SlideShare a Scribd company logo
International Journal of Wireless & Mobile Networks (IJWMN), Vol 1, No 2, November 2009
21
ABSTRACT
Extensive studies have been carried out for reducing the handover time of wireless mobile network at
medium access control (MAC) layer. However, none of them show the impact of reduced handover time
on the overall performance of wireless mobile networks. This paper presents a quantitative analysis to
show the impact of reduced handover time on the performance of wireless mobile networks. The proposed
quantitative model incorporates many critical performance parameters involve in reducing the handover
time for wireless mobile networks. In addition, we analyze the use of active scanning technique with
comparatively shorter beacon interval time in a handoff process. Our experiments verify that the active
scanning can reduce the overall handover time at MAC layer if comparatively shorter beacon intervals are
utilized for packet transmission. The performance measures adopted in this paper for experimental
verifications are network throughput under different network loads.
KEYWORDS
Handover time, medium access control, detection phase latency time, wireless mobile networks
1. INTRODUCTION
A Handoff occurs in IEEE 802.11b when a mobile station moves beyond the radio range of one
access point (AP) and enters in another coverage area at the MAC layer. During the handoff,
management frames are exchanged between the station (STA) and the AP. Consequently, there
is a latency involved in the handoff process during which the STA is unable to send or receive
traffic. On the other hand, our measurements are not only shown that the latencies are very high
but also shown that they vary significantly for the same configuration of stations and AP. In this
paper, we use full scan handoff to denote the original active handoff scheme of the wireless
card which scans all channels consecutively in the discovery phase. Most improvements to the
active scan handoff strive to scan fewer channels. This is called as selective scan handoff. The
authors of [1] proposed a MAC layer fast handoff. They use selective scan to record the scan
results in the “AP cache” for future use. However, in the case of incorrect cached information,
the handoff latency is the same as that of the full scan handoff. Recently, a fast scan handoff
Syed S. Rizvi1
, Aasia Riasat2
, and Khaled M. Elleithy3
1
Computer Science and Engineering Department, University of Bridgeport, Bridgeport, CT, USA
srizvi@bridgeport.edu
2
Department of Computer Science, Institute of Business Management, Karachi, Pakistan
aasia.riasat@iobm.edu.pk
3
Computer Science and Engineering Department, University of Bridgeport, Bridgeport, CT, USA
elleithy@bridgeport.edu
A QUANTITATIVE ANALYSIS OF HANDOVER TIME AT
MAC LAYER FOR WIRELESS MOBILE NETWORKS
International Journal of Wireless & Mobile Networks (IJWMN), Vol 1, No 2, November 2009
22
scheme is proposed [2]. Instead of broadcasting the probe request frame to all APs, the probe
request frame is sent to a specific AP who will be the sole responder. However, this scheme
needs to change both the wireless mobile stations and the AP.
2. MATHEMATICAL MODEL FOR REDUCING THE HANDOVER TIME
This section presents a mathematical model that incorporates many critical performance
measurements to show the impact of reduced handover time on wireless mobile networks. The
performance of the cells permits the use of the real time services when the MAC scheduler is
modified [3]. However, our study focuses on the optimization of the second method. We have
observed in our measurements that stations firstly assume collision and retransmit several
times. If transmission remains unsuccessful, then radio fading is assumed and the link is probed
by sending probe requests.
We present an argument that stations must start the search phase as soon as collision can be
excluded as reason for failure. If the actual reason was a temporary signal fading, the selected
AP’s search would likely be the current one and the handoff will not be executed. Thus, a key
factor in our detection algorithm is the number of collisions that a frame can suffer before it is
transmitted.
2.1.Proposed Mathematical Model for the Collision Detection and Avoidance
We use the probability distribution function (PDF) to approximate the number of collisions for
both saturated and non-saturated cases. The proposed probabilistic approach assumes that the
STAs must start the search phase as soon as collision can be excluded as reason for failure. If
the actual reason was a temporary signal fading, the selected AP after the search would likely
be the current one and the handoff will not be executed. According to PDF, if we assume that a
random variable X represents a collision per frame transmission, then X should lie within a
certain range representing by R . We assume that the value of R belongs to an interval of two
values representing as MIN
V and MAX
V . This argument leads us to the following mathematical
expression:
{ } { }
, where ,
MIN MIN
MAX MAX
X V V R V V
∈

