The proportional fair (PF) scheduling algorithm com
promises between cell throughput and fairness. Many
research findings have been published by various re
searchers about PF algorithm based on mathematical
model and simulations. In this paper we have taken
the practical route to analyse the algorithm based
on
three types of subscription. In this benchmarking s
tudy, the user subscriptions are differentiated as
Gold,
Silver and Bronze schemes and they are provisioned
with certain throughputs. Apart from subscriptions
plans, the channel condition also plays a major rol
e in determining the throughput. So in order to ens
ure
fairness among different subscriptions even in the
bad channel conditions and to deliver the provision
ed
throughputs certain priorities are attached with th
e subscriptions. As per the subscription plans Gold
subscribers are assigned with 50% of the speed offe
red by the network as maximum based on CAT3 speed
(100 Mbps in DL and 50 Mbps in UL), Silver is assig
ned with 25% of the max speed and Bronze is
assigned with 12% of the max speed. The priorities
assigned to subscribers determines the fairness in
the
unfavourable channel conditions - Bronze (high), Si
lver and Gold (medium). In this paper, an
benchmarking tests have been performed with all of
three types of subscribers for nearly two hours in
the
live single cell network without any heterogeneous
cells influencing it. Furthermore, the results are
compared with the simulation results.
Analysis of LTE Radio Load and User ThroughputIJCNCJournal
A recurring topic in LTE radio planning pertains to the maximum acceptable LTE radio interface load, up to which a targeted user data rate can be maintained. We explore this topic by using Queuing Theory elements to express the downlink user throughput as a function of the LTE Physical Resource Block (PRB) utilization. The resulting formulas are expressed in terms of standardized 3GPP KPIs and can be readily evaluated from network performance counters. Examples from live networks are given to illustrate the results, and the suitability of a linear decrease model is quantified upon data from a commercial LTE network.
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSNIJCNCJournal
In recent years, limited resources of user products and energy-saving are recognized as the major challenges of Wireless Sensor Networks (WSNs). Clustering is a practical technique that can reduce all energy consumption and provide stability of workload that causes a larger difference in energy depletion among other nodes and cluster heads (CHs). In addition, clustering is the solution of energy-efficient for maximizing the network longevity and improvising energy efficiency. In this paper, a novel OCE-CHS (Optimized Cluster Establishment and Cluster-Head Selection) approach for sensor nodes is represented to improvise the packet success ratio and reduce the average energy-dissipation. The main contribution of this paper is categorized into two processes, first, the clustering algorithm is improvised that periodically chooses the optimal set of the CHs according to the speed of the average node and average-node energy. This is considerably distinguished from node-based clustering that utilizes a distributed clustering algorithm to choose CHs based on the speed of the current node and remaining node energy. Second, more than one factor is assumed for the detached node to join the optimal cluster. In the result section, we discuss our clustering protocols implementation of optimal CH-selection to evade the death of SNs, maximizing throughput, and further improvise the network lifetime by minimizing energy consumption.
Novel Position Estimation using Differential Timing Information for Asynchron...IJCNCJournal
Positioning techniques have been a common objective since the early development of wireless networks. However, current positioning methods in cellular networks, for instance, are still primarily focused on the use of the Global Navigation Satellite System (GNSS), which has several limitations, like high power drainage and failure in indoor scenarios. This study introduces a novel approach employing standard LTE signaling in order to provide high accuracy positioning estimation. The proposed technique is designed in analogy to the human sound localization system, eliminating the need of having information from three spatially diverse Base Stations (BSs). This is inspired by the perfect human 3D sound localization with two ears. A field study is carried out in a dense urban city to verify the accuracy of the proposed technique, with more than 20 thousand measurement samples collected. The achieved positioning accuracy is meeting the latest Federal Communications Commission (FCC) requirements in the planner dimension.
Design and analysis of routing protocol for cognitive radio ad hoc networks i...IJECEIAES
Multi-hop routing protocol in cognitive radio mobile ad hoc networks (CRMANETs) is a critical issue. Furthermore, the routing metric used in multi-hop CRMANETs should reflect the bands availability, the links quality, the PU activities and quality of service (QoS) requirements of SUs. For the best of our knowledge, many of researchers investigated the performance of the different routing protocols in a homogeneous environment only. In this paper, we propose a heterogeneous cognitive radio routing protocol (HCR) operates in heterogeneous environment (i.e. the route from source to destination utilize the licensed and unlicensed spectrum bands). The proposed routing protocol is carefully developed to make a tradeoff between the channel diversity of the routing path along with the CRMANETs throughput. Using simulations, we discuss the performance of the proposed HCR routing protocol and compare it with the AODV routing protocol using a discrete-event simulation which we developed using JAVA platform.
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...IJNSA Journal
With the rapid growth of wireless communication infras,,tructure over the recent few years, new
challenges has been posed on the system and analysis on wireless adhoc networking. Implementation of
MIMO communication in such type of network is enhancing the packet transmission capabilities. There
are different techniques for cooperative transmission and broadcasting packet in MIMO equipped
Mobile Adhoc Network. We have employed a model network in the OPNET environment and propose a
new scheduling algorithm based on investigating the different broadcasting algorithm. The new
broadcasting algorithm improves the packet transmission rate of the network based on energy
performance of the network and minimizes the BER for different transmission mode which is illustrated
in this paper. The simulations are done in MATLAB and OPNET environment and the simulated result
for the packet transmission rate are collected and shown in the tabular form. Also simulate the network
for generating a comparative statement for each mobile node. And performance analysis is also done for
the model network. The main focus is to minimize BER and improve information efficiency of the
network.
Analysis of LTE Radio Load and User ThroughputIJCNCJournal
A recurring topic in LTE radio planning pertains to the maximum acceptable LTE radio interface load, up to which a targeted user data rate can be maintained. We explore this topic by using Queuing Theory elements to express the downlink user throughput as a function of the LTE Physical Resource Block (PRB) utilization. The resulting formulas are expressed in terms of standardized 3GPP KPIs and can be readily evaluated from network performance counters. Examples from live networks are given to illustrate the results, and the suitability of a linear decrease model is quantified upon data from a commercial LTE network.
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSNIJCNCJournal
In recent years, limited resources of user products and energy-saving are recognized as the major challenges of Wireless Sensor Networks (WSNs). Clustering is a practical technique that can reduce all energy consumption and provide stability of workload that causes a larger difference in energy depletion among other nodes and cluster heads (CHs). In addition, clustering is the solution of energy-efficient for maximizing the network longevity and improvising energy efficiency. In this paper, a novel OCE-CHS (Optimized Cluster Establishment and Cluster-Head Selection) approach for sensor nodes is represented to improvise the packet success ratio and reduce the average energy-dissipation. The main contribution of this paper is categorized into two processes, first, the clustering algorithm is improvised that periodically chooses the optimal set of the CHs according to the speed of the average node and average-node energy. This is considerably distinguished from node-based clustering that utilizes a distributed clustering algorithm to choose CHs based on the speed of the current node and remaining node energy. Second, more than one factor is assumed for the detached node to join the optimal cluster. In the result section, we discuss our clustering protocols implementation of optimal CH-selection to evade the death of SNs, maximizing throughput, and further improvise the network lifetime by minimizing energy consumption.
Novel Position Estimation using Differential Timing Information for Asynchron...IJCNCJournal
Positioning techniques have been a common objective since the early development of wireless networks. However, current positioning methods in cellular networks, for instance, are still primarily focused on the use of the Global Navigation Satellite System (GNSS), which has several limitations, like high power drainage and failure in indoor scenarios. This study introduces a novel approach employing standard LTE signaling in order to provide high accuracy positioning estimation. The proposed technique is designed in analogy to the human sound localization system, eliminating the need of having information from three spatially diverse Base Stations (BSs). This is inspired by the perfect human 3D sound localization with two ears. A field study is carried out in a dense urban city to verify the accuracy of the proposed technique, with more than 20 thousand measurement samples collected. The achieved positioning accuracy is meeting the latest Federal Communications Commission (FCC) requirements in the planner dimension.
Design and analysis of routing protocol for cognitive radio ad hoc networks i...IJECEIAES
Multi-hop routing protocol in cognitive radio mobile ad hoc networks (CRMANETs) is a critical issue. Furthermore, the routing metric used in multi-hop CRMANETs should reflect the bands availability, the links quality, the PU activities and quality of service (QoS) requirements of SUs. For the best of our knowledge, many of researchers investigated the performance of the different routing protocols in a homogeneous environment only. In this paper, we propose a heterogeneous cognitive radio routing protocol (HCR) operates in heterogeneous environment (i.e. the route from source to destination utilize the licensed and unlicensed spectrum bands). The proposed routing protocol is carefully developed to make a tradeoff between the channel diversity of the routing path along with the CRMANETs throughput. Using simulations, we discuss the performance of the proposed HCR routing protocol and compare it with the AODV routing protocol using a discrete-event simulation which we developed using JAVA platform.
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...IJNSA Journal
With the rapid growth of wireless communication infras,,tructure over the recent few years, new
challenges has been posed on the system and analysis on wireless adhoc networking. Implementation of
MIMO communication in such type of network is enhancing the packet transmission capabilities. There
are different techniques for cooperative transmission and broadcasting packet in MIMO equipped
Mobile Adhoc Network. We have employed a model network in the OPNET environment and propose a
new scheduling algorithm based on investigating the different broadcasting algorithm. The new
broadcasting algorithm improves the packet transmission rate of the network based on energy
performance of the network and minimizes the BER for different transmission mode which is illustrated
in this paper. The simulations are done in MATLAB and OPNET environment and the simulated result
for the packet transmission rate are collected and shown in the tabular form. Also simulate the network
for generating a comparative statement for each mobile node. And performance analysis is also done for
the model network. The main focus is to minimize BER and improve information efficiency of the
network.
The maximization of a networks lifetime is an important part of research in the present scenario. In ad hoc network, the topology of network changes frequently due to the mobility of mobile nodes where the communication is possible without any network infrastructure. Mobile nodes have limited energy resources so that the energy efficient routing should be provided which increases the life time of the network. The existing routing mechanisms do not consider energy of nodes for data transmission. In this paper a novel approach is analyzed to improve the networks lifetime where the data transfer is based on the minimum hop count and residual energy of the mobile nodes. The analysis is carried out by using the network simulator and the simulation results shows that the proposed work provides an energy efficient routing in ad hoc networks.
A Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor NetworkIJCNCJournal
In Wireless Sensors Networks (WSN) based application, a large number of sensor devices must be deployed. Energy efficiency and network lifetime are the two most challenging issues in WSN. As a consequence, the main goal is to reduce the overall energy consumption using clustering protocols which have to ensure reliability and connectivity in large-scale WSN. This work presents a new clustering and routing algorithm based on the properties of the sensor networks. The main goal of this work is to extend the network lifetime via charge equilibration in the WSN. According to many errors with sensing devices and to have greater data accuracy, we use a quorum mechanism. The proposed algorithms are evaluated widely and the results are compared with related works. The experimental results show that the proposed algorithm provides an effective improvement in terms of energy consumption, data accuracy and network lifetime.
