CHANNEL (WMN) FOR BANDWIDTH GUARANTEES IN AD_HOC NETWORKS
DYNAMIC HYBRID CHANNEL (WMN) FOR BANDWIDTH GUARANTEES IN AD_HOC NETWORKS
 
WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF
WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF
WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF
 
A20345606_Shah_Bonus_Report
A20345606_Shah_Bonus_ReportA20345606_Shah_Bonus_Report
A20345606_Shah_Bonus_Report
 
Energy-efficient routing protocol for wireless sensor networks based on prog...
Energy-efficient routing protocol for wireless sensor networks  based on prog...Energy-efficient routing protocol for wireless sensor networks  based on prog...
Energy-efficient routing protocol for wireless sensor networks based on prog...
 
A secure and service oriented
A secure and service orientedA secure and service oriented
A secure and service oriented
 
Traffic Engineering in Metro Ethernet
Traffic Engineering in Metro EthernetTraffic Engineering in Metro Ethernet
Traffic Engineering in Metro Ethernet
 
A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...
A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...
A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...
 
A CROSS-LAYER BASED SCALABLE CHANNEL SLOT RE-UTILIZATION TECHNIQUE FOR WIRELE...
A CROSS-LAYER BASED SCALABLE CHANNEL SLOT RE-UTILIZATION TECHNIQUE FOR WIRELE...A CROSS-LAYER BASED SCALABLE CHANNEL SLOT RE-UTILIZATION TECHNIQUE FOR WIRELE...
A CROSS-LAYER BASED SCALABLE CHANNEL SLOT RE-UTILIZATION TECHNIQUE FOR WIRELE...
 
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless NetworksEfficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
 
Channel Allocation and Routing in Wireless Mesh Networks: A survey and qualit...
Channel Allocation and Routing in Wireless Mesh Networks: A survey and qualit...Channel Allocation and Routing in Wireless Mesh Networks: A survey and qualit...
Channel Allocation and Routing in Wireless Mesh Networks: A survey and qualit...
 
5113jgraph01
5113jgraph015113jgraph01
5113jgraph01
 
Modified q aware scheduling algorithm for improved fairness in 802.16 j networks
Modified q aware scheduling algorithm for improved fairness in 802.16 j networksModified q aware scheduling algorithm for improved fairness in 802.16 j networks
Modified q aware scheduling algorithm for improved fairness in 802.16 j networks
 
Mq3624532158
Mq3624532158Mq3624532158
Mq3624532158
 

More from IDES Editor

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A Review
IDES Editor
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
IDES Editor
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
IDES Editor
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
IDES Editor
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFC
IDES Editor
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
IDES Editor
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
IDES Editor
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
IDES Editor
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive Thresholds
IDES Editor
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
IDES Editor
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
IDES Editor
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability Framework
IDES Editor
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
IDES Editor
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
IDES Editor
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’s
IDES Editor
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
IDES Editor
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance Analysis
IDES Editor
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
IDES Editor
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
IDES Editor
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
IDES Editor
 

More from IDES Editor (20)

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A Review
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFC
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive Thresholds
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability Framework
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’s
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance Analysis
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
 

Recently uploaded

Principle of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptxPrinciple of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptx
BibashShahi
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Pitangent Analytics & Technology Solutions Pvt. Ltd
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Fwdays
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
Ivo Velitchkov
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
Alex Pruden
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
Neo4j
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Precisely
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
DianaGray10
 
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
saastr
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo Gómez Abajo
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Neo4j
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
Neo4j
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Neo4j
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
Safe Software
 

Recently uploaded (20)

Principle of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptxPrinciple of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptx
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
 
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
 

A New Approach to Improve the Efficiency of Distributed Scheduling in IEEE 802.16 Mesh Networks