→
∈ (1)
By further extending (1), we can approximate the probability that X lies in the ideal interval:
( ) { }
,
MIN MIN
MAX MAX
F F
P X V V V V
= −
∈ (2)
Where F represents the PDF and P is the probability that X lies within the defined interval for
collision avoidance. Based on (1) and (2), one can produce the PDF for the collision avoidance
as shown in (3):
( ) { }
P
R
R F R X R
=
→ ≤ (3)
If we further assume that the system consists of K users, then (1) and (3) be used to
approximate the probability of collision per frame transmission. In other words, by reversing
the order of probabilities given in (1) and (3) with respect to the ideal range shown in (2), we
can approximate the number of total collisions as follows.
International Journal of Wireless & Mobile Networks (IJWMN), Vol 1, No 2, November 2009
23
{ } ( ) 1
0
1 (1 )
R
i R
j
P P P P
X R +
=
= − −
≤ ∑ @ (4)
where the sign “ @” represents the estimated value and the term ( )
1
1
R
P
+
− can be considered as a
normalization term to ensure that the probability of each random backoff time follows a valid
PDF.
The random backoff time will be discussed later in detail. In addition, R will be any real
number representing the number of STAs ready to transmit the frames. The range of R is
provided in (2). In order to derive a generic equation that includes both detection and
avoidance, we can now combine our four equations that yield the following result:
{ } ( ) ( ) { }
{ }
1
0
1 (1 ) R
P X R
F R P X R
i
j
P P P P
X R
≤
= ≤ +
=
= − −
≤ ∑ @ (5)
Equation (5) consists of both the probability of detection and collision avoidance
characteristics.
For the sake of simulation, we assume that there are n numbers of STAs that are transmitting a
fixed packet size of typically 40 bytes using an ideal channel. Fig. 1 shows a regular case of
packet transmission when only a limited number of users are transmitting at one time. In
addition, for Fig. 1 we run our simulation multiple times for different values of n.
In order to address the worst case scenario, we consider n number of STAs with an additional
assumption that all STAs have data to transmit all the time via an ideal channel (i.e., the
standard IEEE 802.11 MAC [1]) as shown in Fig. 2. It should be noted in Fig. 2 that the
probability of collision increases as we increase the probability of transmission per frame.
However, the performance degradation was small compared to the increase in probability of
Figure 1. PDF versus number of collision per frame with ideal channel condition for a non-
saturated condition
International Journal of Wireless & Mobile Networks (IJWMN), Vol 1, No 2, November 2009
24
packet transmission.
Fig. 1 shows that three consecutive collisions is a rare event, even in saturation as shown in Fig.
2. This implies that there is no need to explicitly probe the link. The same conditions that we
used throughout our measurements, this time would be around 3 ms, which are approximately
leads to 300.
In order to compute the minimum channel time, we follow the classical theory of Slotted Aloha
protocol [4]. That is, each STA listens to the channel before the transmission of the frames. If
the channel is busy, it defers the transmission with a certain probability. On the other hand, if
the channel is free for a certain time (called DIFS, Distributed Inter Frame Space, in the
standard [3]), then the STA can transmit the frames.
In addition, when the channel is busy, each node waits for a random amount of time and then
periodically listen the channel to find possible DIFS. This random wait-time can be considered
as a random backoff time that each node needs to experience during the high contention. Since
each STA can only transmit during a certain slot, this random backoff time is, therefore, a
multiple of slot times. In addition, we also assume that there is no propagation time and
response generation time involve in the computation of minimum channel time. The above
discussion leads us to the following mathematical expression:
( ) ( ) ( )
CT Time Time
Min DIFS RB S
≥ + × (6)
where ( )
CT
Min referees to minimum channel time, DIFS, Time
RB represents random backoff time,
and the parameter Time
S indicates the length of the slot. We can approximate the ideal range of
( )
CT
Min as follows: ( )
R CT
AP Min DIFS
≥ ≥
Figure 2. PDF versus number of collision per frame with ideal channel condition for a saturated
condition
International Journal of Wireless & Mobile Networks (IJWMN), Vol 1, No 2, November 2009
25
Next, we need to compute the values of maximum channel time which might work as the upper
threshold value. Since 10 STAs per cell seem to be an adequate number to achieve a good cell
throughput [5], we have simulated the different beacon interval with OPNET to figure out the
suitable max channel time. Based on our experiments, we conclude that the best value for
maximum channel time is 10 milliseconds. The last step is to compute the total search time.
According to the IEEE standard [1], each STA requires to scan all available channels during
active scan. The available channels include both busy channels (B) and free channels (F). Also,
the time to scan a busy channel is not necessarily the same as to scan a free channel. This,
therefore, leads us to a simple mathematical expression for the total search
time: ( ) ( )
Time B F
SE T B T F
= + where the left hand side of this expression represents the total search
time, and B
T and F
T represents the time required to scan a busy and free channels, respectively.
The last step is to compute the maximum channel time and the total search time. The available
channels include both busy channels (B) and free channels (F). The total search time will be
based on the total time required to scan both busy and free channels. This leads to the following
equation:
( )
( ) ( )
( ) ( )
( ) ( )
( )
2 , 2
B F
Delay CT Delay CT
T P Max T P Min
= + = + (7)
If we assume that we have an ideal minimum time for scanning free channels, then the
following mathematical expressions must be true:
( )
( ) ( )
( )
( )
( ) ( ) ( )
2
2
B Delay CT
F Delay Time Time
T P Max
T P DIFS RB S
= +
= + + ×
(8)
( )
( ) ( )
( )( )
( )
( ) ( ) ( )( )
2
2
Time Delay CT
Delay Time Time
SE P Max B
P F
DIFS RB S
 
= +
 
 
+ + + ×
 
(9)
The above minimum channel time and the maximum channel time provides the best searching
result as compared to the current network cards provides. Specifically, we can use (9) to
approximate the total scanning time involves in the search phase. Next section shows the effect
of our proposed mathematical model in terms of load balancing, throughput, and transmission
delay.
3. PERFORMANCE ANALYSIS OF THE PROPOSED MATHEMATICAL MODEL
The performance measures adopted in this paper are network load, throughput, and the media
access delay. The system is modeled in OPNET for both lightly and heavily loaded networks.
Fig. 3 is based on our mathematical derivation that simulates the search-timer for the Min-
Channel. The result of this simulation should fall between 670ms and 1024ms. The lowest
threshold value has been derived from standard industry and IEEE has given the constant
factors [1]. The upper threshold value, however, is suggested based on the maximum latency
involved in the given wireless mobile network.
It can be evident in Fig. 3 that below 670ms there is no significant improvement. However, for
such a short period of time (i.e., below 670ms), it would likely decrease the overall network
efficiency. This is due to the fact that below 670ms, it is more likely that channels will be more
quickly declared as empty channels where as the maximum latency time will gradually increase
International Journal of Wireless & Mobile Networks (IJWMN), Vol 1, No 2, November 2009
26
resulting in overall poor performance of the network. It should also be noted in Fig. 3 that as we
increase the minimum threshold to 1024ms, this increases the overall network traffic.
Fig. 4 shows a comparison of throughput versus network traffic. It can be clearly seen in Fig. 4
that as we linearly increase the network traffic, the overall throughput of the system decreases.
In other words, an increase in minimum channel time becomes one of the reasons for a decrease
in overall network throughput. It should also be noted that the results of Fig. 4 is not only the
experimental verification of the results of Fig. 3 but also provide some better and technical
insight in the increase of throughput. In addition, the overall system throughput decreases
sharply, however, it makes some spikes during the random intervals. It can be evident in Fig. 4
that the overall throughput increases significantly with respect to the varying network load
represented in Fig. 3.
4. CONCLUSION
In this paper, we have proposed a mathematical model that can be used to effectively reduce the
handover time of WLAN at MAC layer. Specifically, we proposed a mathematical model for
collision detection and avoidance as well as for search phase. Our simulation results verify that
the utilization of probabilistic approach with the active scanning yields lower latency for each
detection and search phases provided that if we utilize the appropriate values of some critical
parameters such as the beacon interval, minimum and the maximum search times. Both
simulation and numerical results of this paper demonstrate that the reduced handover time at
MAC layer provides better load balancing, high throughput, and minimum frame transmission
delay.
Figure 3. Network load with different values of beacon interval versus time
International Journal of Wireless & Mobile Networks (IJWMN), Vol 1, No 2, November 2009
27
4. REFERENCES
[1] S. Shin, G. Forte, S. Rawat, and H. Schulzrinne, “Reducing MAC layer Handoff Latency in IEEE
802.11 wireless LANs,” in MOBIWAC ’04: Proceedings of the second international workshop on
Mobility management & wireless access protocols, pp. 19–26, New York, NY, USA, 2004. ACM
Press.
[2] M. Jeong, F. Watanabe, and T. Kawahara, “Fast Active Scan for Measurement and Handoff,”
Technical report, DoCoMo USA Labs, Contribution to IEEE 802, May 2003.
[3] G. Bianchi, “Performance analysis of the IEEE 802.11 Distributed Coordination Function,” Selected
Areas in Communications, IEEE Journal, Vol. 18, Issue 3, pp. 535 – 547, Mar 2000.
[4] D. Geun and W. Sook, “Performance of an Exponential Backoff Scheme for Slotted-ALOHA
protocol in local wireless Environment,” IEEE transactions on vehicular technology,
1995, vol. 44, pp. 470-479, 1995.
[5] S. Shin, G. Forte, S. Rawat, and H. Schulzrinne, “Reducing MAC layer Handoff Latency in IEEE
802.11 wireless LANs,” in MOBIWAC ’04: Proceedings of the second international workshop on
Mobility management & wireless access protocols, pp. 19–26, New York, NY, USA, 2004. ACM
Press.
Figure 4. WLAN throughput versus probe request/response transmission time
International Journal of Wireless & Mobile Networks (IJWMN), Vol 1, No 2, November 2009
28
Authors
SYED S. RIZVI is a Ph.D. student of Computer Engineering at University of
Bridgeport. He received a B.S. in Computer Engineering from Sir Syed
University of Engineering and Technology and an M.S. in Computer
Engineering from Old Dominion University in 2001 and 2005 respectively. In
the past, he has done research on bioinformatics projects where he
investigated the use of Linux based cluster search engines for finding the
desired proteins in input and outputs sequences from multiple databases. For
last one year, his research focused primarily on the modeling and simulation
of wide range parallel/distributed systems and the web based training
applications. Syed Rizvi is the author/co-authors of 73 scholarly publications
in various areas. His current research focuses on the design, implementation and comparisons of
algorithms in the areas of multiuser communications, multipath signals detection, multi-access interference
estimation, computational complexity and combinatorial optimization of multiuser receivers, peer-to-peer
networking, and reconfigurable coprocessor and FPGA based architectures.
AASIA RIASAT is an Assistant Professor of Computer Science at Institute
of Business Management (IOBM) since May 2006. She received an M.S.C.
in Computer Science from the University of Sindh, and an M.S in Computer
Science from Old Dominion University in 1999, and 2005, respectively. For
last one year, she is working as one of the active members of the wireless and
mobile communications (WMC) lab research group of University of
Bridgeport, Bridgeport CT. In WMC research group, she is mainly
responsible for simulation design for all the research work. Aasia Riasat is
the author or co-author of more than 30 scholarly research papers in various
areas. Her research interests include modeling and simulation for parallel and distributed systems, web-
based visualization, virtual reality, data compression, and algorithms optimization.
Khaled Elleithy received the B.Sc. degree in computer science and automatic
control from Alexandria University in 1983, the MS Degree in computer
networks from the same university in 1986, and the MS and Ph.D. degrees in
computer science from The Center for Advanced Computer Studies at the
University of Louisiana at Lafayette in 1988 and 1990, respectively. From
1983 to 1986, he was with the Computer Science Department, Alexandria
University, Egypt, as a lecturer. From September 1990 to May 1995 he
worked as an assistant professor at the Department of Computer Engineering,
King Fahd University of Petroleum and Minerals, Dhahran, Saudi Arabia.
From May 1995 to December 2000, he has worked as an Associate Professor in the same department. In
January 2000, Dr. Elleithy has joined the Department of Computer Science and Engineering in University
of Bridgeport as an associate professor. Dr. Elleithy published more than seventy research papers in
international journals and conferences. He has research interests are in the areas of computer networks,
network security, mobile communications, and formal approaches for design and verification.

