Extensive studies have been carried out for reducing the handover time of wireless mobile network at
medium access control (MAC) layer. However, none of them show the impact of reduced handover time
on the overall performance of wireless mobile networks. This paper presents a quantitative analysis to
show the impact of reduced handover time on the performance of wireless mobile networks. The proposed
quantitative model incorporates many critical performance parameters involve in reducing the handover
time for wireless mobile networks. In addition, we analyze the use of active scanning technique with
comparatively shorter beacon interval time in a handoff process. Our experiments verify that the active
scanning can reduce the overall handover time at MAC layer if comparatively shorter beacon intervals are
utilized for packet transmission. The performance measures adopted in this paper for experimental
verifications are network throughput under different network loads.
Joint Timing and Frequency Synchronization in OFDMidescitation
1) The document discusses synchronization challenges in OFDM systems, including packet detection, timing synchronization, and frequency offset calculation. It analyzes various synchronization techniques like auto-correlation difference, auto-correlation sum, and cross-correlation methods for packet detection and timing synchronization.
2) For frequency offset calculation, it describes data-aided and non-data aided algorithms, including the van De Beek algorithm which relies on cyclic prefix redundancy rather than pilot symbols.
3) The key synchronization challenges are maintaining orthogonality between subcarriers in the presence of frequency offsets introduced by the wireless channel, which can significantly degrade performance if not corrected. Accurate synchronization algorithms are important for OFDM receivers to function properly.
IRJET- A Proficient Time Slot Attainment on the Hybrid TDMA / CSMA Multi-Chan...IRJET Journal
This document presents a proposed hybrid TDMA/CSMA multi-channel MAC protocol for VANETs called HTC-MAC. HTC-MAC aims to provide efficient time slot acquisition on the control channel to reduce collision probability. It eliminates unnecessary control packets from the existing HER-MAC protocol. Analysis and simulation results show that HTC-MAC outperforms HER-MAC by acquiring time slots faster, especially in dense scenarios with many contending nodes. The probability of all nodes acquiring time slots within a given number of frames is higher for HTC-MAC compared to HER-MAC.
Delay Limited Transmission Techniques with Low Density Parity Check Method of...IJERA Editor
In a Quasi stationary sources time utilization takes a major role. To implement the delay limited transmission of Quasi stationary sources over block fading channels is considered. Here to reduce the delay we propose the power adaption schemes here we can implement the analytical distortion outage probability as performance measure and also derive the power of each transmission scheme.transmission are presented. The first one is optimizedfor fixed rate transmission, and hence enjoys simplicity of implementation. The second one is a high performance scheme, which also benefits from optimized rate adaptation with respect to source and channel states.for High SNR regime ,the asymptotic outage distortion gain are derived.here another two schemes with fixed transmission powers and adaptive rates are consider for comparisions here source and channel coded optimized power adaption scheme outperforms compare to other schemes,by adding the low density parity check method the delay can be reduced rapidly by using the proposed method.
OPTIMUM EFFICIENT MOBILITY MANAGEMENT SCHEME FOR IPv6 ijngnjournal
Mobile IPv6 (MIPv6) and Hierarchical Mobile IPv6 (HMIPv6) both are the mobility management solutions proposed by the Internet Engineering Task Force (IETF) to support IP Mobility. It’s been an important issue, that upon certain condition, out of MIPv6 and HMIPv6 which one is better. In this paper an Optimum Efficient Mobility Management (OEMM) scheme is described on the basis of analytical model which shows that OEMM Scheme is better in terms of performance and applicability of MIPv6 and HMIPv6. It shows that which one is better alternative between MIPv6 and HMIPv6 and if HMIPv6 is adopted it chooses the best Mobility Anchor Point (MAP). Finally it is illustrated that OEMM scheme is
better than that of MIPv6 and HMIPv6.
Recital Study of Various Congestion Control Protocols in wireless networkiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
This paper investigates fairness among network sessions that use the Multiplicative Increase Multiplicative Decrease (MIMD) congestion control algorithm. It first studies how two MIMD sessions share bandwidth in the presence of synchronous and asynchronous packet losses. It finds that rate-dependent losses lead to fair sharing, while rate-independent losses cause unfairness. The paper also examines fairness between sessions using MIMD (e.g. Scalable TCP) versus Additive Increase Multiplicative Decrease (AIMD, e.g. standard TCP). Simulations show the AIMD sessions converge to equal throughput, while MIMD sessions' throughput depends on initial conditions. Adding rate-dependent losses can achieve fairness between
Short term traffic volume prediction in umts networks using the kalman filter...ijmnct
Accurate traffic volume prediction in Universal Mobile Telecommunication System (UMTS) networks has
become increasingly important because of its vital role in determining the Quality of Service (QoS)
received by subscribers on these networks. This paper developed a short-term traffic volume prediction
model using the Kalman filter algorithm. The model was implemented in MATLAB and validated using
traffic volume dataset collected from a real telecommunication network using graphical and r2 (coefficient
of determination) approaches. The results indicate that the model performs very well as the predicted
traffic volumes compare very closely with the observed traffic volumes on the graphs. The r2 approach
resulted in r2 values in the range of 0.87 to 0.99 indicating 87% to 99% accuracy which compare very well
with the observed traffic volumes.
I-Min: An Intelligent Fermat Point Based Energy Efficient Geographic Packet F...graphhoc
Energy consumption and delay incurred in packet delivery are the two important metrics for measuring the performance of geographic routing protocols for Wireless Adhoc and Sensor Networks (WASN). A protocol capable of ensuring both lesser energy consumption and experiencing lesser delay in packet delivery is thus suitable for networks which are delay sensitive and energy hungry at the same time. Thus a smart packet forwarding technique addressing both the issues is thus the one looked for by any geographic routing protocol. In the present paper we have proposed a Fermat point based forwarding technique which reduces the delay experienced during packet delivery as well as the energy consumed for transmission and reception of data packets.
Joint Timing and Frequency Synchronization in OFDMidescitation
1) The document discusses synchronization challenges in OFDM systems, including packet detection, timing synchronization, and frequency offset calculation. It analyzes various synchronization techniques like auto-correlation difference, auto-correlation sum, and cross-correlation methods for packet detection and timing synchronization.
2) For frequency offset calculation, it describes data-aided and non-data aided algorithms, including the van De Beek algorithm which relies on cyclic prefix redundancy rather than pilot symbols.
3) The key synchronization challenges are maintaining orthogonality between subcarriers in the presence of frequency offsets introduced by the wireless channel, which can significantly degrade performance if not corrected. Accurate synchronization algorithms are important for OFDM receivers to function properly.
IRJET- A Proficient Time Slot Attainment on the Hybrid TDMA / CSMA Multi-Chan...IRJET Journal
This document presents a proposed hybrid TDMA/CSMA multi-channel MAC protocol for VANETs called HTC-MAC. HTC-MAC aims to provide efficient time slot acquisition on the control channel to reduce collision probability. It eliminates unnecessary control packets from the existing HER-MAC protocol. Analysis and simulation results show that HTC-MAC outperforms HER-MAC by acquiring time slots faster, especially in dense scenarios with many contending nodes. The probability of all nodes acquiring time slots within a given number of frames is higher for HTC-MAC compared to HER-MAC.
Delay Limited Transmission Techniques with Low Density Parity Check Method of...IJERA Editor
In a Quasi stationary sources time utilization takes a major role. To implement the delay limited transmission of Quasi stationary sources over block fading channels is considered. Here to reduce the delay we propose the power adaption schemes here we can implement the analytical distortion outage probability as performance measure and also derive the power of each transmission scheme.transmission are presented. The first one is optimizedfor fixed rate transmission, and hence enjoys simplicity of implementation. The second one is a high performance scheme, which also benefits from optimized rate adaptation with respect to source and channel states.for High SNR regime ,the asymptotic outage distortion gain are derived.here another two schemes with fixed transmission powers and adaptive rates are consider for comparisions here source and channel coded optimized power adaption scheme outperforms compare to other schemes,by adding the low density parity check method the delay can be reduced rapidly by using the proposed method.
OPTIMUM EFFICIENT MOBILITY MANAGEMENT SCHEME FOR IPv6 ijngnjournal
Mobile IPv6 (MIPv6) and Hierarchical Mobile IPv6 (HMIPv6) both are the mobility management solutions proposed by the Internet Engineering Task Force (IETF) to support IP Mobility. It’s been an important issue, that upon certain condition, out of MIPv6 and HMIPv6 which one is better. In this paper an Optimum Efficient Mobility Management (OEMM) scheme is described on the basis of analytical model which shows that OEMM Scheme is better in terms of performance and applicability of MIPv6 and HMIPv6. It shows that which one is better alternative between MIPv6 and HMIPv6 and if HMIPv6 is adopted it chooses the best Mobility Anchor Point (MAP). Finally it is illustrated that OEMM scheme is
better than that of MIPv6 and HMIPv6.