An Efficient and Stable Routing Algorithm in Mobile Ad Hoc NetworkIJCNCJournal
Mobile Ad hoc Network (MANET) is mainly designed to set up communication among devices in infrastructure-less wireless communication network. Routing in this kind of communication network is highly affected by its restricted characteristics such as frequent topological changes and limited battery power. Several research works have been carried out to improve routing performance in MANET. However, the overall performance enhancement in terms of packet delivery, delay and control message overhead is still not come into the wrapping up. In order to overcome the addressed issues, an Efficient and Stable-AODV (EFST-AODV) routing scheme has been proposed which is an improvement over AODV to establish a better quality route between source and destination. In this method, we have modified the route request and route reply phase. During the route request phase, cost metric of a route is calculated on the basis of parameters such as residual energy, delay and distance. In a route reply phase, average residual energy and average delay of overall path is calculated and the data forwarding decision is taken at the source node accordingly. Simulation outcomes reveal that the proposed approach gives better results in terms of packet delivery ratio, delay, throughput, normalized routing load and control message overhead as compared to AODV.
ADAPTIVE HANDOVER HYSTERESIS AND CALL ADMISSION CONTROL FOR MOBILE RELAY NODESIJCNCJournal
The aim of equipping a wireless network with a mobile relay node is to support broadband wireless communications for vehicular users and their devices. The high mobility of vehicular users, possibly at a very high velocity in the area in which two cells overlap, could cause the network to suffer from a reduced handover success rate and, hence, increased radio link failure. The combined impact of these problems is service interruptions to vehicular users. Thus, the handover schemes are crucial in solving these problems. In this work, we first present the adaptive handover hysteresis scheme for the wireless network with mobile relay nodes in the high-speed train scenario. Specifically, our proposed adaptive hysteresis scheme is based on the velocity of the train. Second, the handover call dropping probability is reduced by introducing a modified call admission control scheme to support radio resource reservation for handover calls that prioritizes handover calls of mobile relay over the other calls. The proposed solution in which adaptive parameter is combined with call admission control is evaluated by system level simulation. Our simulation results illustrate an increased handover success rate and reduced radio link failures.
PERFORMANCE ANALYSIS IN CELLULAR NETWORKS CONSIDERING THE QOS BY RETRIAL QUEU...IJCNCJournal
In this article, a retrial queueing model will be considered with persevering customers for wireless cellular
networks which can be frequently applied in the Fractional Guard Channel (FGC) policies, including
Limited FGC (LFGC), Uniform FGC (UFGC), Limited Average FGC (LAFGC) and Quasi Uniform FGC
(QUFGC). In this model, the examination on the retrial phenomena permits the analyses of important
effectiveness measures pertained to the standard of services undergone by users with the probability that a
fresh call first arrives the system and find all busy channels at the time, the probability that a fresh call
arrives the system from the orbit and find all busy channels at the time and the probability that a handover
call arrives the system and find all busy channels at the time. Comparison between four types of the FGC
policy can befound to evaluate the performance of the system.
Macro with pico cells (hetnets) system behaviour using well known scheduling ...ijwmn
This paper demonstrates the concept of using Heterogeneous networks (HetNets) to improve Long Term Evolution (LTE) system by introducing the LTE Advance (LTE-A). The type of HetNets that has been chosen for this study is Macro with Pico cells. Comparing the system performance with and without Pico cells has clearly illustrated using three well-known scheduling algorithms (Proportional Fair PF, Maximum Largest Weighted Delay First MLWDF and Exponential/Proportional Fair EXP/PF). The system is judged based on throughput, Packet Loss Ratio PLR, delay and fairness.. A simulation platform called LTE-Sim has been used to collect the data and produce the paper’s outcomes and graphs. The results prove that adding Pico cells enhances the overall system performance. From the simulation outcomes, the overall system performance is as follows: throughput is duplicated or tripled based on the number of users, the PLR is almost quartered, the delay is nearly reduced ten times (PF case) and changed to be a half (MLWDF/EXP cases), and the fairness stays closer to value of 1. It is considered an efficient and cost effective way to increase the throughput, coverage and reduce the latency.
A gateway based energy efficient multi hop routing protocol for wireless sensor networks (WSNs) is
introduced. The main aim of our paper is to design a protocol which minimizes energy consumption.
Gateway nodes are deployed in sensing field.
Engineering Research Publication
Best International Journals, High Impact Journals,
International Journal of Engineering & Technical Research
ISSN : 2321-0869 (O) 2454-4698 (P)
www.erpublication.org
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
ENERGY EFFICIENT ROUTING PROTOCOL BASED ON DSRijasuc
Energy consumption is a major concern in most of the present day devices in wireless networks. Especially
in Ad hoc networks, energy is a limited factor. Random movement in nodes add to the frequent failure of
routes which adds to the energy consumption in the network. In this paper, a routing protocol is proposed
which is based on a modification of the conventional DSR (Dynamic Source routing). A comparative
analysis is performed with respect to energy consumption, maximum throughput and delay. The routing
protocols used for reference in this analysis are DSDV, AODV and conventional DSR. Experimental results
show that the proposed modified DSR shows a reduced energy consumption, improved rate of maximum
throughput and a reduced delay compared to above mentioned routing protocols
PERFORMANCE EVALUATION OF LTE NETWORK USING MAXIMUM FLOW ALGORITHMijcsit
In this paper, we propose a new traffic flow model of the Long Term Evaluation (LTE) network for the Evolved Universal Terrestrial Radio Access Network (E-UTRAN). Here only one Evolve Node B (eNB) nearest to the Mobility Management Entity (MME) and Serving Gateway (S-GW) will use the S1 link to
bridge the E-UTRAN and Evolved Packet Core (EPC). All the eNBs of a tracking area will be connected to each other by the X2 link. Determination of capacity of a links of such a network is a challenging job since each node offers its own traffic and at the same time conveys traffic of other nodes. In this paper, we apply maximum flow algorithm including superposition theorem to solve the traffic flow of radio network. Using the total flow per subcarrier, a new traffic model is also developed in the paper. The relation among the traffic parameters: ‘blocking probability’, ‘offered traffic’, ‘instantaneous capacity’, ‘average holding
time’, and ‘number of users’ are shown graphically under both QPSK and 16-QAM. The concept of the network will be helpful to improve the SINR of the received signal ofeNBslocated long distance relative to MME/S-GW.
A NOVEL HYBRID OPPORTUNISTIC SCALABLE ENERGY EFFICIENT ROUTING DESIGN FOR LOW...IJCNCJournal
Opportunistic Routing (OR) scheme increases the transmission reliability despite the lossy wireless radio links by exploiting the broadcast nature of the wireless medium. However, OR schemes in low power Wireless Sensor Network (WSN) leads to energy drain in constrained sensor nodes due to constant
overhearing, periodic beaconing for Neighbourhood Management (NM) and increase in packet header length to append priority wise sorted Forwarding Candidates Set (FCS) prior to data transmission. The timer-based coordination mechanism incurs the least overhead to coordinate among the FCS that has successfully received the data packet for relaying the data in a multi-hop manner. This timer-based mechanism suffers from duplicate transmissions if the FCS is either not carefully selected or coordinated. The focus of this work is to propose a hybrid opportunistic energy efficient routing design for large scale, low power and lossy WSN. This design avoids periodic 'hello' beacons for NM, limits constant overhearing and increase in packet header length. There are two modes of operation i) opportunistic ii) unicast mode. The sender node adopts opportunistic forwarding for its initial data packet transmission and instead of pre-computing the FCS, it is dynamically computed in a completely distributed manner. The
eligible nodes to be part of FCS will be neighbour nodes at lower corona level than the sender with respect to the sink and remaining energy above the minimum threshold. The nodes part of FCS based on crosslayered multi-metrics and fuzzy decision logic determines its priority level to compute Dynamic Holding
Delay (DHD) for effective timer coordination. The differentiated back off implementation along with DHD enables the higher priority candidate that had received data packet to forward the packet first and facilitates others to cancel its timer upon overhearing. The sender node switches to unicast mode of
forwarding for successive transmissions by choosing the forwarding node with maximum trust value as it
denotes the stability of the temporally varying link with respect to the forwarder. The sender node will revert to opportunistic mode to increase transmission reliability in case of link-level transmission error or no trustworthy forwarders. Simulation results in NS2 show significant increase in Packet Delivery Ratio (PDR),decrease in both average energy consumption per node and Normalized Energy Consumption (NEC) per packet in comparison with existing protocols.
JCWAEED: JOINT CHANNEL ASSIGNMENT AND WEIGHTED AVERAGE EXPECTED END-TO-END DE...csandit
In recent years, multi-channel multi-radio Wireless Mesh network has become one of the most important technologies in the evolution of next-generation networks. Its multi-hop, selforganization,self-healing and simple deployment is an effective way to solve the bottleneck problem of last mile. In this paper, we propose a new routing metric called WAEED, deployed in JCWAEED protocol, a joint channel assignment and weighted average expected end-to-end delay routing protocol which considers both interference suppression with factor IF and end-toend delay. Additionally, we give the exact calculation formula of transmission delay and queuing delay. Simulations results demonstrate that JCWAEED outperforms other joint design routing protocols in terms of throughput, end-to-end delay and packet loss rate.
Improving QoS-based Routing by Limiting Interference in Lossy Wireless Sensor...ijwmn
Many new routing protocols have been proposed for wireless sensor networks to maximize throughput, minimize delay or improve other QoS metrics in order to solve the problems of resource-constrained sensor nodes in large networks. However, many of them are based on flooding or its variants. Many routing messages are propagated unnecessarily and may cause different interference characteristics during route discovery phase and in the actual application data transmission phase. As a result, incorrect routes may be selected. Epidemic algorithms have been used to limit flooding in the field of wireless sensor networks. Directed diffusion has been commonly used in wireless sensor networks because it is designed to improve energy efficiency and scalability. However, the intrinsic flooding scheme for interest subscriptions prevents it from achieving the maximal potential of these two goals. We propose a routing
protocol that uses ID-free epidemic flooding to limit interference in conjunction with metrics for increasing throughput and reducing delay. Simulation results in ns2 show that there is an optimal number of neighbors to achieve the best throughput and delay performance. For a fixed topology of a certain size, there exists an optimal percentage of neighbors that forward the flooding message to achieve the best throughput and delay performance.
Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...Waqas Tariq
WiMAX network introduces a multimedia data scheduling service with different quality of service (QoS) requirements. Transmission opportunities are scheduled by the service according to the types of traffic data for the different connections or users. In the paper, we first propose a uniform definition of QoS level for the multimedia data types in the service. The QoS level of a connection are determined by the type of data of the connection and its allocated resources. Based on these QoS levels, we propose a call admission control (CAC) scheme for the entry admission of a new connection without degrading the network performance and the QoS of ongoing connections. The key idea of this scheme is to regulate the arriving traffic of the network such that the network can work at an optimal point, given under a heavy load traffic. Taking advantage of the simulation experiments, we confirm the fact that the proposed scheme can achieve better trade-off between the overall performance of network system and the QoS level of individual connection.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
System level simulation for two tier macro femto cellular networksijwmn
LTE is an emerging wireless communication technology to provide high- speed data service for the mobile
phones and data terminals. To improve indoor coverage and capacity Femtocells are included in 3GPP
since Release 8. There is no common simulation platform is available for performance justification of LTEFemtocells.
LTE-Sim is an object-oriented open source simulator which incorporates a complete protocol
stack can be used for simulating two-tier macro-femto scenarios. To the best of our knowledge no paper
provides the guideline to perform system level simulation of Femtocell networks. Here, in this paper
Femtocells performance is evaluated in multi-Macrocells and multi-Femtocells environment with
interference from Microcells and Macrocell users along with the scripting.