  • 1. ACEEE International Journal on Network Security, Vol 1, No. 1, Jan 2010 A New Approach to Improve the Efficiency of Distributed Scheduling in IEEE 802.16 Mesh Networks S. Lakani1, M. Fathy2, and H. Ghaffarian2 1 Department of Computer Engineering, Science and Research Branch, Islamic Azad University, Tehran, Iran Email: s.lakani@srbiau.ac.ir 2 Computer Engineering School, Iran University of Science and Technology, Tehran, Iran Email: {mahFathy, Ghaffarian}@iust.ac.ir Abstract— The recent standard for broadband wireless mesh, two different coordination modes are defined: access networks, IEEE 802.16, which resulted in the centralized and distributed. In the centralized mode the development of metropolitan area wireless networks, BS is responsible for defining the schedule of includes two network organization modes: Point to Multi transmissions in the entire network [2]. In the distributed Point and Mesh. The mesh mode provides distributed channel access operations of peering nodes and uses TDMA mode transmissions are scheduled in a fully distributed technique for channel access modulation. According to fashion without requiring any interaction with the BS. In IEEE 802.16 MAC protocol, there are two scheduling this paper the focus is on the distributed mode, which is algorithms for assigning TDMA slots to each network node: much more flexible and responsive than the centralized centralized and distributed. In distributed scheduling mode, since decisions are taken locally by SSs according algorithm, network nodes have to transmit scheduling to their current traffic load and physical channel status. message in order to inform other nodes about their transfer The bandwidth modulation in IEEE 802.16 mesh mode is schedule. In this paper a new approach is proposed to based on TDMA in which bandwidth is divided into improve distributed scheduling efficiency in IEEE 802.16 frames of fixed duration and each frame is partitioned mesh mode, with respect to network condition in every transferring opportunity. For evaluating the proposed into two subframes: control subframe and data subframe algorithm efficiency, several extensive simulations are and each subframe is divided into equal size time slots. performed in various network configurations and the most The number of control slots is ranging from 2 to 16 and important system parameters which affect the network data slots’ number is up to 256 depending on the physical performance are analyzed. layer profile and employed system parameters. Every node who is ready for data transfer, initially, broadcasts Index Terms— IEEE 802.16, WiMAX, Wireless Mesh bandwidth allocation messages into the control slots. Networks, MAC protocol, Time Division Multiple Access, Therefore two types of bandwidth allocation message are Distributed scheduling procedure. used in this process: Mesh Network Configuration and Mesh Distributed Scheduling message. The latter is used I. INTRODUCTION to identify the nodes which are waiting to access control The IEEE 802.16 standard [1], also known as slots. Therewith, the procedure used by nodes to access Worldwide Interoperability for Microwave Access the control slots and transmit control messages is named (WiMAX), is a recently developed standard for the mesh distributed scheduling procedure. The mesh Broadband Wireless Access (BWA) in fixed and mobile distributed scheduling procedure is a distributed networks. The IEEE 802.16 specifies two different modes algorithm which provides a collision-free access to of sharing the wireless medium: Point-to-Multipoint control slots. (PMP) and mesh. In PMP mode, the network In Ref. [3] the authors analyzed the performance of the organization operations are performed by a node namely mesh distributed scheduling procedure through a Base Station (BS) that has to coordinate Subscriber stochastic model. This allowed the estimation of the time Stations (SSs). On the other hand, in mesh mode the SSs interval between two consecutive accesses to the control can communicate with each other directly. This mode has sub-frame, i.e. the access interval. Then the model is been designed to be employed as a technology for validated through simulation, and can be used to gain Wireless Mesh Networks (WMNs) and can accommodate insights into the properties of the mesh distributed longer distance coverage than the PMP mode by scheduling procedure, in terms of the mean access exploiting cooperative packet relaying. The interest in interval. However, the model is unable to capture all the WMN is rapidly increasing due to the growing potential details of the mesh scheduling procedure due to its of its recently envisaged applications[1].In IEEE 802.16 simplifying assumptions, which are nonetheless 26 © 2010 ACEEE DOI: 01.ijns.01.01.06