Recital Study of Various Congestion Control Protocols in wireless networkiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
This paper investigates fairness among network sessions that use the Multiplicative Increase Multiplicative Decrease (MIMD) congestion control algorithm. It first studies how two MIMD sessions share bandwidth in the presence of synchronous and asynchronous packet losses. It finds that rate-dependent losses lead to fair sharing, while rate-independent losses cause unfairness. The paper also examines fairness between sessions using MIMD (e.g. Scalable TCP) versus Additive Increase Multiplicative Decrease (AIMD, e.g. standard TCP). Simulations show the AIMD sessions converge to equal throughput, while MIMD sessions' throughput depends on initial conditions. Adding rate-dependent losses can achieve fairness between
Short term traffic volume prediction in umts networks using the kalman filter...ijmnct
Accurate traffic volume prediction in Universal Mobile Telecommunication System (UMTS) networks has
become increasingly important because of its vital role in determining the Quality of Service (QoS)
received by subscribers on these networks. This paper developed a short-term traffic volume prediction
model using the Kalman filter algorithm. The model was implemented in MATLAB and validated using
traffic volume dataset collected from a real telecommunication network using graphical and r2 (coefficient
of determination) approaches. The results indicate that the model performs very well as the predicted
traffic volumes compare very closely with the observed traffic volumes on the graphs. The r2 approach
resulted in r2 values in the range of 0.87 to 0.99 indicating 87% to 99% accuracy which compare very well
with the observed traffic volumes.
I-Min: An Intelligent Fermat Point Based Energy Efficient Geographic Packet F...graphhoc
Energy consumption and delay incurred in packet delivery are the two important metrics for measuring the performance of geographic routing protocols for Wireless Adhoc and Sensor Networks (WASN). A protocol capable of ensuring both lesser energy consumption and experiencing lesser delay in packet delivery is thus suitable for networks which are delay sensitive and energy hungry at the same time. Thus a smart packet forwarding technique addressing both the issues is thus the one looked for by any geographic routing protocol. In the present paper we have proposed a Fermat point based forwarding technique which reduces the delay experienced during packet delivery as well as the energy consumed for transmission and reception of data packets.
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
1) The document proposes a mathematical model and optimization service to predict the optimal number of parallel TCP streams needed to maximize data throughput in a distributed computing environment.
2) It develops a novel model that can predict the optimal number using only three data points, and implements this service in the Stork Data Scheduler.
3) Experimental results show the optimized transfer time using this prediction and optimization service is much less than without optimization in most cases.
Stochastic analysis of random ad hoc networks with maximum entropy deploymentsijwmn
In this paper, we present the first stochastic analysis of the link performance of an ad hoc network modelled
by a single homogeneous Poisson point process (HPPP). According to the maximum entropy principle, the
single HPPP model is mathematically the best model for random deployments with a given node density.
However, previous works in the literature only consider a modified model which shows a discrepancy in the
interference distribution with the more suitable single HPPP model. The main contributions of this paper
are as follows. 1) It presents a new mathematical framework leading to closed form expressions of the
probability of success of both one-way transmissions and handshakes for a deployment modelled by a
single HPPP. Our approach, based on stochastic geometry, can be extended to complex protocols. 2) From
the obtained results, all confirmed by comparison to simulated data, optimal PHY and MAC layer
parameters are determined and the relations between them is described in details. 3) The influence of the
routing protocol on handshake performance is taken into account in a realistic manner, leading to the
confirmation of the intuitive result that the effect of imperfect feedback on the probability of success of a
handshake is only negligible for transmissions to the first neighbour node.
Wireless data broadcast is an efficient way of disseminating data to users in the mobile computing environments. From the server’s point of view, how to place the data items on channels is a crucial issue, with the objective of minimizing the average access time and tuning time. Similarly, how to schedule the data retrieval process for a given request at the client side such that all the requested items can be downloaded in a short time is also an important problem. In this paper, we investigate the multi-item data retrieval scheduling in the push-based multichannel broadcast environments. The most important issues in mobile computing are energy efficiency and query response efficiency. However, in data broadcast the objectives of reducing access latency and energy cost can be contradictive to each other. Consequently, we define a new problem named Minimum Cost Data Retrieval Problem (MCDR) and Large Number Data Retrieval (LNDR) Problem. We also develop a heuristic algorithm to download a large number of items efficiently. When there is no replicated item in a broadcast cycle, we show that an optimal retrieval schedule can be obtained in polynomial time
This document summarizes research on reference broadcast time synchronization in wireless sensor networks. It discusses how previous protocols like flooding time synchronization and gradient time synchronization have drawbacks like slow propagation speed and inability to maintain synchronization when nodes crash. It then introduces the reference broadcast synchronization protocol which chooses a reference node using an agreement algorithm and broadcasts time information to synchronize the network. It presents the system architecture and algorithm for how reference broadcast synchronization works to flood time information, perform synchronization based on messages from the parent node, and timestamp events in the network. Evaluation results showing the protocol implemented on line and distributed topologies are also included.
Sparse Random Network Coding for Reliable Multicast ServicesAndrea Tassi
Point-to-Multipoint communications are expected to play a pivotal role in next-generation networks. This talk refers to a cellular system transmitting layered multicast services to a Multicast Group (MG) of users. Reliability of communications is ensured via different Random Linear Network Coding (RLNC) techniques. We deal with a fundamental problem: the computational complexity of the RLNC decoder. The higher the number of decoding operations is, the more the user's computational overhead grows and, consequently, the faster the batteries of mobile devices drain. By referring to several sparse RLNC techniques, and without any assumption on the implementation of the RLNC decoder in use, we provide an efficient way to characterize the performance of users targeted by ultra-reliable layered multicast services. The proposed modeling allows to efficiently derive the average number of coded packet transmissions needed to recover one or more service layers. We design a convex resource allocation framework that allows to minimize the complexity of the RLNC decoder by jointly optimizing the transmission parameters and the sparsity of the code. The designed optimization framework also ensures service guarantees to predetermined fractions of users. Performance of the proposed optimization framework is then investigated in a LTE-A eMBMS network multicasting H.264/SVC video.
Performance Analysis of Ultra Wideband Receivers for High Data Rate Wireless ...graphhoc
The document discusses performance comparisons of different receiver structures for high data rate ultra wideband communication systems. It analyzes Rake, MMSE, and Rake-MMSE receivers using MATLAB simulations on IEEE 802.15.3a channel models. The Rake-MMSE receiver combines advantages of Rake fingers and equalization to combat inter-symbol interference. Simulation results show the Rake-MMSE receiver achieves a lower bit error rate than Rake or MMSE receivers alone. The number of Rake fingers improves performance at low-medium SNR, while more equalizer taps help at high SNR.
Prediction System for Reducing the Cloud Bandwidth and Costijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Fuzzy Route Switching for Energy Preservation(FEP) in Ad Hoc NetworksA. Sufian
Nodes in ad hoc networks have limited battery power. Hence they require energy-efficient technique to improve average
network performance. Maintaining energy-efficiency in ad hoc networks is really challenging because highest energyefficiency
is achieved if all the nodes are always switched off and energy-efficiency will be minimum if all the nodes are
fully operational i.e. always turned-on. Energy preservation requires redirection of data packets through some other routes
having good performance. This improves data packet delivery ratio and number of alive nodes decreasing cost of messages.
Localized Algorithm for Channel Assignment in Cognitive Radio NetworksIJERA Editor
Cognitive Radio has been emerged as a revolutionary solution to migrate the current shortage of spectrum
allocation in wireless networks. In this paper, an improved localized channel allocation algorithm based on
channel weight is proposed. A factor of channel stability is introduced based on link environment, which
efficiently assigns the best channels to the links. Based on the framework, a conflict resolution strategy is used to
make the scheme adaptable to different network conditions. Calculations indicate that this algorithm can reduce
the conflicts, increase the delivery rate and link assignment rate compared with the basic channel assignment
algorithm.
Bounds on the Achievable Rates of Faded Dirty Paper Channel IJCNCJournal
Bounds on the achievable rate of a Gaussian channel in the case that the transmitter knows the
interference signal but not its fading coefficients are given. We generalize the analysis which were studied
in [1] and [4] so that their results are special cases of our analysis. We enforce our bounds by simulations
in which many numerical examples are drawn and investigated under different cases.