More Related Content

What's hot

IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
 
Stochastic analysis of random ad hoc networks with maximum entropy deployments
Stochastic analysis of random ad hoc networks with maximum entropy deploymentsStochastic analysis of random ad hoc networks with maximum entropy deployments
Stochastic analysis of random ad hoc networks with maximum entropy deployments
ijwmn
 
Journal paper 1
Journal paper 1Journal paper 1
Journal paper 1
Editor IJCATR
 
Paper id 35201569
Paper id 35201569Paper id 35201569
Paper id 35201569
IJRAT
 
Sparse Random Network Coding for Reliable Multicast Services
Sparse Random Network Coding for Reliable Multicast ServicesSparse Random Network Coding for Reliable Multicast Services
Sparse Random Network Coding for Reliable Multicast Services
Andrea Tassi
 
Performance Analysis of Ultra Wideband Receivers for High Data Rate Wireless ...
Performance Analysis of Ultra Wideband Receivers for High Data Rate Wireless ...Performance Analysis of Ultra Wideband Receivers for High Data Rate Wireless ...
Performance Analysis of Ultra Wideband Receivers for High Data Rate Wireless ...
graphhoc
 
Prediction System for Reducing the Cloud Bandwidth and Cost
Prediction System for Reducing the Cloud Bandwidth and CostPrediction System for Reducing the Cloud Bandwidth and Cost
Prediction System for Reducing the Cloud Bandwidth and Cost
ijceronline
 
Fuzzy Route Switching for Energy Preservation(FEP) in Ad Hoc Networks
Fuzzy Route Switching for Energy Preservation(FEP) in Ad Hoc NetworksFuzzy Route Switching for Energy Preservation(FEP) in Ad Hoc Networks
Fuzzy Route Switching for Energy Preservation(FEP) in Ad Hoc Networks
A. Sufian
 
Localized Algorithm for Channel Assignment in Cognitive Radio Networks
Localized Algorithm for Channel Assignment in Cognitive Radio NetworksLocalized Algorithm for Channel Assignment in Cognitive Radio Networks
Localized Algorithm for Channel Assignment in Cognitive Radio Networks
IJERA Editor
 
Bounds on the Achievable Rates of Faded Dirty Paper Channel
Bounds on the Achievable Rates of Faded Dirty Paper Channel Bounds on the Achievable Rates of Faded Dirty Paper Channel
Bounds on the Achievable Rates of Faded Dirty Paper Channel
IJCNCJournal
 
IMPROVING SCHEDULING OF DATA TRANSMISSION IN TDMA SYSTEMS
IMPROVING SCHEDULING OF DATA TRANSMISSION IN TDMA SYSTEMSIMPROVING SCHEDULING OF DATA TRANSMISSION IN TDMA SYSTEMS
IMPROVING SCHEDULING OF DATA TRANSMISSION IN TDMA SYSTEMS
csandit
 
A Proposal Analytical Model and Simulation of the Attacks in Routing Protocol...
A Proposal Analytical Model and Simulation of the Attacks in Routing Protocol...A Proposal Analytical Model and Simulation of the Attacks in Routing Protocol...
A Proposal Analytical Model and Simulation of the Attacks in Routing Protocol...
graphhoc
 
G028033037
G028033037G028033037
G028033037
researchinventy
 
Fixed Point Realization of Iterative LR-Aided Soft MIMO Decoding Algorithm
Fixed Point Realization of Iterative LR-Aided Soft MIMO Decoding AlgorithmFixed Point Realization of Iterative LR-Aided Soft MIMO Decoding Algorithm
Fixed Point Realization of Iterative LR-Aided Soft MIMO Decoding Algorithm
CSCJournals
 