  • 2. ACEEE International Journal on Network Security, Vol 1, No. 1, Jan 2010 indispensable to reduce the complexity of the problem so one-hop neighbor but are not linked directly, are called that it can be solved. Afzali et al. [4] have improved two-hop or extended neighbors. scalability problems of stochastic model which were As already introduced, the distributed scheduling introduced in [3]. Bayer et al. carried out a preliminary procedure is applied to coordinate the access to the investigation of the mesh distributed scheduling control slots in a distributed collision-free manner. For procedure through simulation[6]. Wei et al. [7] suggested this reason a node cannot transmit into a control slot that a load-aware and interference aware scheduling algorithm is reserved by one- or two-hop neighbors which are for IEEE 802.16 mesh mode. Their simulation results referred to as competitors of that node. Specifically, each show that the provided schemes effectively improve the node performs a virtual contention by propagating the network throughput performance in IEEE 802.16 mesh control information of its neighbors which is sent during networks and achieve high spectral utilization. Tao et al. previous control slots. This contention based procedure [8] proposed a concurrent transmission algorithm to enforces a strict precedence among competitors. While promote spatial resource reuse, which increases the every node contends until it wins; only one competitor overall end-to-end throughput. Simulation results indicate can win and access a specific control slot. The procedure that different constructions of routing tree impact the of performing this contention is described in [1] and isn’t performance of the concurrent algorithm. Fu et al. [9] the matter of interest in this paper. The major concern in used the concept of collision metric to model the this article is the delay time after which a node contends interference level and prepared a novel routing algorithm again since last access to a control slot. to increase the degree of spatial reuse in wireless mesh Every node must defer its transmission by a holdoff networks. Both the scheduling and routing schemes are time, namely Hx (referring to node x) in units of time based on IEEE 802.16 mesh mode. In Ref. [10] a linear slots. Waiting for a period of Hx, guarantees a collision programming model for optimum routing and scheduling free access to time slots. of flows in a wireless mesh network that include the As specified by the IEEE 802.16 standard, the holdoff effect of interference and allow for variable-rate time Hx is calculated as (1): transmissions was propounded. Cicconetti et al. [11] investigated network scalability and tried to minimize the H x = 2 4+ E x . (1) end to end delay problems by means of performance analysis. Due to the importance of an efficient distributed Where Ex [0, 7] is a system parameter called scheduling algorithm in IEEE 802.16 network XmtHoldoffExponent which can be configured on a per performance, in this paper a heuristic scheduling node basis. Thus, two consecutive slot accesses by the algorithm is proposed that can reduce transmission delay. same node are separated by at least 16 slots according to The performance of the mesh distributed scheduling formula (1), when Ex=0. The challenge is whether the procedure is evaluated, using extensive simulations in a delay of 16 slots is efficient or not? wide variety of scenarios. Our analysis covers some aspects of the mesh distributed scheduling procedure that III. THE HEURISTIC APPROACH have not been yet thoroughly addressed in the literature. As mentioned in previous section, when Ex=0, a node The remainder of the paper is organized as follows. In has to wait for at least 16 slots to access next slot for its Section II we describe the IEEE 802.16 mesh distributed transmission. But waiting for 16 slot isn't efficient, scheduling procedure in details. The novel approach is particularly when there is not even one competitor node discussed in section III. The performance of the new for using these 16 empty slots. For example consider a approach of mesh distributed scheduling procedure is typical WiMAX mesh network (Fig.1 section IV.B) that analyzed in Section IV, with respect to relevant factors, each node has two one-hop neighbors. Therefore, at max, such as the network topology and system configuration every node can have up to four neighbors and extended parameters. We conclude the paper in Section V. neighbors. If we divided sixteen into four, in average we obtain 4 slots per each neighbor for transmission. What II. MESH DISTRIBUTED SCHEDULING PROCEDURE happens if some of those nodes do not want to use their Hereafter in the mesh distributed scheduling procedure opportunity to send any data? node x is assumed as a generic node of the network which Therefore the standard scheduling mechanism does is referred to both BS and SSs. Additionally the common not perform well and causes a significant delay on data name for mesh BS and SSs in the literature of WMNs is packets. On this point of view, we focus on the constant node. value 4 and make this value adaptive with the number of In IEEE 802.16, a logical link is set up between each competitor nodes i.e. nodes competing to access the same couple of nodes, so the directly linked nodes are called slot. one-hop neighbors also they called simply neighbors. On The basic method of IEEE 802.16 standard for the other hand, nodes which have at least one common calculating hold off time is obtained from (1). The new approach is computing the logarithm of number of 27 © 2010 ACEEE DOI: 01.ijns.01.01.06