IMPROVING SCHEDULING OF DATA TRANSMISSION IN TDMA SYSTEMScsandit
In an era where communication has a most important role in modern societies, designing efficient
algorithms for data transmission is of the outmost importance. TDMA is a technology used in many
communication systems such as satellites and cell phones. In order to transmit data in such systems we
need to cluster them in packages. To achieve a faster transmission we are allowed to preempt the
transmission of any packet in order to resume at a later time. Such preemptions though come with a delay
in order to setup for the next transmission. In this paper we propose an algorithm which yields improved
transmission scheduling. This algorithm we call MGA. We have proven an approximation ratio for MGA
and ran experiments to establish that it works even better in practice. In order to conclude that MGA will
be a very helpful tool in constructing an improved schedule for packet routing using preemtion with a setup
cost, we compare its results to two other efficient algorithms designed by researchers in the past.
A Proposal Analytical Model and Simulation of the Attacks in Routing Protocol...graphhoc
In this work we have devoted to some proposed analytical methods to simulate these attacks, and node mobility in MANET. The model used to simulate the malicious nodes mobility attacks is based on graphical theory, which is a tool for analyzing the behavior of nodes. The model used to simulate the Blackhole cooperative, Blackmail, Bandwidth Saturation and Overflow attacks is based on malicious nodes and the number of hops. We conducted a simulation of the attacks with a C implementation of the proposed mathematical models.
1. The document analyzes TCP Vegas congestion control in Linux 2.6.1. TCP Vegas monitors the difference between expected sending rate and actual sending rate to estimate network congestion and adjust the congestion window size accordingly.
2. The key aspects of TCP Vegas analyzed are delay, fairness, and loss properties. TCP Vegas aims to keep a small, stable number of packets buffered to minimize delay while achieving weighted proportional fairness between connections. It avoids packet loss by carefully extracting congestion information from round-trip times.
3. Analysis shows that in Linux implementation, TCP Vegas increases and decreases the congestion window cautiously in response to traffic, avoiding sharp increases in window size that could lead to congestion like in TCP
Fixed Point Realization of Iterative LR-Aided Soft MIMO Decoding AlgorithmCSCJournals
Multiple-input multiple-output (MIMO) systems have been widely acclaimed in order to provide high data rates. Recently Lattice Reduction (LR) aided detectors have been proposed to achieve near Maximum Likelihood (ML) performance with low complexity. In this paper, we develop the fixed point design of an iterative soft decision based LR-aided K-best decoder, which reduces the complexity of existing sphere decoder. A simulation based word-length optimization is presented for physical implementation of the K-best decoder. Simulations show that the fixed point result of 16 bit precision can keep bit error rate (BER) degradation within 0.3 dB for 8×8 MIMO systems with different modulation schemes.
An improved dft based channel estimationsakru naik
This document proposes an improved DFT-based channel estimation method for MIMO-OFDM systems. The conventional DFT method causes energy leakage in non-sample-spaced multipath channels. The improved method extends the LS estimate using symmetry, calculates the changing rate of leakage energy, and selects useful paths based on this rate to reduce leakage energy. Simulation results show the improved method reduces leakage energy more efficiently and provides better channel estimation performance than LS and conventional DFT algorithms.
This document discusses frame and burst acquisition in a TDMA satellite communication network where transmissions may occur on different transponders. It presents the following key points:
1) A unique word pattern is used to aid in the acquisition process and detect the frame. Soft-decision detection of QPSK modulated signals is used in an additive white Gaussian channel.
2) The probability of detection is low when the false alarm rate is low, leading to a long acquisition time. Conversely, a high false alarm rate yields a high probability of detection and shorter acquisition time.
3) An analysis is presented of the unique word detection process at a traffic terminal, assuming carrier and bit timing have been partially recovered from a reference burst
This document simulates and analyzes the Nakagami fading channel using MATLAB. It begins by introducing multipath fading channel models including Rayleigh, Ricean, and Nakagami distributions. It then uses MATLAB to simulate the complex envelope, level crossing rates, and average fade durations of the Nakagami fading channel under various conditions by varying the Nakagami m parameter. The simulations demonstrate how diversity techniques like maximal ratio combining can mitigate fading effects. Increasing the diversity order or Nakagami m parameter results in lower level crossing rates and shorter average fade durations, improving signal quality.
This document summarizes a research paper that proposes a distributed protocol for assigning time slots in a wireless sensor network. The protocol has two phases: 1) Nodes fairly reserve multiple slots in a fixed frame to transmit data, so each node gets a fair share. 2) A centralized greedy algorithm is applied to reduce the frame length while ensuring each node gets at least one slot, making the frame as short as possible. Simulation results showed the protocol improves fairness of slot distribution and reduces frame length compared to an earlier algorithm.
Design, implementation and evaluation of icmp based available network bandwid...IJCNCJournal
We propose a method to measure available network ba
ndwidth using the Internet Control Message
Protocol (ICMP). The recently proposed ImTCP techni
que uses Transmission Control Protocol (TCP) data
packets and the corresponding acknowledgement respo
nses to measure the available bandwidth between
sender and receiver. Since ImTCP needs to change th
e sender’s TCP implementation, it needs
modifications to sender’s operating system kernel.
Moreover, ImTCP cannot measure available bandwidth
accurately if the receiver sends delayed acknowledg
ments. These problems stem from the use of TCP. In
this paper, we discuss an ICMP-based method that ov
ercomes these limitations. We evaluate the
performance of the proposed method in an experiment
al network and show that it generates less
measurement traffic and requires less time for band
width measurement than PathLoad. We also show that
proposed method can measure the available bandwidth
even if the bandwidth changes during
measurement
Iaetsd a novel scheduling algorithms for mimo based wireless networksIaetsd Iaetsd
This document proposes new scheduling algorithms for MIMO wireless networks to improve system performance. It discusses designing practical user scheduling algorithms to maximize capacity in MIMO systems. Various MAC scheduling policies are implemented and modified to provide distributed traffic control, robustness against interference, and increased efficiency of resource utilization. Simulations using MATLAB compare the different policies and draw important results and conclusions. The paper suggests new priority scheduling and partially fair scheduling algorithms incorporating awareness of interference to improve system-level performance in MIMO wireless networks.
This document proposes a short-frame approximation for analyzing the packet loss rate of Irregular Repetition Slotted ALOHA (IRSA), particularly for frames up to 50 slots. The existing approximations become loose for short frames. The proposed approximation, called SF approximation, extends an existing approximation (EF) by considering a larger set of over 20,000 stopping sets, compared to around 60 in the EF approximation. This provides a tighter characterization of packet loss rate for short IRSA frames needed for low-latency IIoT applications. The SF approximation is computed more accurately but is still faster than simulation. Initial results show the SF approximation achieves a 20% lower packet loss rate than the EF approximation for a scenario with 10 slots and
This document summarizes a research paper that proposes a new cooperative channel load aware VoIP routing topology for 802.11 WLAN networks. It introduces the concept of cooperative channel transmitting technology for 802.11 WLAN networks and discusses some of the challenges in providing quality of service guarantees. It then presents a linear programming model and scheduling algorithm to implement cooperative channel transmissions while considering queue status and transitive node relationships to maximize throughput. Simulation results show that the proposed scheduling algorithm improves throughput and fairness compared to alternatives.
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
1) The document proposes a mathematical model and optimization service to predict the optimal number of parallel TCP streams needed to maximize data throughput in a distributed computing environment.
2) It develops a novel model that can predict the optimal number using only three data points, and implements this service in the Stork Data Scheduler.
3) Experimental results show the optimized transfer time using this prediction and optimization service is much less than without optimization in most cases.
Stochastic analysis of random ad hoc networks with maximum entropy deploymentsijwmn
In this paper, we present the first stochastic analysis of the link performance of an ad hoc network modelled
by a single homogeneous Poisson point process (HPPP). According to the maximum entropy principle, the
single HPPP model is mathematically the best model for random deployments with a given node density.
However, previous works in the literature only consider a modified model which shows a discrepancy in the
interference distribution with the more suitable single HPPP model. The main contributions of this paper
are as follows. 1) It presents a new mathematical framework leading to closed form expressions of the
probability of success of both one-way transmissions and handshakes for a deployment modelled by a
single HPPP. Our approach, based on stochastic geometry, can be extended to complex protocols. 2) From
the obtained results, all confirmed by comparison to simulated data, optimal PHY and MAC layer
parameters are determined and the relations between them is described in details. 3) The influence of the
routing protocol on handshake performance is taken into account in a realistic manner, leading to the
confirmation of the intuitive result that the effect of imperfect feedback on the probability of success of a
handshake is only negligible for transmissions to the first neighbour node.