An improved dft based channel estimation
An improved dft based channel estimationAn improved dft based channel estimation
An improved dft based channel estimation
sakru naik
 
Frame and-burst-acquisition-in-tdma-satellite-communication-networks-with-tra...
Frame and-burst-acquisition-in-tdma-satellite-communication-networks-with-tra...Frame and-burst-acquisition-in-tdma-satellite-communication-networks-with-tra...
Frame and-burst-acquisition-in-tdma-satellite-communication-networks-with-tra...
Cemal Ardil
 
10.1.1.666.9435
10.1.1.666.943510.1.1.666.9435
10.1.1.666.9435
Sreekrishna Das
 
A_Fair_Multiple-Slot_Assignment_Protocol_for_Sched
A_Fair_Multiple-Slot_Assignment_Protocol_for_SchedA_Fair_Multiple-Slot_Assignment_Protocol_for_Sched
A_Fair_Multiple-Slot_Assignment_Protocol_for_Sched
Debesh Sadhukhan
 
Design, implementation and evaluation of icmp based available network bandwid...
Design, implementation and evaluation of icmp based available network bandwid...Design, implementation and evaluation of icmp based available network bandwid...
Design, implementation and evaluation of icmp based available network bandwid...
IJCNCJournal
 

What's hot (19)

IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Stochastic analysis of random ad hoc networks with maximum entropy deployments
Stochastic analysis of random ad hoc networks with maximum entropy deploymentsStochastic analysis of random ad hoc networks with maximum entropy deployments
Stochastic analysis of random ad hoc networks with maximum entropy deployments
 
Journal paper 1
Journal paper 1Journal paper 1
Journal paper 1
 
Paper id 35201569
Paper id 35201569Paper id 35201569
Paper id 35201569
 
Sparse Random Network Coding for Reliable Multicast Services
Sparse Random Network Coding for Reliable Multicast ServicesSparse Random Network Coding for Reliable Multicast Services
Sparse Random Network Coding for Reliable Multicast Services
 
Performance Analysis of Ultra Wideband Receivers for High Data Rate Wireless ...
Performance Analysis of Ultra Wideband Receivers for High Data Rate Wireless ...Performance Analysis of Ultra Wideband Receivers for High Data Rate Wireless ...
Performance Analysis of Ultra Wideband Receivers for High Data Rate Wireless ...
 
Prediction System for Reducing the Cloud Bandwidth and Cost
Prediction System for Reducing the Cloud Bandwidth and CostPrediction System for Reducing the Cloud Bandwidth and Cost
Prediction System for Reducing the Cloud Bandwidth and Cost
 
Fuzzy Route Switching for Energy Preservation(FEP) in Ad Hoc Networks
Fuzzy Route Switching for Energy Preservation(FEP) in Ad Hoc NetworksFuzzy Route Switching for Energy Preservation(FEP) in Ad Hoc Networks
Fuzzy Route Switching for Energy Preservation(FEP) in Ad Hoc Networks
 
Localized Algorithm for Channel Assignment in Cognitive Radio Networks
Localized Algorithm for Channel Assignment in Cognitive Radio NetworksLocalized Algorithm for Channel Assignment in Cognitive Radio Networks
Localized Algorithm for Channel Assignment in Cognitive Radio Networks
 
Bounds on the Achievable Rates of Faded Dirty Paper Channel
Bounds on the Achievable Rates of Faded Dirty Paper Channel Bounds on the Achievable Rates of Faded Dirty Paper Channel
Bounds on the Achievable Rates of Faded Dirty Paper Channel
 
IMPROVING SCHEDULING OF DATA TRANSMISSION IN TDMA SYSTEMS
IMPROVING SCHEDULING OF DATA TRANSMISSION IN TDMA SYSTEMSIMPROVING SCHEDULING OF DATA TRANSMISSION IN TDMA SYSTEMS
IMPROVING SCHEDULING OF DATA TRANSMISSION IN TDMA SYSTEMS
 
A Proposal Analytical Model and Simulation of the Attacks in Routing Protocol...
A Proposal Analytical Model and Simulation of the Attacks in Routing Protocol...A Proposal Analytical Model and Simulation of the Attacks in Routing Protocol...
A Proposal Analytical Model and Simulation of the Attacks in Routing Protocol...
 
G028033037
G028033037G028033037
G028033037
 
Fixed Point Realization of Iterative LR-Aided Soft MIMO Decoding Algorithm
Fixed Point Realization of Iterative LR-Aided Soft MIMO Decoding AlgorithmFixed Point Realization of Iterative LR-Aided Soft MIMO Decoding Algorithm
Fixed Point Realization of Iterative LR-Aided Soft MIMO Decoding Algorithm
 
An improved dft based channel estimation
An improved dft based channel estimationAn improved dft based channel estimation
An improved dft based channel estimation
 
Frame and-burst-acquisition-in-tdma-satellite-communication-networks-with-tra...
Frame and-burst-acquisition-in-tdma-satellite-communication-networks-with-tra...Frame and-burst-acquisition-in-tdma-satellite-communication-networks-with-tra...
Frame and-burst-acquisition-in-tdma-satellite-communication-networks-with-tra...
 
10.1.1.666.9435
10.1.1.666.943510.1.1.666.9435
10.1.1.666.9435
 
A_Fair_Multiple-Slot_Assignment_Protocol_for_Sched
A_Fair_Multiple-Slot_Assignment_Protocol_for_SchedA_Fair_Multiple-Slot_Assignment_Protocol_for_Sched
A_Fair_Multiple-Slot_Assignment_Protocol_for_Sched
 
Design, implementation and evaluation of icmp based available network bandwid...
Design, implementation and evaluation of icmp based available network bandwid...Design, implementation and evaluation of icmp based available network bandwid...
Design, implementation and evaluation of icmp based available network bandwid...
 