Steganography is a technology used since years for the communication of messages secretly. These secret messages are put inside honest carriers. Carriers can be digital images, audio files, video files and so on. The limitation in sending concealed longer messages has been overcoming by the inclusion of video files as carriers. Popular internet services such as Skype, BitTorrent, Google Suggest, and
WLANs are targets of information hiding techniques. Nowadays, plotters are not only using the carriers but also the protocols for communication that regulate the path of the carrier through the Internet. This technique is named Network Steganography.
Effective Road Model for Congestion Control in VANETSijwmn
Congestion on the roads is a key problem to deal with, which wastes valuable time.. Due to high mobility
rate and relative speed link failure occur very often. VANET is used to tackle the problem of congestion,
and make decisions well in advance to avoid traffic congestion. In this paper we proposed a solution to
detect and control the traffic congestion by using of both (V2V) and (V2I), as a result the drivers become
aware of the location of congestion as well as way to avoid getting stuck in congestion. The congestion is
detected by analyzing the data obtained by vehicular communication and road side units to avoid the
traffic. Our proposition system is competent of detecting and controlling traffic congestion in real-time.
V2V and V2I communication network is used to receive and send the messages. We simulate the result by
using Congestion Detection and Control Algorithm (CDCA), and show that this is one effective way to
control congestion. The Proposed methodology ensures reliable and timely delivery of messages to know
about congestion and avoid it.
AN ADVANCED QOS ANALYSIS AND EVALUATION METHOD FOR MOBILE INTERNET ACCESS ijwmn
The paper proposes a new method for the analysis and evaluation of the Quality of Service (QoS) in a
mobile Internet access scenario. In particular, the paper proposes a throughput evaluation method based
on PathChirp algorithm. The end-to-end bandwidth was estimated by means of the Self Loading of Periodic
Streams (SloPS) technique. The obtained measurements were then analyzed by estimating the degree of
correlation with other parameters that characterize the data transmission such as power, round trip time,
etc. Finally, in order to have greater spatial resolution performance guaranteed by an Internet service
provider, a 3D reconstruction method based on using drones is proposed and some preliminary results are
discussed.
L shaped slot loaded semicircular patch antenna for wideband operation ijwmn
In this paper, a dual frequency resonance antenna is analysed by introducing L-shaped slot in a semi
circular patch, different parametric studies have allows and the results in terms of return loss and
radiation pattern are given. The results show that dual wide bands are achieved and a better impedance
matching for the upper and lower resonance are obtained. Also, it is observed that various antenna
parameters are obtained as a function of frequency for different value of slot length and width; it is easy to
adjust the upper and the lower band by varying these different antenna parameters. The coaxial feed is
used to excite the patch antenna. Theoretical results using Matlab are compared with the simulated results
obtained from Ansoft HFSS software and shown to be in good agreement.
The maximization of a networks lifetime is an important part of research in the present scenario. In ad hoc network, the topology of network changes frequently due to the mobility of mobile nodes where the communication is possible without any network infrastructure. Mobile nodes have limited energy resources so that the energy efficient routing should be provided which increases the life time of the network. The existing routing mechanisms do not consider energy of nodes for data transmission. In this paper a novel approach is analyzed to improve the networks lifetime where the data transfer is based on the minimum hop count and residual energy of the mobile nodes. The analysis is carried out by using the network simulator and the simulation results shows that the proposed work provides an energy efficient routing in ad hoc networks.
A Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor NetworkIJCNCJournal
In Wireless Sensors Networks (WSN) based application, a large number of sensor devices must be deployed. Energy efficiency and network lifetime are the two most challenging issues in WSN. As a consequence, the main goal is to reduce the overall energy consumption using clustering protocols which have to ensure reliability and connectivity in large-scale WSN. This work presents a new clustering and routing algorithm based on the properties of the sensor networks. The main goal of this work is to extend the network lifetime via charge equilibration in the WSN. According to many errors with sensing devices and to have greater data accuracy, we use a quorum mechanism. The proposed algorithms are evaluated widely and the results are compared with related works. The experimental results show that the proposed algorithm provides an effective improvement in terms of energy consumption, data accuracy and network lifetime.
An Efficient and Stable Routing Algorithm in Mobile Ad Hoc NetworkIJCNCJournal
Mobile Ad hoc Network (MANET) is mainly designed to set up communication among devices in infrastructure-less wireless communication network. Routing in this kind of communication network is highly affected by its restricted characteristics such as frequent topological changes and limited battery power. Several research works have been carried out to improve routing performance in MANET. However, the overall performance enhancement in terms of packet delivery, delay and control message overhead is still not come into the wrapping up. In order to overcome the addressed issues, an Efficient and Stable-AODV (EFST-AODV) routing scheme has been proposed which is an improvement over AODV to establish a better quality route between source and destination. In this method, we have modified the route request and route reply phase. During the route request phase, cost metric of a route is calculated on the basis of parameters such as residual energy, delay and distance. In a route reply phase, average residual energy and average delay of overall path is calculated and the data forwarding decision is taken at the source node accordingly. Simulation outcomes reveal that the proposed approach gives better results in terms of packet delivery ratio, delay, throughput, normalized routing load and control message overhead as compared to AODV.
ADAPTIVE HANDOVER HYSTERESIS AND CALL ADMISSION CONTROL FOR MOBILE RELAY NODESIJCNCJournal
The aim of equipping a wireless network with a mobile relay node is to support broadband wireless communications for vehicular users and their devices. The high mobility of vehicular users, possibly at a very high velocity in the area in which two cells overlap, could cause the network to suffer from a reduced handover success rate and, hence, increased radio link failure. The combined impact of these problems is service interruptions to vehicular users. Thus, the handover schemes are crucial in solving these problems. In this work, we first present the adaptive handover hysteresis scheme for the wireless network with mobile relay nodes in the high-speed train scenario. Specifically, our proposed adaptive hysteresis scheme is based on the velocity of the train. Second, the handover call dropping probability is reduced by introducing a modified call admission control scheme to support radio resource reservation for handover calls that prioritizes handover calls of mobile relay over the other calls. The proposed solution in which adaptive parameter is combined with call admission control is evaluated by system level simulation. Our simulation results illustrate an increased handover success rate and reduced radio link failures.
PERFORMANCE ANALYSIS IN CELLULAR NETWORKS CONSIDERING THE QOS BY RETRIAL QUEU...IJCNCJournal
In this article, a retrial queueing model will be considered with persevering customers for wireless cellular
networks which can be frequently applied in the Fractional Guard Channel (FGC) policies, including
Limited FGC (LFGC), Uniform FGC (UFGC), Limited Average FGC (LAFGC) and Quasi Uniform FGC
(QUFGC). In this model, the examination on the retrial phenomena permits the analyses of important
effectiveness measures pertained to the standard of services undergone by users with the probability that a
fresh call first arrives the system and find all busy channels at the time, the probability that a fresh call
arrives the system from the orbit and find all busy channels at the time and the probability that a handover
call arrives the system and find all busy channels at the time. Comparison between four types of the FGC
policy can befound to evaluate the performance of the system.
Macro with pico cells (hetnets) system behaviour using well known scheduling ...ijwmn
This paper demonstrates the concept of using Heterogeneous networks (HetNets) to improve Long Term Evolution (LTE) system by introducing the LTE Advance (LTE-A). The type of HetNets that has been chosen for this study is Macro with Pico cells. Comparing the system performance with and without Pico cells has clearly illustrated using three well-known scheduling algorithms (Proportional Fair PF, Maximum Largest Weighted Delay First MLWDF and Exponential/Proportional Fair EXP/PF). The system is judged based on throughput, Packet Loss Ratio PLR, delay and fairness.. A simulation platform called LTE-Sim has been used to collect the data and produce the paper’s outcomes and graphs. The results prove that adding Pico cells enhances the overall system performance. From the simulation outcomes, the overall system performance is as follows: throughput is duplicated or tripled based on the number of users, the PLR is almost quartered, the delay is nearly reduced ten times (PF case) and changed to be a half (MLWDF/EXP cases), and the fairness stays closer to value of 1. It is considered an efficient and cost effective way to increase the throughput, coverage and reduce the latency.
A gateway based energy efficient multi hop routing protocol for wireless sensor networks (WSNs) is
introduced. The main aim of our paper is to design a protocol which minimizes energy consumption.
Gateway nodes are deployed in sensing field.
Engineering Research Publication
Best International Journals, High Impact Journals,
International Journal of Engineering & Technical Research
ISSN : 2321-0869 (O) 2454-4698 (P)
www.erpublication.org
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
ENERGY EFFICIENT ROUTING PROTOCOL BASED ON DSRijasuc
Energy consumption is a major concern in most of the present day devices in wireless networks. Especially
in Ad hoc networks, energy is a limited factor. Random movement in nodes add to the frequent failure of
routes which adds to the energy consumption in the network. In this paper, a routing protocol is proposed
which is based on a modification of the conventional DSR (Dynamic Source routing). A comparative
analysis is performed with respect to energy consumption, maximum throughput and delay. The routing
protocols used for reference in this analysis are DSDV, AODV and conventional DSR. Experimental results
show that the proposed modified DSR shows a reduced energy consumption, improved rate of maximum
throughput and a reduced delay compared to above mentioned routing protocols
PERFORMANCE EVALUATION OF LTE NETWORK USING MAXIMUM FLOW ALGORITHMijcsit
In this paper, we propose a new traffic flow model of the Long Term Evaluation (LTE) network for the Evolved Universal Terrestrial Radio Access Network (E-UTRAN). Here only one Evolve Node B (eNB) nearest to the Mobility Management Entity (MME) and Serving Gateway (S-GW) will use the S1 link to
bridge the E-UTRAN and Evolved Packet Core (EPC). All the eNBs of a tracking area will be connected to each other by the X2 link. Determination of capacity of a links of such a network is a challenging job since each node offers its own traffic and at the same time conveys traffic of other nodes. In this paper, we apply maximum flow algorithm including superposition theorem to solve the traffic flow of radio network. Using the total flow per subcarrier, a new traffic model is also developed in the paper. The relation among the traffic parameters: ‘blocking probability’, ‘offered traffic’, ‘instantaneous capacity’, ‘average holding
time’, and ‘number of users’ are shown graphically under both QPSK and 16-QAM. The concept of the network will be helpful to improve the SINR of the received signal ofeNBslocated long distance relative to MME/S-GW.