Wireless data broadcast is an efficient way of disseminating data to users in the mobile computing environments. From the server’s point of view, how to place the data items on channels is a crucial issue, with the objective of minimizing the average access time and tuning time. Similarly, how to schedule the data retrieval process for a given request at the client side such that all the requested items can be downloaded in a short time is also an important problem. In this paper, we investigate the multi-item data retrieval scheduling in the push-based multichannel broadcast environments. The most important issues in mobile computing are energy efficiency and query response efficiency. However, in data broadcast the objectives of reducing access latency and energy cost can be contradictive to each other. Consequently, we define a new problem named Minimum Cost Data Retrieval Problem (MCDR) and Large Number Data Retrieval (LNDR) Problem. We also develop a heuristic algorithm to download a large number of items efficiently. When there is no replicated item in a broadcast cycle, we show that an optimal retrieval schedule can be obtained in polynomial time
This document summarizes research on reference broadcast time synchronization in wireless sensor networks. It discusses how previous protocols like flooding time synchronization and gradient time synchronization have drawbacks like slow propagation speed and inability to maintain synchronization when nodes crash. It then introduces the reference broadcast synchronization protocol which chooses a reference node using an agreement algorithm and broadcasts time information to synchronize the network. It presents the system architecture and algorithm for how reference broadcast synchronization works to flood time information, perform synchronization based on messages from the parent node, and timestamp events in the network. Evaluation results showing the protocol implemented on line and distributed topologies are also included.
Sparse Random Network Coding for Reliable Multicast ServicesAndrea Tassi
Point-to-Multipoint communications are expected to play a pivotal role in next-generation networks. This talk refers to a cellular system transmitting layered multicast services to a Multicast Group (MG) of users. Reliability of communications is ensured via different Random Linear Network Coding (RLNC) techniques. We deal with a fundamental problem: the computational complexity of the RLNC decoder. The higher the number of decoding operations is, the more the user's computational overhead grows and, consequently, the faster the batteries of mobile devices drain. By referring to several sparse RLNC techniques, and without any assumption on the implementation of the RLNC decoder in use, we provide an efficient way to characterize the performance of users targeted by ultra-reliable layered multicast services. The proposed modeling allows to efficiently derive the average number of coded packet transmissions needed to recover one or more service layers. We design a convex resource allocation framework that allows to minimize the complexity of the RLNC decoder by jointly optimizing the transmission parameters and the sparsity of the code. The designed optimization framework also ensures service guarantees to predetermined fractions of users. Performance of the proposed optimization framework is then investigated in a LTE-A eMBMS network multicasting H.264/SVC video.
Performance Analysis of Ultra Wideband Receivers for High Data Rate Wireless ...graphhoc
The document discusses performance comparisons of different receiver structures for high data rate ultra wideband communication systems. It analyzes Rake, MMSE, and Rake-MMSE receivers using MATLAB simulations on IEEE 802.15.3a channel models. The Rake-MMSE receiver combines advantages of Rake fingers and equalization to combat inter-symbol interference. Simulation results show the Rake-MMSE receiver achieves a lower bit error rate than Rake or MMSE receivers alone. The number of Rake fingers improves performance at low-medium SNR, while more equalizer taps help at high SNR.
Prediction System for Reducing the Cloud Bandwidth and Costijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Fuzzy Route Switching for Energy Preservation(FEP) in Ad Hoc NetworksA. Sufian
Nodes in ad hoc networks have limited battery power. Hence they require energy-efficient technique to improve average
network performance. Maintaining energy-efficiency in ad hoc networks is really challenging because highest energyefficiency
is achieved if all the nodes are always switched off and energy-efficiency will be minimum if all the nodes are
fully operational i.e. always turned-on. Energy preservation requires redirection of data packets through some other routes
having good performance. This improves data packet delivery ratio and number of alive nodes decreasing cost of messages.
Localized Algorithm for Channel Assignment in Cognitive Radio NetworksIJERA Editor
Cognitive Radio has been emerged as a revolutionary solution to migrate the current shortage of spectrum
allocation in wireless networks. In this paper, an improved localized channel allocation algorithm based on
channel weight is proposed. A factor of channel stability is introduced based on link environment, which
efficiently assigns the best channels to the links. Based on the framework, a conflict resolution strategy is used to
make the scheme adaptable to different network conditions. Calculations indicate that this algorithm can reduce
the conflicts, increase the delivery rate and link assignment rate compared with the basic channel assignment
algorithm.
Bounds on the Achievable Rates of Faded Dirty Paper Channel IJCNCJournal
Bounds on the achievable rate of a Gaussian channel in the case that the transmitter knows the
interference signal but not its fading coefficients are given. We generalize the analysis which were studied
in [1] and [4] so that their results are special cases of our analysis. We enforce our bounds by simulations
in which many numerical examples are drawn and investigated under different cases.
IMPROVING SCHEDULING OF DATA TRANSMISSION IN TDMA SYSTEMScsandit
In an era where communication has a most important role in modern societies, designing efficient
algorithms for data transmission is of the outmost importance. TDMA is a technology used in many
communication systems such as satellites and cell phones. In order to transmit data in such systems we
need to cluster them in packages. To achieve a faster transmission we are allowed to preempt the
transmission of any packet in order to resume at a later time. Such preemptions though come with a delay
in order to setup for the next transmission. In this paper we propose an algorithm which yields improved
transmission scheduling. This algorithm we call MGA. We have proven an approximation ratio for MGA
and ran experiments to establish that it works even better in practice. In order to conclude that MGA will
be a very helpful tool in constructing an improved schedule for packet routing using preemtion with a setup
cost, we compare its results to two other efficient algorithms designed by researchers in the past.
A Proposal Analytical Model and Simulation of the Attacks in Routing Protocol...graphhoc
In this work we have devoted to some proposed analytical methods to simulate these attacks, and node mobility in MANET. The model used to simulate the malicious nodes mobility attacks is based on graphical theory, which is a tool for analyzing the behavior of nodes. The model used to simulate the Blackhole cooperative, Blackmail, Bandwidth Saturation and Overflow attacks is based on malicious nodes and the number of hops. We conducted a simulation of the attacks with a C implementation of the proposed mathematical models.
1. The document analyzes TCP Vegas congestion control in Linux 2.6.1. TCP Vegas monitors the difference between expected sending rate and actual sending rate to estimate network congestion and adjust the congestion window size accordingly.
2. The key aspects of TCP Vegas analyzed are delay, fairness, and loss properties. TCP Vegas aims to keep a small, stable number of packets buffered to minimize delay while achieving weighted proportional fairness between connections. It avoids packet loss by carefully extracting congestion information from round-trip times.
3. Analysis shows that in Linux implementation, TCP Vegas increases and decreases the congestion window cautiously in response to traffic, avoiding sharp increases in window size that could lead to congestion like in TCP
Fixed Point Realization of Iterative LR-Aided Soft MIMO Decoding AlgorithmCSCJournals
Multiple-input multiple-output (MIMO) systems have been widely acclaimed in order to provide high data rates. Recently Lattice Reduction (LR) aided detectors have been proposed to achieve near Maximum Likelihood (ML) performance with low complexity. In this paper, we develop the fixed point design of an iterative soft decision based LR-aided K-best decoder, which reduces the complexity of existing sphere decoder. A simulation based word-length optimization is presented for physical implementation of the K-best decoder. Simulations show that the fixed point result of 16 bit precision can keep bit error rate (BER) degradation within 0.3 dB for 8×8 MIMO systems with different modulation schemes.
An improved dft based channel estimationsakru naik
This document proposes an improved DFT-based channel estimation method for MIMO-OFDM systems. The conventional DFT method causes energy leakage in non-sample-spaced multipath channels. The improved method extends the LS estimate using symmetry, calculates the changing rate of leakage energy, and selects useful paths based on this rate to reduce leakage energy. Simulation results show the improved method reduces leakage energy more efficiently and provides better channel estimation performance than LS and conventional DFT algorithms.
This document discusses frame and burst acquisition in a TDMA satellite communication network where transmissions may occur on different transponders. It presents the following key points:
1) A unique word pattern is used to aid in the acquisition process and detect the frame. Soft-decision detection of QPSK modulated signals is used in an additive white Gaussian channel.