Similar to A QUANTITATIVE ANALYSIS OF HANDOVER TIME AT MAC LAYER FOR WIRELESS MOBILE NETWORKS

Iaetsd a novel scheduling algorithms for mimo based wireless networks
Iaetsd a novel scheduling algorithms for mimo based wireless networksIaetsd a novel scheduling algorithms for mimo based wireless networks
Iaetsd a novel scheduling algorithms for mimo based wireless networks
Iaetsd Iaetsd
 
short_frame_irsa_OA.pdf
short_frame_irsa_OA.pdfshort_frame_irsa_OA.pdf
short_frame_irsa_OA.pdf
YAAKOVSOLOMON1
 
40520130101003
4052013010100340520130101003
40520130101003
IAEME Publication
 
A Heuristic Algorithm For The Resource Assignment Problem In Satellite Teleco...
A Heuristic Algorithm For The Resource Assignment Problem In Satellite Teleco...A Heuristic Algorithm For The Resource Assignment Problem In Satellite Teleco...
A Heuristic Algorithm For The Resource Assignment Problem In Satellite Teleco...
Elizabeth Williams
 
IRJET-A Survey on Red Queue Mechanism for Reduce Congestion in Wireless Network
IRJET-A Survey on Red Queue Mechanism for Reduce Congestion in Wireless NetworkIRJET-A Survey on Red Queue Mechanism for Reduce Congestion in Wireless Network
IRJET-A Survey on Red Queue Mechanism for Reduce Congestion in Wireless Network
IRJET Journal
 
Scheduling and Resource allocation in 802.11ax (WIFI 6)
Scheduling and Resource allocation in 802.11ax (WIFI 6)Scheduling and Resource allocation in 802.11ax (WIFI 6)
Scheduling and Resource allocation in 802.11ax (WIFI 6)
RESHAN FARAZ
 
Multi-carrier Equalization by Restoration of RedundancY (MERRY) for Adaptive ...
Multi-carrier Equalization by Restoration of RedundancY (MERRY) for Adaptive ...Multi-carrier Equalization by Restoration of RedundancY (MERRY) for Adaptive ...
Multi-carrier Equalization by Restoration of RedundancY (MERRY) for Adaptive ...
IJNSA Journal
 
Computer Networking Assignment Help
Computer Networking Assignment HelpComputer Networking Assignment Help
Computer Networking Assignment Help
Computer Network Assignment Help
 
Ijst 131202
Ijst 131202Ijst 131202
Ijst 131202
sakru naik
 
MAC Protocol for Cognitive Radio Networks
MAC Protocol for Cognitive Radio NetworksMAC Protocol for Cognitive Radio Networks
MAC Protocol for Cognitive Radio Networks
Polytechnique Montreal
 
OfdmaClosed-Form Rate Outage Probability for OFDMA Multi-Hop Broadband Wirele...
OfdmaClosed-Form Rate Outage Probability for OFDMA Multi-Hop Broadband Wirele...OfdmaClosed-Form Rate Outage Probability for OFDMA Multi-Hop Broadband Wirele...
OfdmaClosed-Form Rate Outage Probability for OFDMA Multi-Hop Broadband Wirele...
IJASCSE
 
IEEE CAMAD 2014
IEEE CAMAD 2014IEEE CAMAD 2014
IEEE CAMAD 2014
Spiros Louvros
 
IEEE CAMAD 2014_LTE Uplink Delay Constraints for Smart Grid Applications
IEEE CAMAD 2014_LTE Uplink Delay Constraints for Smart Grid ApplicationsIEEE CAMAD 2014_LTE Uplink Delay Constraints for Smart Grid Applications
IEEE CAMAD 2014_LTE Uplink Delay Constraints for Smart Grid Applications
Spiros Louvros
 
Ko3518201823
Ko3518201823Ko3518201823
Ko3518201823
IJERA Editor
 
C4_S2_G8 (1).pdf
C4_S2_G8  (1).pdfC4_S2_G8  (1).pdf
C4_S2_G8 (1).pdf
AbdelrhmanTarek12
 
C4_S2_G8 .pdf
C4_S2_G8 .pdfC4_S2_G8 .pdf
C4_S2_G8 .pdf
AbdelrhmanTarek12
 
An efficient ant optimized multipath routing in wireless sensor network
An efficient ant optimized multipath routing in wireless sensor networkAn efficient ant optimized multipath routing in wireless sensor network
An efficient ant optimized multipath routing in wireless sensor network
Editor Jacotech
 
Classical Discrete-Time Fourier TransformBased Channel Estimation for MIMO-OF...
Classical Discrete-Time Fourier TransformBased Channel Estimation for MIMO-OF...Classical Discrete-Time Fourier TransformBased Channel Estimation for MIMO-OF...
Classical Discrete-Time Fourier TransformBased Channel Estimation for MIMO-OF...
IJCSEA Journal
 
Efficient Broadcast Authentication with Highest Life Span in Wireless Sensor ...
Efficient Broadcast Authentication with Highest Life Span in Wireless Sensor ...Efficient Broadcast Authentication with Highest Life Span in Wireless Sensor ...
Efficient Broadcast Authentication with Highest Life Span in Wireless Sensor ...
IRJET Journal
 
RTH-RSS Mac: Path loss exponent estimation with received signal strength loca...
RTH-RSS Mac: Path loss exponent estimation with received signal strength loca...RTH-RSS Mac: Path loss exponent estimation with received signal strength loca...
RTH-RSS Mac: Path loss exponent estimation with received signal strength loca...
IOSR Journals
 

Similar to A QUANTITATIVE ANALYSIS OF HANDOVER TIME AT MAC LAYER FOR WIRELESS MOBILE NETWORKS (20)

Iaetsd a novel scheduling algorithms for mimo based wireless networks
Iaetsd a novel scheduling algorithms for mimo based wireless networksIaetsd a novel scheduling algorithms for mimo based wireless networks
Iaetsd a novel scheduling algorithms for mimo based wireless networks
 
short_frame_irsa_OA.pdf
short_frame_irsa_OA.pdfshort_frame_irsa_OA.pdf
short_frame_irsa_OA.pdf
 
40520130101003
4052013010100340520130101003
40520130101003
 
A Heuristic Algorithm For The Resource Assignment Problem In Satellite Teleco...
A Heuristic Algorithm For The Resource Assignment Problem In Satellite Teleco...A Heuristic Algorithm For The Resource Assignment Problem In Satellite Teleco...
A Heuristic Algorithm For The Resource Assignment Problem In Satellite Teleco...
 
IRJET-A Survey on Red Queue Mechanism for Reduce Congestion in Wireless Network
IRJET-A Survey on Red Queue Mechanism for Reduce Congestion in Wireless NetworkIRJET-A Survey on Red Queue Mechanism for Reduce Congestion in Wireless Network
IRJET-A Survey on Red Queue Mechanism for Reduce Congestion in Wireless Network
 
Scheduling and Resource allocation in 802.11ax (WIFI 6)
Scheduling and Resource allocation in 802.11ax (WIFI 6)Scheduling and Resource allocation in 802.11ax (WIFI 6)
Scheduling and Resource allocation in 802.11ax (WIFI 6)
 
Multi-carrier Equalization by Restoration of RedundancY (MERRY) for Adaptive ...
Multi-carrier Equalization by Restoration of RedundancY (MERRY) for Adaptive ...Multi-carrier Equalization by Restoration of RedundancY (MERRY) for Adaptive ...
Multi-carrier Equalization by Restoration of RedundancY (MERRY) for Adaptive ...
 