A NOVEL HYBRID OPPORTUNISTIC SCALABLE ENERGY EFFICIENT ROUTING DESIGN FOR LOW...IJCNCJournal
Opportunistic Routing (OR) scheme increases the transmission reliability despite the lossy wireless radio links by exploiting the broadcast nature of the wireless medium. However, OR schemes in low power Wireless Sensor Network (WSN) leads to energy drain in constrained sensor nodes due to constant
overhearing, periodic beaconing for Neighbourhood Management (NM) and increase in packet header length to append priority wise sorted Forwarding Candidates Set (FCS) prior to data transmission. The timer-based coordination mechanism incurs the least overhead to coordinate among the FCS that has successfully received the data packet for relaying the data in a multi-hop manner. This timer-based mechanism suffers from duplicate transmissions if the FCS is either not carefully selected or coordinated. The focus of this work is to propose a hybrid opportunistic energy efficient routing design for large scale, low power and lossy WSN. This design avoids periodic 'hello' beacons for NM, limits constant overhearing and increase in packet header length. There are two modes of operation i) opportunistic ii) unicast mode. The sender node adopts opportunistic forwarding for its initial data packet transmission and instead of pre-computing the FCS, it is dynamically computed in a completely distributed manner. The
eligible nodes to be part of FCS will be neighbour nodes at lower corona level than the sender with respect to the sink and remaining energy above the minimum threshold. The nodes part of FCS based on crosslayered multi-metrics and fuzzy decision logic determines its priority level to compute Dynamic Holding
Delay (DHD) for effective timer coordination. The differentiated back off implementation along with DHD enables the higher priority candidate that had received data packet to forward the packet first and facilitates others to cancel its timer upon overhearing. The sender node switches to unicast mode of
forwarding for successive transmissions by choosing the forwarding node with maximum trust value as it
denotes the stability of the temporally varying link with respect to the forwarder. The sender node will revert to opportunistic mode to increase transmission reliability in case of link-level transmission error or no trustworthy forwarders. Simulation results in NS2 show significant increase in Packet Delivery Ratio (PDR),decrease in both average energy consumption per node and Normalized Energy Consumption (NEC) per packet in comparison with existing protocols.
JCWAEED: JOINT CHANNEL ASSIGNMENT AND WEIGHTED AVERAGE EXPECTED END-TO-END DE...csandit
In recent years, multi-channel multi-radio Wireless Mesh network has become one of the most important technologies in the evolution of next-generation networks. Its multi-hop, selforganization,self-healing and simple deployment is an effective way to solve the bottleneck problem of last mile. In this paper, we propose a new routing metric called WAEED, deployed in JCWAEED protocol, a joint channel assignment and weighted average expected end-to-end delay routing protocol which considers both interference suppression with factor IF and end-toend delay. Additionally, we give the exact calculation formula of transmission delay and queuing delay. Simulations results demonstrate that JCWAEED outperforms other joint design routing protocols in terms of throughput, end-to-end delay and packet loss rate.
Improving QoS-based Routing by Limiting Interference in Lossy Wireless Sensor...ijwmn
Many new routing protocols have been proposed for wireless sensor networks to maximize throughput, minimize delay or improve other QoS metrics in order to solve the problems of resource-constrained sensor nodes in large networks. However, many of them are based on flooding or its variants. Many routing messages are propagated unnecessarily and may cause different interference characteristics during route discovery phase and in the actual application data transmission phase. As a result, incorrect routes may be selected. Epidemic algorithms have been used to limit flooding in the field of wireless sensor networks. Directed diffusion has been commonly used in wireless sensor networks because it is designed to improve energy efficiency and scalability. However, the intrinsic flooding scheme for interest subscriptions prevents it from achieving the maximal potential of these two goals. We propose a routing
protocol that uses ID-free epidemic flooding to limit interference in conjunction with metrics for increasing throughput and reducing delay. Simulation results in ns2 show that there is an optimal number of neighbors to achieve the best throughput and delay performance. For a fixed topology of a certain size, there exists an optimal percentage of neighbors that forward the flooding message to achieve the best throughput and delay performance.
Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...Waqas Tariq
WiMAX network introduces a multimedia data scheduling service with different quality of service (QoS) requirements. Transmission opportunities are scheduled by the service according to the types of traffic data for the different connections or users. In the paper, we first propose a uniform definition of QoS level for the multimedia data types in the service. The QoS level of a connection are determined by the type of data of the connection and its allocated resources. Based on these QoS levels, we propose a call admission control (CAC) scheme for the entry admission of a new connection without degrading the network performance and the QoS of ongoing connections. The key idea of this scheme is to regulate the arriving traffic of the network such that the network can work at an optimal point, given under a heavy load traffic. Taking advantage of the simulation experiments, we confirm the fact that the proposed scheme can achieve better trade-off between the overall performance of network system and the QoS level of individual connection.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
System level simulation for two tier macro femto cellular networksijwmn
LTE is an emerging wireless communication technology to provide high- speed data service for the mobile
phones and data terminals. To improve indoor coverage and capacity Femtocells are included in 3GPP
since Release 8. There is no common simulation platform is available for performance justification of LTEFemtocells.
LTE-Sim is an object-oriented open source simulator which incorporates a complete protocol
stack can be used for simulating two-tier macro-femto scenarios. To the best of our knowledge no paper
provides the guideline to perform system level simulation of Femtocell networks. Here, in this paper
Femtocells performance is evaluated in multi-Macrocells and multi-Femtocells environment with
interference from Microcells and Macrocell users along with the scripting.
Steganography is a technology used since years for the communication of messages secretly. These secret messages are put inside honest carriers. Carriers can be digital images, audio files, video files and so on. The limitation in sending concealed longer messages has been overcoming by the inclusion of video files as carriers. Popular internet services such as Skype, BitTorrent, Google Suggest, and
WLANs are targets of information hiding techniques. Nowadays, plotters are not only using the carriers but also the protocols for communication that regulate the path of the carrier through the Internet. This technique is named Network Steganography.
Effective Road Model for Congestion Control in VANETSijwmn
Congestion on the roads is a key problem to deal with, which wastes valuable time.. Due to high mobility
rate and relative speed link failure occur very often. VANET is used to tackle the problem of congestion,
and make decisions well in advance to avoid traffic congestion. In this paper we proposed a solution to
detect and control the traffic congestion by using of both (V2V) and (V2I), as a result the drivers become
aware of the location of congestion as well as way to avoid getting stuck in congestion. The congestion is
detected by analyzing the data obtained by vehicular communication and road side units to avoid the
traffic. Our proposition system is competent of detecting and controlling traffic congestion in real-time.
V2V and V2I communication network is used to receive and send the messages. We simulate the result by
using Congestion Detection and Control Algorithm (CDCA), and show that this is one effective way to
control congestion. The Proposed methodology ensures reliable and timely delivery of messages to know
about congestion and avoid it.
AN ADVANCED QOS ANALYSIS AND EVALUATION METHOD FOR MOBILE INTERNET ACCESS ijwmn
The paper proposes a new method for the analysis and evaluation of the Quality of Service (QoS) in a
mobile Internet access scenario. In particular, the paper proposes a throughput evaluation method based
on PathChirp algorithm. The end-to-end bandwidth was estimated by means of the Self Loading of Periodic
Streams (SloPS) technique. The obtained measurements were then analyzed by estimating the degree of
correlation with other parameters that characterize the data transmission such as power, round trip time,
etc. Finally, in order to have greater spatial resolution performance guaranteed by an Internet service
provider, a 3D reconstruction method based on using drones is proposed and some preliminary results are
discussed.
L shaped slot loaded semicircular patch antenna for wideband operation ijwmn
In this paper, a dual frequency resonance antenna is analysed by introducing L-shaped slot in a semi
circular patch, different parametric studies have allows and the results in terms of return loss and
radiation pattern are given. The results show that dual wide bands are achieved and a better impedance
matching for the upper and lower resonance are obtained. Also, it is observed that various antenna
parameters are obtained as a function of frequency for different value of slot length and width; it is easy to
adjust the upper and the lower band by varying these different antenna parameters. The coaxial feed is
used to excite the patch antenna. Theoretical results using Matlab are compared with the simulated results
obtained from Ansoft HFSS software and shown to be in good agreement.
ENERGY EFFICIENT GRID AND TREE BASED ROUTING PROTOCOLijwmn
In Wireless Sensor Network, a large number of sensor nodes are deployed and they mainly consume energy
in transmitting data over long distances. Sensor nodes are battery powered and their energy is restricted.
Since the location of the sink is remote, considerable energy would be consumed if each node directly
transmits data to the base station. Aggregating data at the intermediate nodes and transmitting using multihops
aids in reducing energy consumption to a great extent. This paper proposes a hybrid protocol
“Energy efficient Grid and Tree based routing protocol” (EGT) in which the sensing area is divided into
grids. The nodes in the grid relay data to the cell leader which aggregates the data and transmits to the
sink using the constructed hop tree. Simulation results show that EGT performs better than LEACH.
SENSOR SELECTION SCHEME IN TEMPERATURE WIRELESS SENSOR NETWORKijwmn
In this paper, we propose a novel energy efficient environment monitoring scheme for wireless sensor
networks, based on data mining formulation. The proposed adapting routing scheme for sensors for
achieving energy efficiency from temperature wireless sensor network data set. The experimental
validation of the proposed approach using publicly available Intel Berkeley lab Wireless Sensor Network
dataset shows that it is possible to achieve energy efficient environment monitoring for wireless sensor
networks, with a trade-off between accuracy and life time extension factor of sensors, using the proposed
approach.
Connectivity aware and adaptive multipath routing algorithm for mobile adhoc ...ijwmn
We propose in this paper a connectivity-aware routing algorithm and a set of related theorems. This algorithm allows nodes in Mobile Adhoc and Sensor Networks (MASNets) to provide the highest connectivity life time to a specific destination since the issuance of data becomes a necessity for MASNets. In the proposed Solution, nodes in MASNets are able to specify the disjointness degree of the available paths allowing the discovery of the optimal set of backup routes and consequently enhance the survivability of the connectivity. These nodes perform an on-demand discovery and a generation of a set of routes, by specifying a disjointness threshold, representing the maximal number of nodes shared between any two paths in the set of k established paths. The proposed multipath routing algorithm, is adaptive, secure, and uses labels to carry the disjointness-threshold between nodes during the route discovery. A set of security mechanisms, based on the Watchdog and the digital signature concepts, is used to protect the route discovery process.
A SEMI BLIND CHANNEL ESTIMATION METHOD BASED ON HYBRID NEURAL NETWORKS FOR UP...ijwmn
The paper describes how to improve channel estimation in Single Carrier Frequency Division Multiple
Access (SC-FDMA) system, using a Hybrid Artificial Neural Networks (HANN). The 3rd Generation
Partnership Project (3GPP) standards for uplink Long Term Evolution Advanced (LTE-A) uses pilot based
channel estimation technique. This kind of channel estimation method suffers from a considerable loss
ofbitrate due to pilot insertion; all data frame sent contains reference signal. The HANN converts data
aided channel estimator to semi blind channel estimator. To increase convergence speed, HANN uses some
channel propagation Fuzzy Rules to initialize Neural Network parameters before learning instead of a
random initialization, so its learning phase ismore rapidly compared to classic ANN.HANN allows more
bandwidth efficient and less complexity. Simulation results show that HANN has better computational
efficiency than the Minimum Mean Square Error (MMSE) estimator and has faster convergence than
classic Neural Networks estimators.
In ad hoc networks, routing plays a pertinent role. Deploying the appropriate routing protocol is very important in order to achieve best routing performance and reliability. Equally important is the mobility model that is used in the routing protocol. Various mobility models are available and each can have different impact on the performance of the routing protocol. In this paper, we focus on this issue by examining how the routing protocol, Optimized Link State Routing protocol, behaves as the mobility model is varied. For this, three random mobility models, viz., random waypoint, random walk and random direction are considered. The performance metrics used for assessment of Optimized Link State Routing protocol are throughput, end-to-end delay and packet delivery ratio.