2) The probability of detection is low when the false alarm rate is low, leading to a long acquisition time. Conversely, a high false alarm rate yields a high probability of detection and shorter acquisition time.
3) An analysis is presented of the unique word detection process at a traffic terminal, assuming carrier and bit timing have been partially recovered from a reference burst
This document simulates and analyzes the Nakagami fading channel using MATLAB. It begins by introducing multipath fading channel models including Rayleigh, Ricean, and Nakagami distributions. It then uses MATLAB to simulate the complex envelope, level crossing rates, and average fade durations of the Nakagami fading channel under various conditions by varying the Nakagami m parameter. The simulations demonstrate how diversity techniques like maximal ratio combining can mitigate fading effects. Increasing the diversity order or Nakagami m parameter results in lower level crossing rates and shorter average fade durations, improving signal quality.
This document summarizes a research paper that proposes a distributed protocol for assigning time slots in a wireless sensor network. The protocol has two phases: 1) Nodes fairly reserve multiple slots in a fixed frame to transmit data, so each node gets a fair share. 2) A centralized greedy algorithm is applied to reduce the frame length while ensuring each node gets at least one slot, making the frame as short as possible. Simulation results showed the protocol improves fairness of slot distribution and reduces frame length compared to an earlier algorithm.
Design, implementation and evaluation of icmp based available network bandwid...IJCNCJournal
We propose a method to measure available network ba
ndwidth using the Internet Control Message
Protocol (ICMP). The recently proposed ImTCP techni
que uses Transmission Control Protocol (TCP) data
packets and the corresponding acknowledgement respo
nses to measure the available bandwidth between
sender and receiver. Since ImTCP needs to change th
e sender’s TCP implementation, it needs
modifications to sender’s operating system kernel.
Moreover, ImTCP cannot measure available bandwidth
accurately if the receiver sends delayed acknowledg
ments. These problems stem from the use of TCP. In
this paper, we discuss an ICMP-based method that ov
ercomes these limitations. We evaluate the
performance of the proposed method in an experiment
al network and show that it generates less
measurement traffic and requires less time for band
width measurement than PathLoad. We also show that
proposed method can measure the available bandwidth
even if the bandwidth changes during
measurement
Iaetsd a novel scheduling algorithms for mimo based wireless networksIaetsd Iaetsd
This document proposes new scheduling algorithms for MIMO wireless networks to improve system performance. It discusses designing practical user scheduling algorithms to maximize capacity in MIMO systems. Various MAC scheduling policies are implemented and modified to provide distributed traffic control, robustness against interference, and increased efficiency of resource utilization. Simulations using MATLAB compare the different policies and draw important results and conclusions. The paper suggests new priority scheduling and partially fair scheduling algorithms incorporating awareness of interference to improve system-level performance in MIMO wireless networks.
This document proposes a short-frame approximation for analyzing the packet loss rate of Irregular Repetition Slotted ALOHA (IRSA), particularly for frames up to 50 slots. The existing approximations become loose for short frames. The proposed approximation, called SF approximation, extends an existing approximation (EF) by considering a larger set of over 20,000 stopping sets, compared to around 60 in the EF approximation. This provides a tighter characterization of packet loss rate for short IRSA frames needed for low-latency IIoT applications. The SF approximation is computed more accurately but is still faster than simulation. Initial results show the SF approximation achieves a 20% lower packet loss rate than the EF approximation for a scenario with 10 slots and
This document summarizes a research paper that proposes a new cooperative channel load aware VoIP routing topology for 802.11 WLAN networks. It introduces the concept of cooperative channel transmitting technology for 802.11 WLAN networks and discusses some of the challenges in providing quality of service guarantees. It then presents a linear programming model and scheduling algorithm to implement cooperative channel transmissions while considering queue status and transitive node relationships to maximize throughput. Simulation results show that the proposed scheduling algorithm improves throughput and fairness compared to alternatives.
A Heuristic Algorithm For The Resource Assignment Problem In Satellite Teleco...Elizabeth Williams
The document proposes a heuristic algorithm for solving the resource assignment problem in satellite telecommunication networks using Demand Assigned Multiple Access (DAMA) protocol. The algorithm allows processing capacity requests with message expiration times and maximum packet loss rates using minimum bandwidth. It models the problem as a two-dimensional strip packing problem and adapts the Best Fit Decreasing heuristic to provide candidate solutions within hundreds of milliseconds, meeting the real-time response needs of such networks.
IRJET-A Survey on Red Queue Mechanism for Reduce Congestion in Wireless NetworkIRJET Journal
This document summarizes several queue management mechanisms for congestion control in wireless networks, including Random Early Detection (RED) and variants. RED detects congestion by tracking average queue length and dropping packets probabilistically. Variants like Fuzzy Logic RED (FLRED) and Hemi-Rise Cloud Model (CRED) aim to improve RED by addressing its sensitivity to parameters and nonlinearity. Explicit Congestion Control (ECC) and Explicit Non-Congestion Notification (ENCN) modify TCP headers to signal congestion or non-congestion. Three section Random Early Detection (TRED) divides the queue into three sections to calculate dropping probability nonlinearly. These variants aim to more effectively control congestion and improve performance
Scheduling and Resource allocation in 802.11ax (WIFI 6)RESHAN FARAZ
--> IIITD Course Project.
--> Implementation of Scheduling and Resource allocation in 802.11ax using NS-3.
-->Modified Largest Weighted Delay First.
--> Comparison of Round Robin Scheduling with Modified Largest Weighted Delay First.
-->Source Code:-https://github.com/reshan9b11/MLWDF_WN_PROJECT
Multi-carrier Equalization by Restoration of RedundancY (MERRY) for Adaptive ...IJNSA Journal
This paper proposes a new blind adaptive channel shortening approach for multi-carrier systems. The performance of the discrete Fourier transform-DMT (DFT-DMT) system is investigated with the proposed DST-DMT system over the standard carrier serving area (CSA) loop1. Enhanced bit rates demonstrated and less complexity also involved by the simulation of the DST-DMT system.
I am Bernard. I am a Computer Networking Assignment Expert at computernetworkassignmenthelp.com. I hold a Master's in Computer Science from, University of Leeds, UK. I have been helping students with their assignments for the past 12 years. I solve assignments related to Computer Networking.
Visit computernetworkassignmenthelp.com or email support@computernetworkassignmenthelp.com.
You can also call on +1 678 648 4277 for any assistance with Computer Networking Assignment.
This document proposes a discrete wavelet transform (DWT)-based channel estimation method for MIMO-OFDM systems. It describes the transmitter and receiver structures of a wavelet-based OFDM system with multiple antennas. At the transmitter, data is modulated using inverse DWT and transmitted over frequency-selective channels. At the receiver, received signals are processed using DWT to estimate the channel. Least squares and minimum mean squared error estimation techniques are discussed. Simulation results show the DWT-based system achieves better bit error rate performance than conventional FFT-based OFDM.
In this paper, we consider the joint optimal sensing
and distributed MAC protocol design for cognitive radio
networks. Specifically, we design a synchronized MAC protocol
for dynamic spectrum sharing among multiple secondary
users, which incorporates spectrum sensing for protecting active
primary users. We perform saturation throughput analysis for
the proposed MAC protocol that explicitly captures spectrum
sensing performance. Then, we find its optimal configuration
by formulating a throughput maximization problem subject to
detection probability constraints for primary users. In particular,
the optimal solution of this optimization problem returns the
required sensing time for primary users’ protection and optimal
contention window for maximizing total throughput of the
secondary network. Finally, numerical results are presented to
illustrate a significant performance gain of the optimal sensing
and protocol configuration.
OfdmaClosed-Form Rate Outage Probability for OFDMA Multi-Hop Broadband Wirele...IJASCSE
This document summarizes a research paper that analyzes the rate outage probability for OFDMA multi-hop broadband wireless networks under Nakagami-m fading channels. The paper derives closed-form expressions for the rate outage probability, moment generating function, probability distribution function, and cumulative distribution function. It considers both single-hop and multi-hop network scenarios. For single-hop networks, the paper formulates an optimization problem to maximize total transmission rate while ensuring fairness for all users.
This document proposes a methodology for incorporating uplink delay constraints into LTE cell planning for smart grid applications. It presents the following:
1) A semi-analytical approach is proposed to evaluate uplink transmission delays considering buffering delays before scheduling, packet transmission/retransmission delays over the air interface, and constraints from smart grid standards.
2) Analytical models are used to estimate buffering delays before scheduling based on queue length and service rate. Packet transmission delays are estimated considering packet segmentation, link adaptation, resource block allocation and retransmissions.