  • 3. ACEEE International Journal on Network Security, Vol 1, No. 1, Jan 2010 competitor nodes and using the result instead of constant replications are run. The duration of each simulation run 4 in (1). So the new formula is introduced as follows: varied depending on how the specific system was configured. H x = 2(log2 cm+ Ex ) . (2) B. Chain where cm is the number of competing nodes. In order to decrease the number of idle slots and By computing the number of competing nodes, it is improve the network performance, in this scenario a spars evaluated that how many nodes want to transmit and narrow topology i.e. chain is considered. Fig.1 shows message(s) in the current competitive slot. So every node the connections between nodes in chain topology. that wins the competition, after sending data in regarded slot, has to wait as long as hold off time (Hx). This mechanism guarantees the efficient use of channel by reducing idle slots in control subframe. Simulations in the following section show that the adoption of this Figure 1. Schematic representation of nodes connection in chain topology mechanism reduces the transmission interval. Furthermore the delay on data packets caused by the To obtain the network performance parameters, six MAC layer is reduced significantly. simulations are run with respectively 4, 9, 16, 25, 36, 49 number of network nodes. To be compatible with grid- IV. PERFORMANCE EVALUATION full, in chain topology, numbers are selected complete squared. Fig.2 shows the average frame intervals between In this section, the settings under which the simulation two consecutive mesh distributed scheduling messages, in analysis is carried out and the used performance metrics basic standard IEEE 802.16 and heuristic method. There are defined. Then the performance of the mesh distributed is an obvious drop in access interval that is originated by scheduling procedure is evaluated in several scenarios decrement of idle slots with applying proposed method. with varied network configurations. The analysis is aimed Additionally, in the heuristic method, the average access at identifying the effect of applying this solution in IEEE interval rises with the number of nodes increasing, while 802.16 based WMN. The preliminary information on in basic method this metric is almost constant. This network configuration for evaluation setting is provided implies that the average number of nodes competing to in Part A. Specifically, the simulation are run, with the access a certain slot increases while network being more following network topologies: a spars and narrow populated. network topology i.e. chain in Part B, a complicated and dense network topology i.e. grid-full in Part C. A. Evaluation Setting The parameters used in the simulations are compliant with the IEEE 802.16 standard [1]. Specifically, the frame duration is 10 ms and the channel bandwidth is 10 MHz According to the standard, only one channel is used to transmit control information, thus the use of multiple channels is not considered. Furthermore, the traffic considered is of Voice over IP (VOIP) and Video on Demand (VOD) type; however, they did not have any impact on the transmission in control slots. We now define the performance indices that have been considered in order to assess the distributed scheduling Figure 2. Average frame intervals between two consecutive mesh procedure performance in new approach. First metric is distributed scheduling messages for chain average interval (in slot units) between two consecutive The comparison of end-to-end one-way delay between mesh distributed scheduling messages sent by a node. the standard and heuristic method is shown in Fig.3. The Second one is the average end-to-end one-way delay (in chart implies that delay increases with the network seconds). Third metric is the average number of extension. It can be observed that the proposed algorithm competitors per slot during virtual contention and the last has smaller end-to-end one-way delay as a result of one is average of end-to-end throughput per flow (in reducing Hold off time and unused control slots. bytes/seconds). The patch program [12] of coordinated distributed mode of IEEE 802.16 mesh is used in NS2 simulator [13]. The simulation output analysis is carried out using the method of independent replications. Specifically, for each scenario a variable number of independent 28 © 2010 ACEEE DOI: 01.ijns.01.01.06
  • 4. ACEEE International Journal on Network Security, Vol 1, No. 1, Jan 2010 frame intervals become smaller in heuristic method because the nodes can sooner return to competition situation. Additionally, the average access interval growth in grid-full topology is more than in chain. The reason is that the average number of competitors of every node at each slot increases because in grid-full there are more neighbors than chain. Figure 3. Average end-to-end one-way delay for chain Figure 6. Average frame intervals between two consecutive mesh distributed scheduling messages in grid-full The comparison of end-to-end one-way delay is shown in Fig.7. As expected, the heuristic algorithm has smaller end-to-end one-way delay, caused by reduction of Hold off time due to decreasing the empty control slots. In other hand in grid-full topology, the value of delay is less Figure 4. Average end-to-end throughput for chain than chain topology as number of nodes in the network Fig.4 indicates the average of end-to-end throughput. becomes greater. Because of dense