Energy balanced on demand clustering algorithm based on leach-cijwmn
As the use of Wireless Sensor Networks (WSNs) has grown enormously, the need for energy-efficient management has also risen. With advances in ubiquitous computing environment, WSNs have been broadly studied and many energy-efficient routing protocols had been proposed. LEACH (Low Energy Adaptive Clustering Hierarchy) is a popular cluster-based protocol, which provides distributed adaptive clustering and periodic cluster head (CH) selection rotation. As extension to LEACH, LEACH-C (LEACH Centralized) was proposed, in which the energy is utilized to select CH. However, both can’t guarantee cluster head distribution, in addition to considerable periodic clustering overhead. Furthermore, network topology change is a critical characteristic that has influence on communication path and load distribution among nodes. To resolve such problems, Energy-Balance on Demand Clustering Algorithm Based on LEACH-C is proposed. The algorithm adopts centralized cluster formation and distributed CH selection methods. Minimum energy clustering is used to divide the network into clusters, while energy and total communication distance are considered as secondary criteria to select optimal CH. From simulation results the proposed algorithm outperforms LEACH-C in life time, stability period and performance efficiency.
Unmanned aerial vehicles (UAVs) have become very popular recently for both civil uses and potential commercial uses, such as law enforcement, crop survey, grocery delivery, and photographing, although they were mainly used for military purposes before. Researchers need the help of simulations when they design and test new protocols for UAV networks because simulations can be done for a network of a size
that a test bed can hardly approach. In the simulation of an UAV network it is important to choose a radio propagation model for the links in the network. We study the shadowing radio propagation model in this paper and compare it with the free space model, both of which are available in the ns2 network simulation package. We also show how the choice of the parameters of the shadowing model would impact on the
network performance of a UAV network.
DEVICE-TO-DEVICE (D2D) COMMUNICATION UNDER LTE-ADVANCED NETWORKSijwmn
Device-to-Device (D2D) communication is a new technology that offer many advantages for the LTEadvanced
network such us wireless peer-to-peer services and higher spectral efficiency. It is also
considered as one of promising techniques for the 5G wireless communications system and used in so
many different fields such as network traffic offloading, public safety, social services and applications such
as gaming and military applications . The goal of this paper is to present advances on the current 3GPP
LTE-advanced system related to Device-to-Device (D2D). In this paper, we provide an overview of the
D2D types based on the communication spectrum of D2D transmission, namely Inband D2D
communication and Outband D2D communication. Then we present the advantages and disadvantages of
each D2D mode. Moreover, architecture and protocol enhancements for D2D communications under
LTE-A network are described.
A fuzzy congestion controller to detect and balance congestion in wsnijwmn
A Wireless Sensor Network (WSN) is collection of wireless sensors with limited memory, processing and energy supply. Based on application, sensors distribute in a wide geographically area in order to collect information and transmit the collected data packets toward a base station also called Sink. Due to the relatively high node density and source-to-sink communication pattern, congestion is a critical issue in WSN. Congestion not only causes packet loss, but also leads to excessive energy consumption as well as delay. To address this problem, in this paper we propose a new fuzzy logic based mechanism to detect and control congestion in each grid in WSN. In the proposed approach, sink select one node in each grid as Monitor Node. In addition, sink defines congestion candidate grids. Each Monitor Node in congestion candidate grids continually monitors the network and fetches the fuzzy controller inputs in order to determine level of congestion in each grid. Based on the congestion level, packets forward through the grid or relay nodes. Simulation results show that our approach has higher packet delivery ratio and lower packet loss than existing approaches.
BEHAVIOUR OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS INVESTIGATED FOR EME...ijwmn
Mobile Ad hoc Networks are open, shared, dynamic and self-organized networks. These distinct nature
lead to efficient use in emergency and recue scenarios where the sharing of information is necessary. In
order to share information within the network, a proper routing protocol is required to establish routes
between nodes. This article discusses which of the routing protocols such as reactive or proactive has
better performance in such scenario. In order to implement the test bed, we choose a real area in
Uttarakhand state, India where the disaster occurred recently hence so many civilizations had vanished
due to lack of communication and failure in recovery. Our aim is to choose an optimum routing protocol
that is correct and used for efficient route establishment between nodes so that message could be delivered
on time without loss and it will be implemented and used in future based on the model that we propose.
Interference management in lte downlink networksijwmn
Two major challenges for evolving LTE (Long Term Evolution) networks are to achieve enhanced system capacity and cell coverage compared with WCDMA (Wideband Code Division Multiple Access) system. Effective utilization of radio resources as well as dense spectrum reuse are at the core to attain these targets. However, dense frequency reuse may increase inter-cell interference, which in turn severely limits the capacity of users in the system. Inter-cell interference can restrict overall system performance in terms of throughput and spectral efficiency, especially for the users located at the cell edge area. Hence, careful management of inter-cell interferences becomes crucial to improve LTE system performance. In this paper, interference mitigation schemes for LTE downlink networks are investigated.
Mobility is one of the basic features that define an ad hoc network, an asset that leaves the field free for the
nodes to move. The most important aspect of this kind of network turns into a great disadvantage when it
comes to commercial applications, take as an example: the automotive networks that allow communication
between a groups of vehicles. The ad hoc on-demand distance vector (AODV) routing protocol, designed
for mobile ad hoc networks, has two main functions. First, it enables route establishment between a source
and a destination node by initiating a route discovery process. Second, it maintains the active routes, which
means finding alternative routes in a case of a link failure and deleting routes when they are no longer
desired. In a highly mobile network those are demanding tasks to be performed efficiently and accurately.
In this paper, we focused in the first point to enhance the local decision of each node in the network by the
quantification of the mobility of their neighbours. Quantification is made around RSSI algorithm a well
known distance estimation method.
S URVEY OF L TE D OWNLINK S CHEDULERS A LGORITHMS IN O PEN A CCESS S IM...ijwmn
he LTE/LTE-A has become a catchphrase for research
and lot of research are being conducted and
carried out in LTE in various issues by various peo
ple. New tools are developed and introduced in the
market to interpret the results of the new algorith
ms proposed by various people. Some tools are open
access which are free to use but some tools are pro
duced by the companies which are not open access. I
n
this paper some of the open access simulation tools
like LTE-Sim and NS-3 are analyzed and LTE downlin
k
scheduler algorithms are simulated using those tool
s. In LTE systems, the downlink scheduler is an
important component for radio resource management;
hence in the context of LTE simulation, a study
between the downlink scheduler models between the s
imulators are performed.
Improvement of crankshaft MAC protocol for wireless sensor networks: a simula...IJECEIAES
Due to the dramatic growth in the use of Wireless Sensor Network (WSN) applications ranging from environment and habitat monitoring to tracking and surveillance, network research in WSN protocols has been very active in the last decade. With battery-powered sensors operating in unattended environments, energy conservation becomes the key technique for improving WSN lifetimes. WSN Medium Access Control (MAC) protocols address energy awareness and reduced duty cycles. The focus of this study is to investigate, through simulation, the effect of variations in various factors that influence the performance results of WSNs. Using MiXiM framework with OMNeT++ simulator, this simulation study proposes modifications in Crankshaft MAC protocol in order to improve its performance. The impact of duration and number of slots, degree of connectivity among the nodes, mobility speed and mobility update interval and also, the impact of sending data packets without preambles are investigated. Based on the simulation results, an improved version of the Crankshaft protocol for WSN is suggested and a comparative study of the performances of the original and improved protocol is presented. The results clearly indicate the superiority of the improved protocol over its original version.
Channel feedback scheduling for wireless communicationseSAT Journals
Abstract Opportunistic scheduling can significantly improve wireless network performance by exploiting the underlying channel condition. There has been a lot of work on opportunistic scheduling, but the problem of finding the right feedback mechanism to convey channel information has largely been untouched. In emerging multichannel systems, the per-channel feedback induces a substantial amount of feedback overhead and requires high computational complexity. To reduce the feedback overhead, we consider an opportunistic feedback strategy that activates the channel feedback opportunistically according to the channel condition. Then, we combine the opportunistic feedback with the best-n channel feedback scheme where a mobile user chooses the best n channels and transfers this information to the base station. We analyze the throughput and the amount of channel feedback information for proportionally fair opportunistic scheduling under Rayleigh fading i.i.d. channels. The numerical results confirm that our partial feedback schemes achieve a remarkable reduction in the amount of feedback information without significant throughput degradation, thereby saving the scarce wireless bandwidth and limited battery power.
Long-Term Evolution (LTE), an emerging and promising fourth generation mobile technology, is expected
to offer ubiquitous broadband access to the mobile subscribers. In this paper, the performance of Frame
Level Scheduler (FLS), Exponential (EXP) rule, Logarithmic (LOG) rule and Maximum-Largest Weighted
Delay First (M-LWDF) packet scheduling algorithms has been studied in the downlink 3GPP LTE cellular
network. To this aim, a single cell with interference scenario has been considered. The performance
evaluation is made by varying the number of UEs ranging from 10 to 50 (Case 1) and user speed in the
range of [3, 120] km/h (Case 2). Results show that while the number of UEs and user speed increases, the
performance of the considered scheduling schemes degrades and in both case FLS outperforms other three
schemes in terms of several performance indexes such as average throughput, packet loss ratio (PLR),
packet delay and fairness index.
Spectrum Sharing between Cellular and Wi-Fi Networks based on Deep Reinforcem...IJCNCJournal
Recently, mobile traffic is growing rapidly and spectrum resources are becoming scarce in wireless networks. Due to this, the wireless network capacity will not meet the traffic demand. To address this problem, using cellular systems in an unlicensed spectrum emerged as an effective solution. In this case, cellular systems need to coexist with Wi-Fi and other systems. For that, we propose an efficient channel assignment method for Wi-Fi AP and cellular NB, based on the DRL method. To train the DDQN model, we implement an emulator as an environment for spectrum sharing in densely deployed NB and APs in wireless heterogeneous networks. Our proposed DDQN algorithm improves the average throughput from 25.5% to 48.7% in different user arrival rates compared to the conventional method. We evaluated the generalization performance of the trained agent, to confirm channel allocation efficiency in terms of average throughput under the different user arrival rates.
Spectrum Sharing between Cellular and Wi-Fi Networks based on Deep Reinforcem...IJCNCJournal
Recently, mobile traf ic is growing rapidly and spectrum resources are becoming scarce in wireless
networks. Due to this, the wireless network capacity will not meet the traf ic demand. To address this
problem, using cellular systems in an unlicensed spectrum emerged as an ef ective solution. In this case,
cellular systems need to coexist with Wi-Fi and other systems. For that, we propose an ef icient channel
assignment method for Wi-Fi AP and cellular NB, based on the DRL method. To train the DDQN model,
we implement an emulator as an environment for spectrum sharing in densely deployed NB and APs in
wireless heterogeneous networks. Our proposed DDQN algorithm improves the average throughput from
25.5% to 48.7% in dif erent user arrival rates compared to the conventional method. We evaluated the
generalization performance of the trained agent, to confirm channel allocation ef iciency in terms of
average throughput under the dif erent user arrival rates
In this paper, we propose a new traffic flow model of the Long Term Evaluation (LTE) network for the Evolved Universal Terrestrial Radio Access Network (E-UTRAN). Here only one Evolve Node B (eNB) nearest to the Mobility Management Entity (MME) and Serving Gateway (S-GW) will use the S1 link to bridge the E-UTRAN and Evolved Packet Core (EPC). All the eNBs of a tracking area will be connected to each other by the X2 link. Determination of capacity of a links of such a network is a challenging job since each node offers its own traffic and at the same time conveys traffic of other nodes. In this paper, we apply maximum flow algorithm including superposition theorem to solve the traffic flow of radio network. Using the total flow per subcarrier, a new traffic model is also developed in the paper. The relation among the traffic parameters: ‘blocking probability’, ‘offered traffic’, ‘instantaneous capacity’, ‘average holding time’, and ‘number of users’ are shown graphically under both QPSK and 16-QAM. The concept of the network will be helpful to improve the SINR of the received signal ofeNBslocated long distance relative to MME/S-GW.