3) A cell planning algorithm is described that incorporates these delay metrics to validate compliance with smart grid delay constraints and determine the maximum cell range based on
This document proposes a methodology for incorporating uplink delay constraints into LTE cell planning for smart grid applications. It presents the following:
1) A semi-analytical approach is proposed to evaluate uplink transmission delays considering buffering delays before scheduling, packet transmission/retransmission delays over the air interface, and constraints from smart grid standards.
2) Analytical models are used to estimate buffering delays before scheduling based on queue length and service rate. Packet transmission delays are estimated considering packet segmentation, link adaptation, resource block allocation and retransmissions.
3) A cell planning algorithm is analyzed that incorporates these delay metrics to validate compliance with smart grid delay constraints defined in standards. Path loss, interference
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
The document discusses single carrier transmission using LabVIEW & NI-USRP. It covers several topics:
1. Symbol synchronization using the maximum output energy solution which introduces an adaptive element to find the optimal sampling time that maximizes output power.
2. The role of pseudo-noise sequences in frame synchronization, which provide properties like balance and unpredictability needed for random sequences.
3. The Moose algorithm for carrier frequency offset estimation and correction which exploits least squares to determine the phase shift between training sequences and correct sample phases.
4. The effects of multipath propagation including fading caused by constructive/destructive interference from multiple propagation paths, and intersymbol interference when path delays cause symbol interference.
The document discusses single carrier transmission using LabVIEW & NI-USRP. It covers several topics:
1. Symbol synchronization using the maximum output energy solution which introduces an adaptive element to find the optimal sampling time that maximizes output power.
2. The role of pseudo-noise sequences in frame synchronization, which provide properties like balance and unpredictability needed for random sequences.
3. The Moose algorithm for carrier frequency offset estimation and correction which exploits least squares to determine the phase shift between training sequences and correct sample phases.
4. The effects of multipath propagation including fading caused by constructive/destructive interference from multiple propagation paths, and intersymbol interference when path delays cause symbol interference.
An efficient ant optimized multipath routing in wireless sensor networkEditor Jacotech
Today, the Wireless Sensor Network is increasingly gaining popularity and importance. It is the more interesting and stimulating area of research. Now, the WSN is applied in object tracking and environmental monitoring applications. This paper presents the self-optimized model of multipath routing algorithm for WSN which considers definite parameters like delay, throughput level and loss and generates the outcomes that maximizes data throughput rate and minimizes delay and loss. This algorithm is based on ANT optimization technique that will bring out an optimal and organized route for WSN and is also to avoid congestion in WSN, the algorithm incorporate multipath capability..
Classical Discrete-Time Fourier TransformBased Channel Estimation for MIMO-OF...IJCSEA Journal
In this document, we look at various time domain channel estimation methods with this constraint of null carriers at spectrumborders.We showin detail howto gauge the importance of the “border effect” depending on the number of null carriers, which may vary from one system to another. Thereby we assess the limit of the technique discussed when the number of null carriers is large. Finally the DFT with the truncated singular value decomposition (SVD) technique is proposed to completely eliminate the impact of the null subcarriers whatever their number. A technique for the determination of the truncation threshold for any MIMO-OFDM system is also proposed.
Efficient Broadcast Authentication with Highest Life Span in Wireless Sensor ...IRJET Journal
This document discusses efficient broadcast authentication to maximize the lifetime of wireless sensor networks. It proposes using a greedy heuristics algorithm with the X-TESLA broadcast authentication protocol. X-TESLA uses short key chains to authenticate broadcast messages but has limitations regarding sleep modes, network failures, idle sessions, extended lifetime, and denial-of-service attacks. The proposed approach combines X-TESLA with greedy heuristics to address these issues and significantly improve network lifetime compared to using each approach alone. It aims to find a broadcast tree that maximizes the minimum residual energy of nodes after broadcasting to prolong the ability of the network to complete future broadcasts.
RTH-RSS Mac: Path loss exponent estimation with received signal strength loca...IOSR Journals
The document summarizes a study on integrating received signal strength path-loss exponent (RSS PLE) estimation localization into the Real Time Hybrid MAC (RTHMAC) protocol. RTHMAC combines TDMA and FDMA to provide soft real-time communication for wireless sensor networks. The study develops a new RTH-RSS MAC protocol that replaces the initialization and discovery phases of RTHMAC with an RSS PLE localization technique called IDRSS-PLE. This aims to minimize delay, maximize network lifetime by decreasing energy consumption of nodes. Simulations show that using RSS PLE localization, RTH-RSS MAC is able to achieve less energy consumption and shorter localization response times compared to the classical RTHMAC protocol.
Similar to A QUANTITATIVE ANALYSIS OF HANDOVER TIME AT MAC LAYER FOR WIRELESS MOBILE NETWORKS (20)
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
We have compiled the most important slides from each speaker's presentation. This year’s compilation, available for free, captures the key insights and contributions shared during the DfMAy 2024 conference.
Literature Review Basics and Understanding Reference Management.pptxDr Ramhari Poudyal
Three-day training on academic research focuses on analytical tools at United Technical College, supported by the University Grant Commission, Nepal. 24-26 May 2024
Understanding Inductive Bias in Machine LearningSUTEJAS
This presentation explores the concept of inductive bias in machine learning. It explains how algorithms come with built-in assumptions and preferences that guide the learning process. You'll learn about the different types of inductive bias and how they can impact the performance and generalizability of machine learning models.
The presentation also covers the positive and negative aspects of inductive bias, along with strategies for mitigating potential drawbacks. We'll explore examples of how bias manifests in algorithms like neural networks and decision trees.
By understanding inductive bias, you can gain valuable insights into how machine learning models work and make informed decisions when building and deploying them.
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTjpsjournal1
The rivalry between prominent international actors for dominance over Central Asia's hydrocarbon
reserves and the ancient silk trade route, along with China's diplomatic endeavours in the area, has been
referred to as the "New Great Game." This research centres on the power struggle, considering
geopolitical, geostrategic, and geoeconomic variables. Topics including trade, political hegemony, oil
politics, and conventional and nontraditional security are all explored and explained by the researcher.
Using Mackinder's Heartland, Spykman Rimland, and Hegemonic Stability theories, examines China's role
in Central Asia. This study adheres to the empirical epistemological method and has taken care of
objectivity. This study analyze primary and secondary research documents critically to elaborate role of
china’s geo economic outreach in central Asian countries and its future prospect. China is thriving in trade,
pipeline politics, and winning states, according to this study, thanks to important instruments like the
Shanghai Cooperation Organisation and the Belt and Road Economic Initiative. According to this study,
China is seeing significant success in commerce, pipeline politics, and gaining influence on other
governments. This success may be attributed to the effective utilisation of key tools such as the Shanghai
Cooperation Organisation and the Belt and Road Economic Initiative.
ACEP Magazine edition 4th launched on 05.06.2024Rahul
This document provides information about the third edition of the magazine "Sthapatya" published by the Association of Civil Engineers (Practicing) Aurangabad. It includes messages from current and past presidents of ACEP, memories and photos from past ACEP events, information on life time achievement awards given by ACEP, and a technical article on concrete maintenance, repairs and strengthening. The document highlights activities of ACEP and provides a technical educational article for members.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
International Conference on NLP, Artificial Intelligence, Machine Learning an...gerogepatton
International Conference on NLP, Artificial Intelligence, Machine Learning and Applications (NLAIM 2024) offers a premier global platform for exchanging insights and findings in the theory, methodology, and applications of NLP, Artificial Intelligence, Machine Learning, and their applications. The conference seeks substantial contributions across all key domains of NLP, Artificial Intelligence, Machine Learning, and their practical applications, aiming to foster both theoretical advancements and real-world implementations. With a focus on facilitating collaboration between researchers and practitioners from academia and industry, the conference serves as a nexus for sharing the latest developments in the field.
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesChristina Lin
Traditionally, dealing with real-time data pipelines has involved significant overhead, even for straightforward tasks like data transformation or masking. However, in this talk, we’ll venture into the dynamic realm of WebAssembly (WASM) and discover how it can revolutionize the creation of stateless streaming pipelines within a Kafka (Redpanda) broker. These pipelines are adept at managing low-latency, high-data-volume scenarios.
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...University of Maribor
Slides from talk presenting:
Aleš Zamuda: Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapter and Networking.