Computer Networking Assignment Help
Computer Networking Assignment HelpComputer Networking Assignment Help
Computer Networking Assignment Help
 
Ijst 131202
Ijst 131202Ijst 131202
Ijst 131202
 
MAC Protocol for Cognitive Radio Networks
MAC Protocol for Cognitive Radio NetworksMAC Protocol for Cognitive Radio Networks
MAC Protocol for Cognitive Radio Networks
 
OfdmaClosed-Form Rate Outage Probability for OFDMA Multi-Hop Broadband Wirele...
OfdmaClosed-Form Rate Outage Probability for OFDMA Multi-Hop Broadband Wirele...OfdmaClosed-Form Rate Outage Probability for OFDMA Multi-Hop Broadband Wirele...
OfdmaClosed-Form Rate Outage Probability for OFDMA Multi-Hop Broadband Wirele...
 
IEEE CAMAD 2014
IEEE CAMAD 2014IEEE CAMAD 2014
IEEE CAMAD 2014
 
IEEE CAMAD 2014_LTE Uplink Delay Constraints for Smart Grid Applications
IEEE CAMAD 2014_LTE Uplink Delay Constraints for Smart Grid ApplicationsIEEE CAMAD 2014_LTE Uplink Delay Constraints for Smart Grid Applications
IEEE CAMAD 2014_LTE Uplink Delay Constraints for Smart Grid Applications
 
Ko3518201823
Ko3518201823Ko3518201823
Ko3518201823
 
C4_S2_G8 (1).pdf
C4_S2_G8  (1).pdfC4_S2_G8  (1).pdf
C4_S2_G8 (1).pdf
 
C4_S2_G8 .pdf
C4_S2_G8 .pdfC4_S2_G8 .pdf
C4_S2_G8 .pdf
 
An efficient ant optimized multipath routing in wireless sensor network
An efficient ant optimized multipath routing in wireless sensor networkAn efficient ant optimized multipath routing in wireless sensor network
An efficient ant optimized multipath routing in wireless sensor network
 
Classical Discrete-Time Fourier TransformBased Channel Estimation for MIMO-OF...
Classical Discrete-Time Fourier TransformBased Channel Estimation for MIMO-OF...Classical Discrete-Time Fourier TransformBased Channel Estimation for MIMO-OF...
Classical Discrete-Time Fourier TransformBased Channel Estimation for MIMO-OF...
 
Efficient Broadcast Authentication with Highest Life Span in Wireless Sensor ...
Efficient Broadcast Authentication with Highest Life Span in Wireless Sensor ...Efficient Broadcast Authentication with Highest Life Span in Wireless Sensor ...
Efficient Broadcast Authentication with Highest Life Span in Wireless Sensor ...
 
RTH-RSS Mac: Path loss exponent estimation with received signal strength loca...
RTH-RSS Mac: Path loss exponent estimation with received signal strength loca...RTH-RSS Mac: Path loss exponent estimation with received signal strength loca...
RTH-RSS Mac: Path loss exponent estimation with received signal strength loca...
 

Recently uploaded

Technical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prismsTechnical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prisms
heavyhaig
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
IJECEIAES
 
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
awadeshbabu
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
gestioneergodomus
 
bank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdfbank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdf
Divyam548318
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
Madan Karki
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
Dr Ramhari Poudyal
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
SUTEJAS
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
jpsjournal1
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
Mukeshwaran Balu
 
2. Operations Strategy in a Global Environment.ppt
2. Operations Strategy in a Global Environment.ppt2. Operations Strategy in a Global Environment.ppt
2. Operations Strategy in a Global Environment.ppt
PuktoonEngr
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
Rahul
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
kandramariana6
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
Victor Morales
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
gerogepatton
 
Swimming pool mechanical components design.pptx
Swimming pool  mechanical components design.pptxSwimming pool  mechanical components design.pptx
Swimming pool mechanical components design.pptx
yokeleetan1
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Christina Lin
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
University of Maribor
 

Recently uploaded (20)

Technical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prismsTechnical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prisms
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
 
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
 
bank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdfbank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdf
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
 
2. Operations Strategy in a Global Environment.ppt
2. Operations Strategy in a Global Environment.ppt2. Operations Strategy in a Global Environment.ppt
2. Operations Strategy in a Global Environment.ppt
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
 
Swimming pool mechanical components design.pptx
Swimming pool  mechanical components design.pptxSwimming pool  mechanical components design.pptx
Swimming pool mechanical components design.pptx
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
 