Link Adaptation for Microwave Link using both MATLAB and Path-Loss Toolijeei-iaes
The inherent multipath transmission on wireless channels usually leads to signal fading which eventually degrades the system performance. In mitigating this problem, link adaptation has been identified as a promising scheme that helps in maximizing the system spectral efficiency (SE) in dispersive wireless channels. In this paper, link adaptation based on adaptive modulation and coding was used to study the performance of M-ary quadrature amplitude modulation radio system subjected to multipath fading. MATLAB® scripts and Simulink model were developed to compare the effect of wireless channel on different constellation sizes. Also, transmission link on Federal University of Technology Akure campus’ path terrain was designed with the aid of path-loss® tool application software in order to further analysis the effect of using different modulation formats on the system performance. The results show that, employment of link adaptation scheme offers better performance regarding the system availability and SE
EFFICIENT ANALYSIS OF THE ERGODIC CAPACITY OF COOPERATIVE NON-REGENERATIVE RE...ijwmn
In this paper, we proposed a novel efficient method of analyzing the ergodic channel capacity of the
cooperative amplify-and-forward (CAF) relay system. This is accomplished by employing a very tight
approximate moment generating function (MGF) of end-to-end signal-to-noise ratio of 2-hop multi-relay
system, which is In this paper, we proposed a novel efficient method of analyzing the ergodic channel
capacity of the cooperative amplify-and-forward (CAF) relay system. This is accomplished by employing a
very tight approximate moment applicable to myriad of fading environments including mixed and
composite fading channels. Three distinct adaptive source transmission policies were considered in our
analysis namely: (i) constant power with optimal rate adaptation (ORA); (ii) optimal joint power and rate
adaptation (OPRA); and (iii) fixed rate with truncated channel inversion (TCIFR). The proposed frame
work based on the novel approximate MGF method is sufficiently general to encapsulate all types of fading
environments (especially for the analysis of the mixed fading case)and provides significant advantage to
model wireless system for mixed and composite fading channel. In addition to simplifying computation
complexity of ergodic capacity for CAF relaying schemes treated in literature, we also derive closed form
expressions for the above three adaptive source transmission policies under Nakagami-m fading with i.n.d
statistics. The accuracy of our proposed method has been validated with existing MGF expressions that are
readily available for specific fading environments in terms of bounds, and via Monte Carlo simulations.
EFFICIENT ANALYSIS OF THE ERGODIC CAPACITY OF COOPERATIVE NON-REGENERATIVE RE...ijwmn
In this paper, we proposed a novel efficient method of analyzing the ergodic channel capacity of the
cooperative amplify-and-forward (CAF) relay system. This is accomplished by employing a very tight
approximate moment generating function (MGF) of end-to-end signal-to-noise ratio of 2-hop multi-relay
system, which is In this paper, we proposed a novel efficient method of analyzing the ergodic channel
capacity of the cooperative amplify-and-forward (CAF) relay system. This is accomplished by employing a
very tight approximate moment applicable to myriad of fading environments including mixed and
composite fading channels. Three distinct adaptive source transmission policies were considered in our
analysis namely: (i) constant power with optimal rate adaptation (ORA); (ii) optimal joint power and rate
adaptation (OPRA); and (iii) fixed rate with truncated channel inversion (TCIFR). The proposed frame
work based on the novel approximate MGF method is sufficiently general to encapsulate all types of fading
environments (especially for the analysis of the mixed fading case)and provides significant advantage to
model wireless system for mixed and composite fading channel. In addition to simplifying computation
complexity of ergodic capacity for CAF relaying schemes treated in literature, we also derive closed form
expressions for the above three adaptive source transmission policies under Nakagami-m fading with i.n.d
statistics. The accuracy of our proposed method has been validated with existing MGF expressions that are
readily available for specific fading environments in terms of bounds, and via Monte Carlo simulations.
Dynamic bandwidth allocation scheme in lr pon with performance modelling and ...IJCNCJournal
We consider models of telecommunication systems that incorporate probability, dense real-time and data.
We present a new formal abstraction method for computing minimum and maximum reachability
probabilities for such models. Our approach uses strictly local formal abstract steps to reduce both the size
of abstract specifications generated and the complexity of operations needed, in comparison to previous
approaches of this kind. A selection of large case studies are implemented the techniques and evaluate,
which include some infinite-state probabilistic real time models, demonstrating improvements over existing
tools in several cases. The capacity of metro and access networks are extended the reach and split ratio of
the conventional Long - Reach Passive Optical Networks (LR-PONs). The efficient solutions of LR-PONs
are appeared in feeder distances around 100km and high split ratios up to 1000-way . Among many
existing approaches, one of the most effective options to improve network performance in LR-PONs are the
multi-thread based dynamic bandwidth allocation (DBA) scheme where several bandwidth allocation
processes are performed in parallel is considered. Without proper intercommunication between the
overlapped threads, multi-thread DBA may lose efficiency and even perform worse than the conventional
single thread algorithm. Real Time Probabilistic Systems are used to evaluate a typical PON systems
performance. This approach is more convenient, flexible, and lower cost than the former simulation method,
which do not need develop special hardware and software tools. Moreover, how changes in performance
depend on changes in the particular modes can be easily analysis by supplying ranges for parameter values.
The proposed algorithm with traditional DBA is compared, and shows its advantage on average packet
delay. The key parameters of the algorithm are analysed and optimized, such as initiating and tuning
multiple threads, inter -thread scheduling, and fairness among users. The algorithms advantage in
numerical results are decreased the average packet delay and improve network throughput under varying
offered loads.
IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...IJNSA Journal
With the rapid growth of wireless communication infras,,tructure over the recent few years, new challenges has been posed on the system and analysis on wireless adhoc networking. Implementation of MIMO communication in such type of network is enhancing the packet transmission capabilities. There are different techniques for cooperative transmission and broadcasting packet in MIMO equipped Mobile Adhoc Network. We have employed a model network in the OPNET environment and propose a new scheduling algorithm based on investigating the different broadcasting algorithm. The new broadcasting algorithm improves the packet transmission rate of the network based on energy performance of the network and minimizes the BER for different transmission mode which is illustrated in this paper. The simulations are done in MATLAB and OPNET environment and the simulated result for the packet transmission rate are collected and shown in the tabular form. Also simulate the network for generating a comparative statement for each mobile node. And performance analysis is also done for the model network. The main focus is to minimize BER and improve information efficiency of the network.
The 3GPP Long Term Evolution Advanced (LTE-A) standard specifies a set of pioneer features such as relay nodes and carrier aggregation. At the same time, the Software Defined Networks (SDN) have become an emerging technology which provides centralized control and programmability to modern networks. In the current communication environment, cloud computing could combine the advantages of both technologies in order to create a novel cloud assisted Software Defined LTEA architecture with relay nodes. Moreover, due to the increased requirements of modern services, the optimal resource allocation is a necessity. In such a context, this paper describes a QoS aware cross carrier scheduler for downlink flows, aiming at the optimization of system resources allocation. The proposed scheduler is evaluated against the PF, MLWDF, EXP/PF, EXP RULE, LOG RULE, FLS and FLSA schedulers in a cloud assisted Software Defined LTE-A topology with relay nodes. Simulation results show that the proposed scheduler improves the real time services performance while at the same time maintains an acceptable performance for best effort flows.
Performance evaluation of VLC system using new modulation approachjournalBEEI
We propose a modified OFDM modulation based on multiband scheme for visible light communications (VLC) system. The method called catenated-OFDM VLC system can efficiently boost the propagation distance and combat multipath induced the inter symbol interference and inter carrier interference. Design parameters such as number of optical bands, input power, distance and data rate are varied to see their effect on the system performances. Simulation analysis is done using Optisys software Ver. 11.0. The results show that the proposed system offers a good performance at longer transmission distance of 12 m for input power of 2 dBm in case of Band=3 with 10 Gbps data rate. BER curves also indicates that the proposed system can be operated at very high data rate of 15 Gbps. This exhibits the ability of the proposed system to be one of the candidate for future optical wireless communication system.
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless NetworksCSCJournals
Heterogeneous Wireless Networks are considered nowadays as one of the potential areas in research and development. The traffic management’s schemes that have been used at the fusion points between the different wireless networks are classical and conventional. This paper is focused on developing a novel scheme to overcome the problem of traffic congestion in the fusion point router interconnected the heterogeneous wireless networks. The paper proposed an EF-AQM algorithm which provides an efficient and fair allocation of bandwidth among different established flows. Finally, the proposed scheme developed, tested and validated through a set of experiments to demonstrate the relative merits and capabilities of a proposed scheme
Similar to B ENCHMARKING OF C ELL T HROUGHPUT U SING P ROPORTIONAL F AIR S CHEDULER I N A S INGLE C ELL E NVIRONMENT (20)
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
B ENCHMARKING OF C ELL T HROUGHPUT U SING P ROPORTIONAL F AIR S CHEDULER I N A S INGLE C ELL E NVIRONMENT
1. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 2, April 2015
DOI : 10.5121/ijwmn.2015.7206 67
BENCHMARKING OF CELL THROUGHPUT
USING PROPORTIONAL FAIR SCHEDULER IN A
SINGLE CELL ENVIRONMENT
1
Ramprasad Subramanian, 1
Roshanak Heidari, 1
Kumbesan Sandrasegaran, 2
AMA
Dhanraj and 2
Karthik S
1
School of Computing and Communications, Faculty of Engineering and Information
Technology, Centre for Real Time Information Networks, University of Technology
Sydney, Sydney, Australia.
2
Freelance Telecom Engineers
Abstract
The proportional fair (PF) scheduling algorithm compromises between cell throughput and fairness. Many
research findings have been published by various researchers about PF algorithm based on mathematical
model and simulations. In this paper we have taken the practical route to analyse the algorithm based on
three types of subscription. In this benchmarking study, the user subscriptions are differentiated as Gold,
Silver and Bronze schemes and they are provisioned with certain throughputs. Apart from subscriptions
plans, the channel condition also plays a major role in determining the throughput. So in order to ensure
fairness among different subscriptions even in the bad channel conditions and to deliver the provisioned
throughputs certain priorities are attached with the subscriptions. As per the subscription plans Gold
subscribers are assigned with 50% of the speed offered by the network as maximum based on CAT3 speed
(100 Mbps in DL and 50 Mbps in UL), Silver is assigned with 25% of the max speed and Bronze is
assigned with 12% of the max speed. The priorities assigned to subscribers determines the fairness in the
unfavourable channel conditions - Bronze (high), Silver and Gold (medium). In this paper, an
benchmarking tests have been performed with all of three types of subscribers for nearly two hours in the
live single cell network without any heterogeneous cells influencing it. Furthermore, the results are
compared with the simulation results.