Presentation at IcETRAN 2024 session:
"Inter-Society Networking Panel GRSS/MTT-S/CIS
Panel Session: Promoting Connection and Cooperation"
IEEE Slovenia GRSS
IEEE Serbia and Montenegro MTT-S
IEEE Slovenia CIS
11TH INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONIC AND COMPUTING ENGINEERING
3-6 June 2024, Niš, Serbia
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
A QUANTITATIVE ANALYSIS OF HANDOVER TIME AT MAC LAYER FOR WIRELESS MOBILE NETWORKS
1. International Journal of Wireless & Mobile Networks (IJWMN), Vol 1, No 2, November 2009
21
ABSTRACT
Extensive studies have been carried out for reducing the handover time of wireless mobile network at
medium access control (MAC) layer. However, none of them show the impact of reduced handover time
on the overall performance of wireless mobile networks. This paper presents a quantitative analysis to
show the impact of reduced handover time on the performance of wireless mobile networks. The proposed
quantitative model incorporates many critical performance parameters involve in reducing the handover
time for wireless mobile networks. In addition, we analyze the use of active scanning technique with
comparatively shorter beacon interval time in a handoff process. Our experiments verify that the active
scanning can reduce the overall handover time at MAC layer if comparatively shorter beacon intervals are
utilized for packet transmission. The performance measures adopted in this paper for experimental
verifications are network throughput under different network loads.
KEYWORDS
Handover time, medium access control, detection phase latency time, wireless mobile networks
1. INTRODUCTION
A Handoff occurs in IEEE 802.11b when a mobile station moves beyond the radio range of one
access point (AP) and enters in another coverage area at the MAC layer. During the handoff,
management frames are exchanged between the station (STA) and the AP. Consequently, there
is a latency involved in the handoff process during which the STA is unable to send or receive
traffic. On the other hand, our measurements are not only shown that the latencies are very high
but also shown that they vary significantly for the same configuration of stations and AP. In this
paper, we use full scan handoff to denote the original active handoff scheme of the wireless
card which scans all channels consecutively in the discovery phase. Most improvements to the
active scan handoff strive to scan fewer channels. This is called as selective scan handoff. The
authors of [1] proposed a MAC layer fast handoff. They use selective scan to record the scan
results in the “AP cache” for future use. However, in the case of incorrect cached information,
the handoff latency is the same as that of the full scan handoff. Recently, a fast scan handoff
Syed S. Rizvi1
, Aasia Riasat2
, and Khaled M. Elleithy3
1
Computer Science and Engineering Department, University of Bridgeport, Bridgeport, CT, USA
srizvi@bridgeport.edu
2
Department of Computer Science, Institute of Business Management, Karachi, Pakistan
aasia.riasat@iobm.edu.pk
3
Computer Science and Engineering Department, University of Bridgeport, Bridgeport, CT, USA
elleithy@bridgeport.edu
A QUANTITATIVE ANALYSIS OF HANDOVER TIME AT
MAC LAYER FOR WIRELESS MOBILE NETWORKS
2. International Journal of Wireless & Mobile Networks (IJWMN), Vol 1, No 2, November 2009
22
scheme is proposed [2]. Instead of broadcasting the probe request frame to all APs, the probe
request frame is sent to a specific AP who will be the sole responder. However, this scheme
needs to change both the wireless mobile stations and the AP.
2. MATHEMATICAL MODEL FOR REDUCING THE HANDOVER TIME
This section presents a mathematical model that incorporates many critical performance
measurements to show the impact of reduced handover time on wireless mobile networks. The
performance of the cells permits the use of the real time services when the MAC scheduler is
modified [3]. However, our study focuses on the optimization of the second method. We have
observed in our measurements that stations firstly assume collision and retransmit several
times. If transmission remains unsuccessful, then radio fading is assumed and the link is probed
by sending probe requests.
We present an argument that stations must start the search phase as soon as collision can be
excluded as reason for failure. If the actual reason was a temporary signal fading, the selected
AP’s search would likely be the current one and the handoff will not be executed. Thus, a key
factor in our detection algorithm is the number of collisions that a frame can suffer before it is
transmitted.
2.1.Proposed Mathematical Model for the Collision Detection and Avoidance
We use the probability distribution function (PDF) to approximate the number of collisions for
both saturated and non-saturated cases. The proposed probabilistic approach assumes that the
STAs must start the search phase as soon as collision can be excluded as reason for failure. If
the actual reason was a temporary signal fading, the selected AP after the search would likely
be the current one and the handoff will not be executed. According to PDF, if we assume that a
random variable X represents a collision per frame transmission, then X should lie within a
certain range representing by R . We assume that the value of R belongs to an interval of two
values representing as MIN
V and MAX
V . This argument leads us to the following mathematical
expression:
{ } { }
, where ,
MIN MIN
MAX MAX
X V V R V V
∈
→
∈ (1)
By further extending (1), we can approximate the probability that X lies in the ideal interval:
( ) { }
,
MIN MIN
MAX MAX
F F
P X V V V V
= −
∈ (2)
Where F represents the PDF and P is the probability that X lies within the defined interval for
collision avoidance. Based on (1) and (2), one can produce the PDF for the collision avoidance
as shown in (3):
( ) { }
P
R
R F R X R
=
→ ≤ (3)
If we further assume that the system consists of K users, then (1) and (3) be used to
approximate the probability of collision per frame transmission. In other words, by reversing
the order of probabilities given in (1) and (3) with respect to the ideal range shown in (2), we
can approximate the number of total collisions as follows.
3. International Journal of Wireless & Mobile Networks (IJWMN), Vol 1, No 2, November 2009
23
{ } ( ) 1
0
1 (1 )
R
i R
j
P P P P
X R +
=
= − −
≤ ∑ @ (4)
where the sign “ @” represents the estimated value and the term ( )
1
1
R
P
+
− can be considered as a
normalization term to ensure that the probability of each random backoff time follows a valid
PDF.
The random backoff time will be discussed later in detail. In addition, R will be any real
number representing the number of STAs ready to transmit the frames. The range of R is
provided in (2). In order to derive a generic equation that includes both detection and
avoidance, we can now combine our four equations that yield the following result:
{ } ( ) ( ) { }
{ }
1
0
1 (1 ) R
P X R
F R P X R
i
j
P P P P
X R
≤
= ≤ +
=
= − −
≤ ∑ @ (5)
Equation (5) consists of both the probability of detection and collision avoidance
characteristics.
For the sake of simulation, we assume that there are n numbers of STAs that are transmitting a
fixed packet size of typically 40 bytes using an ideal channel. Fig. 1 shows a regular case of
packet transmission when only a limited number of users are transmitting at one time. In
addition, for Fig. 1 we run our simulation multiple times for different values of n.
In order to address the worst case scenario, we consider n number of STAs with an additional
assumption that all STAs have data to transmit all the time via an ideal channel (i.e., the
standard IEEE 802.11 MAC [1]) as shown in Fig. 2. It should be noted in Fig. 2 that the
probability of collision increases as we increase the probability of transmission per frame.
However, the performance degradation was small compared to the increase in probability of
Figure 1. PDF versus number of collision per frame with ideal channel condition for a non-
saturated condition
4. International Journal of Wireless & Mobile Networks (IJWMN), Vol 1, No 2, November 2009
24
packet transmission.
Fig. 1 shows that three consecutive collisions is a rare event, even in saturation as shown in Fig.
2. This implies that there is no need to explicitly probe the link. The same conditions that we
used throughout our measurements, this time would be around 3 ms, which are approximately
leads to 300.
In order to compute the minimum channel time, we follow the classical theory of Slotted Aloha
protocol [4]. That is, each STA listens to the channel before the transmission of the frames. If
the channel is busy, it defers the transmission with a certain probability. On the other hand, if
the channel is free for a certain time (called DIFS, Distributed Inter Frame Space, in the
standard [3]), then the STA can transmit the frames.
In addition, when the channel is busy, each node waits for a random amount of time and then
periodically listen the channel to find possible DIFS. This random wait-time can be considered
as a random backoff time that each node needs to experience during the high contention. Since
each STA can only transmit during a certain slot, this random backoff time is, therefore, a
multiple of slot times. In addition, we also assume that there is no propagation time and
response generation time involve in the computation of minimum channel time. The above
discussion leads us to the following mathematical expression:
( ) ( ) ( )
CT Time Time
Min DIFS RB S
≥ + × (6)
where ( )
CT
Min referees to minimum channel time, DIFS, Time
RB represents random backoff time,
and the parameter Time
S indicates the length of the slot. We can approximate the ideal range of
( )
CT
Min as follows: ( )
R CT
AP Min DIFS
≥ ≥
Figure 2. PDF versus number of collision per frame with ideal channel condition for a saturated
condition
5. International Journal of Wireless & Mobile Networks (IJWMN), Vol 1, No 2, November 2009
25
Next, we need to compute the values of maximum channel time which might work as the upper
threshold value. Since 10 STAs per cell seem to be an adequate number to achieve a good cell
throughput [5], we have simulated the different beacon interval with OPNET to figure out the
suitable max channel time. Based on our experiments, we conclude that the best value for
maximum channel time is 10 milliseconds. The last step is to compute the total search time.