A QUANTITATIVE ANALYSIS OF HANDOVER TIME AT MAC LAYER FOR WIRELESS MOBILE NETWORKS

  • 1. International Journal of Wireless & Mobile Networks (IJWMN), Vol 1, No 2, November 2009 21 ABSTRACT Extensive studies have been carried out for reducing the handover time of wireless mobile network at medium access control (MAC) layer. However, none of them show the impact of reduced handover time on the overall performance of wireless mobile networks. This paper presents a quantitative analysis to show the impact of reduced handover time on the performance of wireless mobile networks. The proposed quantitative model incorporates many critical performance parameters involve in reducing the handover time for wireless mobile networks. In addition, we analyze the use of active scanning technique with comparatively shorter beacon interval time in a handoff process. Our experiments verify that the active scanning can reduce the overall handover time at MAC layer if comparatively shorter beacon intervals are utilized for packet transmission. The performance measures adopted in this paper for experimental verifications are network throughput under different network loads. KEYWORDS Handover time, medium access control, detection phase latency time, wireless mobile networks 1. INTRODUCTION A Handoff occurs in IEEE 802.11b when a mobile station moves beyond the radio range of one access point (AP) and enters in another coverage area at the MAC layer. During the handoff, management frames are exchanged between the station (STA) and the AP. Consequently, there is a latency involved in the handoff process during which the STA is unable to send or receive traffic. On the other hand, our measurements are not only shown that the latencies are very high but also shown that they vary significantly for the same configuration of stations and AP. In this paper, we use full scan handoff to denote the original active handoff scheme of the wireless card which scans all channels consecutively in the discovery phase. Most improvements to the active scan handoff strive to scan fewer channels. This is called as selective scan handoff. The authors of [1] proposed a MAC layer fast handoff. They use selective scan to record the scan results in the “AP cache” for future use. However, in the case of incorrect cached information, the handoff latency is the same as that of the full scan handoff. Recently, a fast scan handoff Syed S. Rizvi1 , Aasia Riasat2 , and Khaled M. Elleithy3 1 Computer Science and Engineering Department, University of Bridgeport, Bridgeport, CT, USA srizvi@bridgeport.edu 2 Department of Computer Science, Institute of Business Management, Karachi, Pakistan aasia.riasat@iobm.edu.pk 3 Computer Science and Engineering Department, University of Bridgeport, Bridgeport, CT, USA elleithy@bridgeport.edu A QUANTITATIVE ANALYSIS OF HANDOVER TIME AT MAC LAYER FOR WIRELESS MOBILE NETWORKS
  • 2. International Journal of Wireless & Mobile Networks (IJWMN), Vol 1, No 2, November 2009 22 scheme is proposed [2]. Instead of broadcasting the probe request frame to all APs, the probe request frame is sent to a specific AP who will be the sole responder. However, this scheme needs to change both the wireless mobile stations and the AP. 2. MATHEMATICAL MODEL FOR REDUCING THE HANDOVER TIME This section presents a mathematical model that incorporates many critical performance measurements to show the impact of reduced handover time on wireless mobile networks. The performance of the cells permits the use of the real time services when the MAC scheduler is modified [3]. However, our study focuses on the optimization of the second method. We have observed in our measurements that stations firstly assume collision and retransmit several times. If transmission remains unsuccessful, then radio fading is assumed and the link is probed by sending probe requests. We present an argument that stations must start the search phase as soon as collision can be excluded as reason for failure. If the actual reason was a temporary signal fading, the selected AP’s search would likely be the current one and the handoff will not be executed. Thus, a key factor in our detection algorithm is the number of collisions that a frame can suffer before it is transmitted. 2.1.Proposed Mathematical Model for the Collision Detection and Avoidance We use the probability distribution function (PDF) to approximate the number of collisions for both saturated and non-saturated cases. The proposed probabilistic approach assumes that the STAs must start the search phase as soon as collision can be excluded as reason for failure. If the actual reason was a temporary signal fading, the selected AP after the search would likely be the current one and the handoff will not be executed. According to PDF, if we assume that a random variable X represents a collision per frame transmission, then X should lie within a certain range representing by R . We assume that the value of R belongs to an interval of two values representing as MIN V and MAX V . This argument leads us to the following mathematical expression: { } { } , where , MIN MIN MAX MAX X V V R V V ∈  → ∈ (1) By further extending (1), we can approximate the probability that X lies in the ideal interval: ( ) { } , MIN MIN MAX MAX F F P X V V V V = − ∈ (2) Where F represents the PDF and P is the probability that X lies within the defined interval for collision avoidance. Based on (1) and (2), one can produce the PDF for the collision avoidance as shown in (3): ( ) { } P R R F R X R = → ≤ (3) If we further assume that the system consists of K users, then (1) and (3) be used to approximate the probability of collision per frame transmission. In other words, by reversing the order of probabilities given in (1) and (3) with respect to the ideal range shown in (2), we can approximate the number of total collisions as follows.
  • 3. International Journal of Wireless & Mobile Networks (IJWMN), Vol 1, No 2, November 2009 23 { } ( ) 1 0 1 (1 ) R i R j P P P P X R + = = − − ≤ ∑ @ (4) where the sign “ @” represents the estimated value and the term ( ) 1 1 R P + − can be considered as a normalization term to ensure that the probability of each random backoff time follows a valid PDF. The random backoff time will be discussed later in detail. In addition, R will be any real number representing the number of STAs ready to transmit the frames. The range of R is provided in (2). In order to derive a generic equation that includes both detection and avoidance, we can now combine our four equations that yield the following result: { } ( ) ( ) { } { } 1 0 1 (1 ) R P X R F R P X R i j P P P P X R ≤ = ≤ + = = − − ≤ ∑ @ (5) Equation (5) consists of both the probability of detection and collision avoidance characteristics. For the sake of simulation, we assume that there are n numbers of STAs that are transmitting a fixed packet size of typically 40 bytes using an ideal channel. Fig. 1 shows a regular case of packet transmission when only a limited number of users are transmitting at one time. In addition, for Fig. 1 we run our simulation multiple times for different values of n. In order to address the worst case scenario, we consider n number of STAs with an additional assumption that all STAs have data to transmit all the time via an ideal channel (i.e., the standard IEEE 802.11 MAC [1]) as shown in Fig. 2. It should be noted in Fig. 2 that the probability of collision increases as we increase the probability of transmission per frame. However, the performance degradation was small compared to the increase in probability of Figure 1. PDF versus number of collision per frame with ideal channel condition for a non- saturated condition
  • 4. International Journal of Wireless & Mobile Networks (IJWMN), Vol 1, No 2, November 2009 24 packet transmission. Fig. 1 shows that three consecutive collisions is a rare event, even in saturation as shown in Fig. 2. This implies that there is no need to explicitly probe the link. The same conditions that we used throughout our measurements, this time would be around 3 ms, which are approximately leads to 300. In order to compute the minimum channel time, we follow the classical theory of Slotted Aloha protocol [4]. That is, each STA listens to the channel before the transmission of the frames. If the channel is busy, it defers the transmission with a certain probability. On the other hand, if the channel is free for a certain time (called DIFS, Distributed Inter Frame Space, in the standard [3]), then the STA can transmit the frames. In addition, when the channel is busy, each node waits for a random amount of time and then periodically listen the channel to find possible DIFS. This random wait-time can be considered as a random backoff time that each node needs to experience during the high contention. Since each STA can only transmit during a certain slot, this random backoff time is, therefore, a multiple of slot times. In addition, we also assume that there is no propagation time and response generation time involve in the computation of minimum channel time. The above discussion leads us to the following mathematical expression: ( ) ( ) ( ) CT Time Time Min DIFS RB S ≥ + × (6) where ( ) CT Min referees to minimum channel time, DIFS, Time RB represents random backoff time, and the parameter Time S indicates the length of the slot. We can approximate the ideal range of ( ) CT Min as follows: ( ) R CT AP Min DIFS ≥ ≥ Figure 2. PDF versus number of collision per frame with ideal channel condition for a saturated condition