nature of grid-full As expected, the network throughput in proposed topology, with the number of nodes increasing the hop algorithm is better than basic standard scheduler. This distance between nodes do not increase significantly. improved result is due to the fact that nodes can quickly The average of end-to-end throughput is indicated in return to the competition state, thus the usage of network Fig.8. It can be seen that the network throughput in free opportunities become more efficient. proposed algorithm has an improvement comparing to the basic standard scheduler. The reason is the same as C. Grid-Full explained for the chain in part B and This can be Another simulation scenario is using a dense network explained by a decreased network contention and thus a topology i.e. grid-full as Fig.5 shows the nodes decreased MSH-DSCH transmission interval. connection in a schematic way. The remarkable point in two recent charts is optimum values in grid-full topology with 9 nodes. As it can be seen, the lowest delay as well as the highest throughput is   obtained in network with 9 nodes. That can be the result of the most efficient use of network resources in this specific situation. Therefore we can say this is the optimum network configuration among studied networks in which the highest value of about 140000 bytes per second of throughput and the least delay of about 0.063 seconds are computed. Figure 5. Scheme of nodes connection in grid-full topology In such networks, every node has more than two neighbors that affect the performance of network transmission scheduling. The simulations with grid-full topology are run with respectively 4, 9, 16, 25, 36, 49 number of network nodes. Fig.6 shows the distinction between average frame intervals in basic IEEE 802.16 standard and heuristic method. It can be seen that the 29 © 2010 ACEEE DOI: 01.ijns.01.01.06
  • 5. ACEEE International Journal on Network Security, Vol 1, No. 1, Jan 2010 REFERENCES [1] IEEE 802.16-2004. “IEEE standard for Local and Metropolitan Area Networks – Part 16: Air interface for Fixed Broadband Wireless Access systems,” Oct. 2004. [2] R. Bruno, M. Conti and E. Gregori, “Mesh networks: Commodity multihop ad hoc networks,” IEEE Communications, vol. 43, no. 3, Mar. 2005, pp. 23–131. [3] M. Cao, V. Raghunathan and P. R. Kumar, “A tractable algorithm for fair and efficient uplink scheduling of multi- hop WiMax mesh networks,” Proc. WiMesh 2006, Reston (VA), USA, Sep. 25, 2006, pp. 101–108. [4] M. Cao, W. Ma, Q. Zhang, X. Wang and W. Zhu, “Modeling and performance analysis of the distributed scheduler in IEEE 802.16 mesh mode,” Proc. ACM Figure 7. Average end-to-end one-way delay for grid-full MobiHoc 2005, Urbana-Champaign (IL), USA, May 25– 28, 2005, pp. 78–89. [5] M. Afzali, H. Ghaffarian and M. Fathy, “Maximum utilization of channel bandwidth using maximum likelihood in concurrent communication in WIMAX,” Proc. The 13th CSI international computer conference, Kish Island, Persian Gulf, Iran, 9-11 March, 2008. [6] N. Bayer, D. Sivchenko, B. Xu, V. Rakocevic and J. Habermann, “Transmission timing of signaling messages in IEEE 802.16 based mesh networks,” Proc. European Wireless 2006, Athens, Greece, Apr. 2–5, 2006. [7] H. Wei, S. Ganguly, R. Izmailove and Z. Haas, “Interference-Aware IEEE 802.16 WiMax Mesh Networks,” The 61st IEEE Vehicular Technology Conference, vol 5, pp 3102-3106, May 2005. [8] J. Tao, F. Liu, Z. Zeng and Z. Lin, “Throughput Figure 8. Average of end-to-end throughput for grid-full Enhancement in WiMax Mesh Networks Using Concurrent Transmission,” International conference on Wireless V. CONCLUSIONS Communications, Networking and Mobile Computing, pp 871-874, September 2005. For solving the scheduling problems of wireless [9] L. Fu, Z. Cao and P. Fan, “Spatial Reuse in IEEE 802.16 metropolitan area networks, a new approach in IEEE Based Wireless Mesh Networks,” IEEE International 802.16 distributed scheduling algorithm in mesh mode is Symposium on Communications and Information proposed and the method of calculating hold off time Technology, pp 1311-1314, October 2005. between two consecutive channel accesses is improved. [10] H. Viswanathan and S. Mukherjee, “Throughput-Rang Tradeoff of Wireless Mesh Backhaul Networks,” IEEE Simulations with various network configuration and journal on selected areas in communications, vol 24, no 3, scenarios show that, applying this solution, inefficient use pp 593-602, march 2006. of channel is effectively decreased. It is observed that the [11] C. Cicconetti, A. Erta and L. Lenzini, “Performance proposed method provides efficient use of network Evaluation of the Mesh Election Procedure of IEEE resources and decreases end-to-end delay. Thus, the 802.16/WiMAX,” Proc. 10th ACM Symposium on proposed distributed scheduling method improves the Modeling, analysis, and simulation of wireless and mobile performance of IEEE 802.16 networks, comparing to the systems, pp 323-327, October 2007. basic standard scheduling. [12] IEEE 802.16d Wireless Mesh Networks patch for NS2, The utilization of IEEE 802.16 scheduler with respect http://info.iet.unipi.it/~cng/ns2mesh80216 [13] http://www.isi.edu/nsnam/ns/, last version 2.31, Mar. 2007. to accumulated network load is considered as future work. 30 © 2010 ACEEE DOI: 01.ijns.01.01.06