According to the IEEE standard [1], each STA requires to scan all available channels during
active scan. The available channels include both busy channels (B) and free channels (F). Also,
the time to scan a busy channel is not necessarily the same as to scan a free channel. This,
therefore, leads us to a simple mathematical expression for the total search
time: ( ) ( )
Time B F
SE T B T F
= + where the left hand side of this expression represents the total search
time, and B
T and F
T represents the time required to scan a busy and free channels, respectively.
The last step is to compute the maximum channel time and the total search time. The available
channels include both busy channels (B) and free channels (F). The total search time will be
based on the total time required to scan both busy and free channels. This leads to the following
equation:
( )
( ) ( )
( ) ( )
( ) ( )
( )
2 , 2
B F
Delay CT Delay CT
T P Max T P Min
= + = + (7)
If we assume that we have an ideal minimum time for scanning free channels, then the
following mathematical expressions must be true:
( )
( ) ( )
( )
( )
( ) ( ) ( )
2
2
B Delay CT
F Delay Time Time
T P Max
T P DIFS RB S
= +
= + + ×
(8)
( )
( ) ( )
( )( )
( )
( ) ( ) ( )( )
2
2
Time Delay CT
Delay Time Time
SE P Max B
P F
DIFS RB S
= +
+ + + ×
(9)
The above minimum channel time and the maximum channel time provides the best searching
result as compared to the current network cards provides. Specifically, we can use (9) to
approximate the total scanning time involves in the search phase. Next section shows the effect
of our proposed mathematical model in terms of load balancing, throughput, and transmission
delay.
3. PERFORMANCE ANALYSIS OF THE PROPOSED MATHEMATICAL MODEL
The performance measures adopted in this paper are network load, throughput, and the media
access delay. The system is modeled in OPNET for both lightly and heavily loaded networks.
Fig. 3 is based on our mathematical derivation that simulates the search-timer for the Min-
Channel. The result of this simulation should fall between 670ms and 1024ms. The lowest
threshold value has been derived from standard industry and IEEE has given the constant
factors [1]. The upper threshold value, however, is suggested based on the maximum latency
involved in the given wireless mobile network.
It can be evident in Fig. 3 that below 670ms there is no significant improvement. However, for
such a short period of time (i.e., below 670ms), it would likely decrease the overall network
efficiency. This is due to the fact that below 670ms, it is more likely that channels will be more
quickly declared as empty channels where as the maximum latency time will gradually increase
6. International Journal of Wireless & Mobile Networks (IJWMN), Vol 1, No 2, November 2009
26
resulting in overall poor performance of the network. It should also be noted in Fig. 3 that as we
increase the minimum threshold to 1024ms, this increases the overall network traffic.
Fig. 4 shows a comparison of throughput versus network traffic. It can be clearly seen in Fig. 4
that as we linearly increase the network traffic, the overall throughput of the system decreases.
In other words, an increase in minimum channel time becomes one of the reasons for a decrease
in overall network throughput. It should also be noted that the results of Fig. 4 is not only the
experimental verification of the results of Fig. 3 but also provide some better and technical
insight in the increase of throughput. In addition, the overall system throughput decreases
sharply, however, it makes some spikes during the random intervals. It can be evident in Fig. 4
that the overall throughput increases significantly with respect to the varying network load
represented in Fig. 3.
4. CONCLUSION
In this paper, we have proposed a mathematical model that can be used to effectively reduce the
handover time of WLAN at MAC layer. Specifically, we proposed a mathematical model for
collision detection and avoidance as well as for search phase. Our simulation results verify that
the utilization of probabilistic approach with the active scanning yields lower latency for each
detection and search phases provided that if we utilize the appropriate values of some critical
parameters such as the beacon interval, minimum and the maximum search times. Both
simulation and numerical results of this paper demonstrate that the reduced handover time at
MAC layer provides better load balancing, high throughput, and minimum frame transmission
delay.
Figure 3. Network load with different values of beacon interval versus time
7. International Journal of Wireless & Mobile Networks (IJWMN), Vol 1, No 2, November 2009
27
4. REFERENCES
[1] S. Shin, G. Forte, S. Rawat, and H. Schulzrinne, “Reducing MAC layer Handoff Latency in IEEE
802.11 wireless LANs,” in MOBIWAC ’04: Proceedings of the second international workshop on
Mobility management & wireless access protocols, pp. 19–26, New York, NY, USA, 2004. ACM
Press.
[2] M. Jeong, F. Watanabe, and T. Kawahara, “Fast Active Scan for Measurement and Handoff,”
Technical report, DoCoMo USA Labs, Contribution to IEEE 802, May 2003.
[3] G. Bianchi, “Performance analysis of the IEEE 802.11 Distributed Coordination Function,” Selected
Areas in Communications, IEEE Journal, Vol. 18, Issue 3, pp. 535 – 547, Mar 2000.
[4] D. Geun and W. Sook, “Performance of an Exponential Backoff Scheme for Slotted-ALOHA
protocol in local wireless Environment,” IEEE transactions on vehicular technology,
1995, vol. 44, pp. 470-479, 1995.
[5] S. Shin, G. Forte, S. Rawat, and H. Schulzrinne, “Reducing MAC layer Handoff Latency in IEEE
802.11 wireless LANs,” in MOBIWAC ’04: Proceedings of the second international workshop on
Mobility management & wireless access protocols, pp. 19–26, New York, NY, USA, 2004. ACM
Press.
Figure 4. WLAN throughput versus probe request/response transmission time
8. International Journal of Wireless & Mobile Networks (IJWMN), Vol 1, No 2, November 2009
28
Authors
SYED S. RIZVI is a Ph.D. student of Computer Engineering at University of
Bridgeport. He received a B.S. in Computer Engineering from Sir Syed
University of Engineering and Technology and an M.S. in Computer
Engineering from Old Dominion University in 2001 and 2005 respectively. In
the past, he has done research on bioinformatics projects where he
investigated the use of Linux based cluster search engines for finding the
desired proteins in input and outputs sequences from multiple databases. For
last one year, his research focused primarily on the modeling and simulation
of wide range parallel/distributed systems and the web based training
applications. Syed Rizvi is the author/co-authors of 73 scholarly publications
in various areas. His current research focuses on the design, implementation and comparisons of
algorithms in the areas of multiuser communications, multipath signals detection, multi-access interference
estimation, computational complexity and combinatorial optimization of multiuser receivers, peer-to-peer
networking, and reconfigurable coprocessor and FPGA based architectures.
AASIA RIASAT is an Assistant Professor of Computer Science at Institute
of Business Management (IOBM) since May 2006. She received an M.S.C.
in Computer Science from the University of Sindh, and an M.S in Computer
Science from Old Dominion University in 1999, and 2005, respectively. For
last one year, she is working as one of the active members of the wireless and
mobile communications (WMC) lab research group of University of
Bridgeport, Bridgeport CT. In WMC research group, she is mainly
responsible for simulation design for all the research work. Aasia Riasat is
the author or co-author of more than 30 scholarly research papers in various
areas. Her research interests include modeling and simulation for parallel and distributed systems, web-
based visualization, virtual reality, data compression, and algorithms optimization.
Khaled Elleithy received the B.Sc. degree in computer science and automatic
control from Alexandria University in 1983, the MS Degree in computer
networks from the same university in 1986, and the MS and Ph.D. degrees in
computer science from The Center for Advanced Computer Studies at the
University of Louisiana at Lafayette in 1988 and 1990, respectively. From
1983 to 1986, he was with the Computer Science Department, Alexandria
University, Egypt, as a lecturer. From September 1990 to May 1995 he
worked as an assistant professor at the Department of Computer Engineering,
King Fahd University of Petroleum and Minerals, Dhahran, Saudi Arabia.
From May 1995 to December 2000, he has worked as an Associate Professor in the same department. In
January 2000, Dr. Elleithy has joined the Department of Computer Science and Engineering in University
of Bridgeport as an associate professor. Dr. Elleithy published more than seventy research papers in
international journals and conferences. He has research interests are in the areas of computer networks,
network security, mobile communications, and formal approaches for design and verification.