  • 5. International Journal of Wireless & Mobile Networks (IJWMN), Vol 1, No 2, November 2009 25 Next, we need to compute the values of maximum channel time which might work as the upper threshold value. Since 10 STAs per cell seem to be an adequate number to achieve a good cell throughput [5], we have simulated the different beacon interval with OPNET to figure out the suitable max channel time. Based on our experiments, we conclude that the best value for maximum channel time is 10 milliseconds. The last step is to compute the total search time. According to the IEEE standard [1], each STA requires to scan all available channels during active scan. The available channels include both busy channels (B) and free channels (F). Also, the time to scan a busy channel is not necessarily the same as to scan a free channel. This, therefore, leads us to a simple mathematical expression for the total search time: ( ) ( ) Time B F SE T B T F = + where the left hand side of this expression represents the total search time, and B T and F T represents the time required to scan a busy and free channels, respectively. The last step is to compute the maximum channel time and the total search time. The available channels include both busy channels (B) and free channels (F). The total search time will be based on the total time required to scan both busy and free channels. This leads to the following equation: ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) 2 , 2 B F Delay CT Delay CT T P Max T P Min = + = + (7) If we assume that we have an ideal minimum time for scanning free channels, then the following mathematical expressions must be true: ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) 2 2 B Delay CT F Delay Time Time T P Max T P DIFS RB S = + = + + × (8) ( ) ( ) ( ) ( )( ) ( ) ( ) ( ) ( )( ) 2 2 Time Delay CT Delay Time Time SE P Max B P F DIFS RB S   = +     + + + ×   (9) The above minimum channel time and the maximum channel time provides the best searching result as compared to the current network cards provides. Specifically, we can use (9) to approximate the total scanning time involves in the search phase. Next section shows the effect of our proposed mathematical model in terms of load balancing, throughput, and transmission delay. 3. PERFORMANCE ANALYSIS OF THE PROPOSED MATHEMATICAL MODEL The performance measures adopted in this paper are network load, throughput, and the media access delay. The system is modeled in OPNET for both lightly and heavily loaded networks. Fig. 3 is based on our mathematical derivation that simulates the search-timer for the Min- Channel. The result of this simulation should fall between 670ms and 1024ms. The lowest threshold value has been derived from standard industry and IEEE has given the constant factors [1]. The upper threshold value, however, is suggested based on the maximum latency involved in the given wireless mobile network. It can be evident in Fig. 3 that below 670ms there is no significant improvement. However, for such a short period of time (i.e., below 670ms), it would likely decrease the overall network efficiency. This is due to the fact that below 670ms, it is more likely that channels will be more quickly declared as empty channels where as the maximum latency time will gradually increase
  • 6. International Journal of Wireless & Mobile Networks (IJWMN), Vol 1, No 2, November 2009 26 resulting in overall poor performance of the network. It should also be noted in Fig. 3 that as we increase the minimum threshold to 1024ms, this increases the overall network traffic. Fig. 4 shows a comparison of throughput versus network traffic. It can be clearly seen in Fig. 4 that as we linearly increase the network traffic, the overall throughput of the system decreases. In other words, an increase in minimum channel time becomes one of the reasons for a decrease in overall network throughput. It should also be noted that the results of Fig. 4 is not only the experimental verification of the results of Fig. 3 but also provide some better and technical insight in the increase of throughput. In addition, the overall system throughput decreases sharply, however, it makes some spikes during the random intervals. It can be evident in Fig. 4 that the overall throughput increases significantly with respect to the varying network load represented in Fig. 3. 4. CONCLUSION In this paper, we have proposed a mathematical model that can be used to effectively reduce the handover time of WLAN at MAC layer. Specifically, we proposed a mathematical model for collision detection and avoidance as well as for search phase. Our simulation results verify that the utilization of probabilistic approach with the active scanning yields lower latency for each detection and search phases provided that if we utilize the appropriate values of some critical parameters such as the beacon interval, minimum and the maximum search times. Both simulation and numerical results of this paper demonstrate that the reduced handover time at MAC layer provides better load balancing, high throughput, and minimum frame transmission delay. Figure 3. Network load with different values of beacon interval versus time
  • 7. International Journal of Wireless & Mobile Networks (IJWMN), Vol 1, No 2, November 2009 27 4. REFERENCES [1] S. Shin, G. Forte, S. Rawat, and H. Schulzrinne, “Reducing MAC layer Handoff Latency in IEEE 802.11 wireless LANs,” in MOBIWAC ’04: Proceedings of the second international workshop on Mobility management & wireless access protocols, pp. 19–26, New York, NY, USA, 2004. ACM Press. [2] M. Jeong, F. Watanabe, and T. Kawahara, “Fast Active Scan for Measurement and Handoff,” Technical report, DoCoMo USA Labs, Contribution to IEEE 802, May 2003. [3] G. Bianchi, “Performance analysis of the IEEE 802.11 Distributed Coordination Function,” Selected Areas in Communications, IEEE Journal, Vol. 18, Issue 3, pp. 535 – 547, Mar 2000. [4] D. Geun and W. Sook, “Performance of an Exponential Backoff Scheme for Slotted-ALOHA protocol in local wireless Environment,” IEEE transactions on vehicular technology, 1995, vol. 44, pp. 470-479, 1995. [5] S. Shin, G. Forte, S. Rawat, and H. Schulzrinne, “Reducing MAC layer Handoff Latency in IEEE 802.11 wireless LANs,” in MOBIWAC ’04: Proceedings of the second international workshop on Mobility management & wireless access protocols, pp. 19–26, New York, NY, USA, 2004. ACM Press. Figure 4. WLAN throughput versus probe request/response transmission time
  • 8. International Journal of Wireless & Mobile Networks (IJWMN), Vol 1, No 2, November 2009 28 Authors SYED S. RIZVI is a Ph.D. student of Computer Engineering at University of Bridgeport. He received a B.S. in Computer Engineering from Sir Syed University of Engineering and Technology and an M.S. in Computer Engineering from Old Dominion University in 2001 and 2005 respectively. In the past, he has done research on bioinformatics projects where he investigated the use of Linux based cluster search engines for finding the desired proteins in input and outputs sequences from multiple databases. For last one year, his research focused primarily on the modeling and simulation of wide range parallel/distributed systems and the web based training applications. Syed Rizvi is the author/co-authors of 73 scholarly publications in various areas. His current research focuses on the design, implementation and comparisons of algorithms in the areas of multiuser communications, multipath signals detection, multi-access interference estimation, computational complexity and combinatorial optimization of multiuser receivers, peer-to-peer networking, and reconfigurable coprocessor and FPGA based architectures. AASIA RIASAT is an Assistant Professor of Computer Science at Institute of Business Management (IOBM) since May 2006. She received an M.S.C. in Computer Science from the University of Sindh, and an M.S in Computer Science from Old Dominion University in 1999, and 2005, respectively. For last one year, she is working as one of the active members of the wireless and mobile communications (WMC) lab research group of University of Bridgeport, Bridgeport CT. In WMC research group, she is mainly responsible for simulation design for all the research work. Aasia Riasat is the author or co-author of more than 30 scholarly research papers in various areas. Her research interests include modeling and simulation for parallel and distributed systems, web- based visualization, virtual reality, data compression, and algorithms optimization. Khaled Elleithy received the B.Sc. degree in computer science and automatic control from Alexandria University in 1983, the MS Degree in computer networks from the same university in 1986, and the MS and Ph.D. degrees in computer science from The Center for Advanced Computer Studies at the University of Louisiana at Lafayette in 1988 and 1990, respectively. From 1983 to 1986, he was with the Computer Science Department, Alexandria University, Egypt, as a lecturer. From September 1990 to May 1995 he worked as an assistant professor at the Department of Computer Engineering, King Fahd University of Petroleum and Minerals, Dhahran, Saudi Arabia. From May 1995 to December 2000, he has worked as an Associate Professor in the same department. In January 2000, Dr. Elleithy has joined the Department of Computer Science and Engineering in University of Bridgeport as an associate professor. Dr. Elleithy published more than seventy research papers in international journals and conferences. He has research interests are in the areas of computer networks, network security, mobile communications, and formal approaches for design and verification.