Keywords
LTE; Proportional Fair (PF); Scheduling; Benchmarking; Single Cell; Throughput Analysis
1. Introduction
LTE system is evolved from the earlier 3GPP system known as Universal Mobile
Telecommunication System (UMTS), which in turn was evolved from Global System for Mobile
Communication (GSM). In 2004, 3GPP started the work on LTE. The main aim was to deliver
high data rates with low latency. In the new architecture, the Circuit Switched (CS) core network
was replaced by Packet Switched (PS) core network to takes care of voice and data traffic unlike
its predecessor - UMTS, wherein the voice traffic is handled by CS core and data traffic is
handled by PS core. Originally, the conceived theoretical value that was planned to achieve in
2. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 2, April 2015
68
LTE in peak with the data rate of 100 Mbps in the downlink and 50 Mbps in the uplink. But when
the LTE network was introduced the peak data achieved was 300 Mbps in downlink and 75 Mbps
in the uplink. In LTE, the communication is available in different frequency bands, of different
sizes. Furthermore, the LTE uses both paired and un-paired bands for the communication. In the
paired band, the same frequency is used in both the uplink and downlink, whereas in the unpaired
band, the uplink and downlink communications uses different frequency bands. In LTE downlink
transmissions, frame length of 10 ms is used and grouped by radio transmission. That is, each
radio frame is created from 10 subframes of 1ms duration. Therefore both the uplink and
downlink uses 10 subframes. Thereafter, the subframes are divided into two slots with the
duration of 0.5 ms for each part.
Traditionally telecommunication networks provides voice and data services with voice being the
dominant but in recent times this usage pattern has been changed, the data usage has overtaken
the voice. The growth in ubiquitous data service is fuelled by the rapid growth in internet and new
services such as LTE/LTE-A are designed to support various high data rate services. To
accommodate these requirements, the 3GPP cellular systems has evolved from circuit switches to
IP enabled packet switches. The present day network architecture like LTE/LTE-A has evolved to
a flat IP architecture to support the growing demand of the data hungry applications which is
aptly supported by smart phones. So to provide high speed data services and better throughput,
packet schedulers plays a major role. In the evolved architecture like LTE, packet scheduler plays
an important role in the resource management. Several researches have proved that scheduling
policy plays a very vital role that affects the system performance parameters such as throughput,
delay, fairness and loss rate in wire line and wireless domains [2]. The major difference between
the wire line and wireless environment is the time varying and location dependent feature of
channel fading. Channel fading is one of the major phenomenon that needs to be considered when
analysing issues related with throughput, delay, fairness and loss rate. But these are non-existent
issue in wire line environment.
Most of the research studies in wireless packet scheduling use two states of the channel (the
channel between the base station (BS) and the UE) conditions - the channel condition is assumed
to be good or bad [3][4]. The packet transmission is always successful in good channel condition
but whereas in bad channel condition the packet transmission always fails because of highly
erroneous in nature. The performance of the schedulers is always compared with the reference
model that describes the service status for each session in an error free environment. Some
session falls short to the reference model and other might overwhelm the reference model.
However, the discussed two state of the channel model for the schedulers are the weak points in
the schedulers study. Since, the two states prescribe only two channel conditions, but reality the
channel condition vary rapidly and to know the conditions BS requires the fast feedback from the
UE on the channel condition but this comes with the prise of increasing signalling traffic. The IS-
856 standard (also known as high data rate (HDR) of QUALCOMM) proposes as an architecture
that proposes to increase the better throughput with the aid of increasing the signalling overhead
[5]. Several researchers have proposed several algorithms based on this [6][7][8][9][10].
Hereafter the terms UE and mobile terminals will be used interchangeably.
The schedulers that exploit the time varying channel conditions are considered in this paper. In
an ideal condition the maximum throughout can be achieved but the fairness is compromised.
Hence, a trade-off should be worked out between the throughput and fairness. One of the
regularly used fairness scheme is max-min fairness, which maximises the minimum rate of the
3. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 2, April 2015
69
session based on the link capacity constraint. The fairness of this algorithm is questioned and
therefore the PF scheduler was introduced in [1] which provides better fairness. In [11], the
mathematically model for the PF scheduler algorithm is introduced. In this paper, field testing and
benchmarking of PF scheduler algorithm is made. The test was conducted with varying
subscription. The subscription ranges from Gold, Silver and Brown. Gold subscription is
designed to receive 50% of the speed offered by the network as a max based on CAT3 speed (100
Mbps in DL and 50 Mbps in UL), Silver follows the next with 25% of the max speed and while
the Bronze with least will get around 12% of the max speed.
2. System model
A. System and Channel
In the system model, it is considered that the downlink channel of a single cell wireless access
network is applied, where N mobile terminals are serviced by N terminals. The downlink of PF is
very much similar to IS-856 system where a single broadband channel is shared by all the mobile
terminals present in the cell. The BS uses the pilot signal at the specified time slot is received by
all the UEs present in the cell and the feedback on the channel condition and transmission rate is
constantly fed to the system. Based on the received information from UE, the BS decides to
serve the next UE. As per the scheduler, the BS transmits packets with the full power. As
specified in [12], the transmitting power at the BS can be specified as Pt , the power received at
the mobile is given by ܲ = |ℎ|ଶ
ܲ௧ , where ℎ is the channel gain. The combination of
various factors such as scattering, absorption, shadowing and multipath effect contributes to the
channel gain. The channel gain between BS and the user ݇ can be written as:
ℎ = ඥܿ݀
ିఈ
ܵ ݉ (1)
In equation (1), ܿ is constant and it in-corporates the transmitting and receiving antenna gains,
݀ denotes the physical spacing between the BS and user ݇, ߙ denotes path loss ( this is
considered to be around 4.0 in the urban environment [11]), ܵ represents the shadowing effect,
݉ is the sum of the multipath components. The shadowing effect follows the log-normal
distribution with zero-mean and variance ߪ௦
ଶ
which is represented in decibels in the log scale. The
multipath fading is modelled in second order chi-square or exponential random variable with
mean 1.0, which represents the Rayleigh fading channel. Since we have considered the scenario
of single cell, the intercell interference is not considered. Therefore, the SNR of user ݇ can be
represented as ܼ =
ܲ
ܲ
ൗ , where ܲ is the background noise power that includes thermal noise
and other Gaussian interferences. In [11], the median SNR at the cell edge ߩ represents the noise
level of the wireless environment that is defined. ߩ = ܿܦିఈ
ܲ௧/ܲ, and in this ܦ can be specified
as the radius of the cell, the average SNR of the user ݇ as ܼ = ߩ(
ௗೖ
)ߙܵ. The signal level
follows the exponential distribution, and the noise power is constant. The SNR is also modelled
by exponential random variable.
B. PF Scheduler
Many studies in the area of PF in the past have considered two states of channel model with the
assumption that the transmission rate is fixed regardless of the channel state. With the bandwidth
4. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 2, April 2015
70
scarcity, cell throughput forms an important indicator to evaluate the wireless channel and this
forms an important metric to evaluate the scheduling algorithms. With the given channel gain for
each user, the base station (BS) serves the user ݇ first, whose magnitude of the channel gain is
larger than other users. The PF schedulers is designed in such a way that it allocates a
considerable portion of time slots to each subscribers while giving preference to the subscribers in
good channel state. In the studied case, the subscribers are broadly classified as Gold, Silver and
Bronze. Based on the subscription and tariff, the subscribers are classified as above. The
exponential moving average tracks the average throughput of each user. The channel state is sent
as the feedback by each user at the beginning of the every time slot. The feasible rate to the
average throughput is calculated for each user by BS which forms a key selection criterion, in
turn, it forms the basis of the preference metric and based on this preference metric, the
transmission for forthcoming timeslots will be decided. Figure 1 illustrates the Fairness between
the mobiles based on the channel condition. This can defined as the following. The possible user
rate for the user ݇ in the time slot ݊ is ܴ [݊], the moving average can be denoted as ܴ
෪ [݊].
Then, user ݇∗
= arg ݉ܽݔ ܴ[݊]/ ܴ
෪ [݊] is served in ݊ time slots, and throughput for each user
can be updated as below
ܴ
෪ [݊ + 1] = ቐ
ቀ1 −
ଵ
௧
ቁ ܴ
෪ [݊] +
ଵ
௧ோೖ
[݊], ݇ = ݇∗
ቀ1 −
ଵ
௧
ቁ ܴ
෪ [݊], ݇ ≠ ݇∗
(2)
Figure 1. Illustration of Fairness deficiency
In the above equation (2), ݐ represents a time constant for the moving average. From the above
equation, it could sum up that PF scheduling affects the relative preferences with the good
channels rather than absolute preference. In the wireless environment where the fading has the
greatest impact on the channel state and fluctuates in a random manner and when the number of
users are small and if all the users are in the bad channel state, then the throughput will be very
low regardless of whoever is scheduled. On the other hand when the number of users is high,
there are very high probability that some users can be in a very good channel state. Therefore, the
cell throughout gain can be increased by scheduling them first to utilize the fast-fading
characteristics. However, the advantage of the multiuser diversity cannot be realised in round
5. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 2, April 2015
71
robin (RR) scheduling. In RR scheduling, the scheduling order is determined well in advance. In
this scheduling, each user is given equal amount of time. Based on the channel state, the
transmitting rate can be adjusted in RR but the order of service cannot be adjusted. The other
schedulers such as IWFQ, C-IFQ, SBFA and WFS select the users based on the channel condition
although they have very less information on the channel state. These scheduler delays the service
to the users in bad channel state temporarily and schedules the lagging users. As a result, the
users can experience frequent packet drops and the lesser throughput when compared with the
opportunistic scheduler like PF.
In majority of the real time conditions PF is implemented because of the simplicity. PF scheduler
requires per flow queuing which is common to the scheduling algorithms. In core networks, there
would be huge amount of per flow queues which creates a huge burden in the core network. Apart
from this, PF also requires the channel state information from each user. To do so, BS transmits
the broadcast pilot symbol periodically, and the collects the channel state information from each
user regularly. Moreover, additional control channel is required to provide the feedback on the
channel state, but this depends on the number of users. As the users increases the cost of
implementing it also increases.
C. Cell throughput of the PF scheduler algorithm
The cell throughput of the PF scheduler algorithm is calculated as indicated in [11], and the
associated mathematical considerations are developed based on that paper. The average rate for
the user ݇ ൫ܴ
෪ [݊]൯ gets stable as the time goes by because the feasible rate process is stationary.
Therefore, the user ݇'s long term average can be written as
ܶ = lim→∞ ܴ
෪ [݊] (3)
= lim
→∞
ܧሼܴ [݊]ܫ[݊]ሽ (4)
= lim
→∞
ܧሼܴ ܫ = 1ሽ. ܧሼܫሽ is the expected feasible rate.
The preference metric for user ݇ can be written as Γ[݊] = ܼ[݊]/ܼ
෪[݊] at slot ݊. Since ܼ[݊]
does not depend on the time and by omitting the time index the previous equation can be written
as:
Γ[݊] = ܼ/ܼ
෪[݊] (5)
The maximum preference for all the users except ݇ can be denoted as Γି, where Γ > Γି and
hence its probability can be written as PrሼΓ > Γିሽ. The average throughput for a user for long
term can be written as:
ܶ = PrሼΓ > Γିሽ . ܧሼܴ /Γ > Γିሽ (6)
= ݎ
ோ෨
ௗ
ௗ
Prሼܴ ≤ ߁ ݀݊ܽ ݎ > ߁ିሽ ݀ݎ (7)
In the above equation ܴ෨ indicates the maximum feasible rate.
6. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 2, April 2015
72
= ݎ
ோ෨
ௗ
ௗ
Prሼ Γ ≤ ߫(߁ ݀݊ܽ)ݎ > ߁ିሽ ݀ ݎ (8)
After manipulation we obtain the following probability density function (PDF) for Γ denoted by
݂Γ(.)ݐ
ܶ = ߦ()ݐ
చ(∞)
చ()
݂Γ(ܨ)ݐି(ݐ݀)ݐ (9)
In our simulation the user is assumed to be static/stationary at one location. Hence in the
mathematical analysis produced above the multi user diversity is not taken into considerations.
The cell throughput that is derived above is based on the assumption that the user is
static/stationary and the shadowing effect is given. In the linear model, the feasibility rate is
linearly proportional to the SNR. So this means that the linear model is not accurate. Since the
SNR is linearly proportional to feasibility rate, this model can produce some un-reasonable high
data rates (HDRs) and gives rise to infinite throughput. On the other hand, in logarithmic model,
link adaptation is performed by the adaptive modulation schemes. Among the adaptive
modulation schemes, the M-level Quadrature amplitude (M-QAM) shows a good potential and
the value of M is set to two. Therefore, in a good channel condition the large M is used and in a
bad channel condition the small M is used. Hence, the transmission rate is related to SNR in
logarithmic manner as indicated in [14][15][16].
3. Test setup and results
The benchmarking tests were performed and compared with the simulation results in [11], in this
testing more practical approach were taken. The APN Aggregate Maximum Bit Rate (APN-
AMBR) applicable for EPS access is a Quality of Service (QoS) policing parameter that allows
the network to control the maximum rate of payload traffic received or transmitted on a PDN
connection. The Maximum Bit Rate (MBR) is the corresponding parameter applicable for GPRS
access. The CPG supports an APN-AMBR and MBR value between 4 kilobits per second (kbps)
and 256 megabits per second (Mbps) in both the uplink and downlink direction. Hence, max
downlink speed will be 256Mbps and not 300Mbps.For attaining this, there is a need to either
disable the policing or use two APNs of each 256Mbps max. Gold will get 50% of the speed
offered by the network as max based on CAT3 Speed (100 Mbps in DL and 50 Mbps in UL).
Silver will get 25% of the max speed and Bronze will get around 12% of the Max speed. This is
based on the subscription rent the subscribers pay to the operator for the service. But apart from
the subscription plans, the location of the subscriber and the radio channel also plays an equally
important role in deciding the throughput for the subscribers. For example, assuming that the
Gold subscriber travels to the cell edge, just because he has subscribed for the Gold service It is
not possible to negate the impact of the channel condition in the throughput and hence a trade-off
between the channel condition and subscription plan has to be made. The proportional fair is
based on the trade off between channel quality and average rate per user. In normal scenario, the
users at good channel condition and with higher CQI will be allocated good amount of capacity
while the users at the cell edge and with poor channel condition will be allocated fewer or no
resources in-order to maintain the system performance. However, in PF algorithm, a trade off
between system performance and user fairness is delivered to keep the customers in the cell edge
or in the bad radio environment satisfied. The following scenarios were tested by means of a
script in the test environment:
7. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 2, April 2015
73
Scenario 1: Gold , Silver and Bronze UEs are subjected to test by means of the FTP test
Scenario 2 : Gold and Bronze
Scenario 3 :Gold and Silver
Scenario 4 :Silver and Bronze
Scenario 5 : Gold only
Scenario 6 : Silver Only
Scenario 7 : Bronze only
Table 1 explains the various testing scenarios. Each scenarios are tested independently and also
with various combinations. Table 2 and Table 3 provides the details about the radio access
network (RAN) configurations made in the network exclusively for the benchmarking testing.
Table 4 to Table 7 provides the benchmarking results in the tabular format. Figure 2 provides
benchmarking results in the graphical form. The test results show that, when a Gold, Silver and
Bronze users are tested individually in the good channel conditions, the throughput achieved is
almost the same. Unlike, in the bad channel conditions different priority is set for different
subscription types. The Gold and Silver are set as medium priority, but the Bronze users are set as
high priority. Apart from the subscription type, the channel condition also plays a major part.
Since the Bronze users are with the minimum subscription, the channel condition will further
bring down the throughput rate. So that is why the Bronze users are set with high priority in bad
channel condition. TEMS Investigation, Sony Xperia smart phones capable of LTE, scripts for
testing various subscriptions and SIM Card configured with different ARP with Gold, Silver and
Bronze profiles in the HSS.
Table 1. Fairness testing scenarios
No Scenarios
1 Case1-Gold User
2 Case2-Gold User + Silver User
3 Case3-Gold User + Silver User +Bronze
4 Case4-Gold User + Bronze User
5 Case5-Silver User + Bronze User
6 Case6-Silver User
7 Case7-Bronze User
8. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 2, April 2015
74
Table 2. RAN configuration for the testing
Parameter Default Value Value
Downlink Aggregate MBR for the UE in the MME
10000000
kbps
Uplink Aggregate MBR for the UE in the MME
10000000
kbps
Downlink Aggregate MBR of an APN in the MME
10000000
kbps
Uplink Aggregate MBR of an APN in the MME
10000000
kbps
Highest allowed ARP priority level for a non-GBR bearer in the
MME
1
Allowed value of PCI for a non-GBR bearer in the MME yes
Allowed value of PVI for a non-GBR bearer in the MME no
MBR Downlink 256000 kbps
MBR Uplink 256000 kbps
GBR Downlink 256000 kbps
GBR Uplink 256000 kbps
Highest allowed ARP priority level for a GBR bearer in the MME 1
Allowed value of PCI for a GBR bearer in the MME yes
Allowed value of PVI for a GBR bearer in the MME no
Table 3. Network configuration for testing fairness
QCI Parameter Value Remarks
QCI6
Scheduling
algorithm 3 PFS_MEDIUM (GOLD)
QCI8
Scheduling
algorithm 3 PFS_MEDIUM (Silver)
QCI9
Scheduling
algorithm 2 PFS_HIGH (Bronze)
QCI6 DL Min bit rate 40000 Kbps
QCI8 DL Min bit rate 20000 Kbps
QCI9 DL Min bit rate 10000 Kbps
QCI6 Relative priority 57
Relative priority keeping 100% as the
max
QCI8 Relative priority 28
Relative priority keeping 100% as the
max
QCI9 Relative priority 15
Relative priority keeping 100% as the
max
9. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 2, April 2015
75
Table 4. LTE QOS Benchmark Result - Averages Values
Scenarios
LTE QOS Benchmark Result
Averages Values
Gold
User
Silver
User
Bronze
User
Case1-Gold User 27.75 - -
Case2-Gold User + Silver User 23.55 16.59 -
Case3-Gold User + Silver User +Bronze 24.48 14.96 7.76
Case4-Gold User + Bronze User 23.47 - 10.57
Case5-Silver User + Bronze User - 24.53 18.16
Case6-Silver User - 30.62 -
Case7-Bronze User - - 26.78
Table 5. QoS for Gold subscription
Scenarios
Gold
Test 1 Test 2 Test 3 Test 4 Test 5
Case1-Gold User 27.3 31.59 29.08 26.26 24.52
Case2-Gold User + Silver User 20.36 22.82 26.78 26.03 21.79
Case3-Gold User + Silver User +Bronze 21.42 26.87 25.28 24.99 23.87
Case4-Gold User + Bronze User 28.89 21.47 26.04 17.39 23.59
Case5-Silver User + Bronze User - - - - -
Case6-Silver User - - - - -
Case7-Bronze User - - - - -
Table 6. QoS for Silver subscription
Scenarios
Silver
Test 1 Test 2 Test 3 Test 4 Test 5
Case1-Gold User - - - - -
Case2-Gold User + Silver User 19.05 17.03 10.19 16.06 20.66
Case3-Gold User + Silver User +Bronze 16.11 16.27 14.24 14.05 14.14
Case4-Gold User + Bronze User - - - - -
Case5-Silver User + Bronze User 26.51 24.95 22.8 22.32 26.08
Case6-Silver User 28.39 31.67 30.66 31.37 31.05
Case7-Bronze User - - - - -
10. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 2, April 2015
Table 7. QoS for Bronze subscription
Scenarios
Case1-Gold User
Case2-Gold User + Silver User
Case3-Gold User + Silver User +Bronze
Case4-Gold User + Bronze User
Case5-Silver User + Bronze User
Case6-Silver User
Case7-Bronze User
Figure 2. Benchmarking test results for different scenarios
The benchmarking environment of the cell radius considered is around 1 Km. The downlink
channel slot length is 1.67 ms. The BS transmission power is fixed at 10 W. The standard
deviation of the shadow fading is around 8 dB and path loss exponent is around 4
simulation results are derived for the cell throughput of the PF scheduler in the single cell
environment. The simulation results are not reproduced again in this paper.
results, when the number of subscribers increases
beginning, and then it stabilizes around 3bps/Hz without further increase.
can be observed in our benchmarking tests. In Figure 2, the Gold, Silver and Bronze subscribers
are tested in a good channel condition individually using separate scripts. In the benchmarking
result, the number of subscribers
a live network site, it is assumed that there will be
the network. This assumption satisfies the condition based on which the simulation in [11] was
carried out. The standard deviation and the median SNR show
witness in the benchmarking tests. The var
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 2, April 2015
Table 7. QoS for Bronze subscription
Bronze
Test 1 Test 2 Test 3 Test 4
- - -
Gold User + Silver User - - -
Gold User + Silver User +Bronze 8.27 7.67 7.32 8.07
Gold User + Bronze User 6.17 7.71 6.53 13.34
Silver User + Bronze User 17.71 18.41 18.45 20.7
- - -
26.72 30.7 15.32 30.17
Figure 2. Benchmarking test results for different scenarios (Subscription plan Vs Throughput
environment of the cell radius considered is around 1 Km. The downlink
channel slot length is 1.67 ms. The BS transmission power is fixed at 10 W. The standard
deviation of the shadow fading is around 8 dB and path loss exponent is around 4db
for the cell throughput of the PF scheduler in the single cell
environment. The simulation results are not reproduced again in this paper. As per the simulation
results, when the number of subscribers increases the overall system throughput increases in
and then it stabilizes around 3bps/Hz without further increase. The same behaviour
can be observed in our benchmarking tests. In Figure 2, the Gold, Silver and Bronze subscribers
od channel condition individually using separate scripts. In the benchmarking
the number of subscribers is not shown explicitly as in simulation. Since it is carried out in
it is assumed that there will be lot of subscribers trying to access
. This assumption satisfies the condition based on which the simulation in [11] was
iation and the median SNR show the increased throughput as
in the benchmarking tests. The various scenarios reported in the graph in Figure 2 show
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 2, April 2015
76
Test 4 Test 5
- -
- -
8.07 7.51
13.34 19.14
20.7 15.55
- -
30.17 31
Throughput)
environment of the cell radius considered is around 1 Km. The downlink
channel slot length is 1.67 ms. The BS transmission power is fixed at 10 W. The standard
db. In [11], the
for the cell throughput of the PF scheduler in the single cell
As per the simulation
the overall system throughput increases in the
The same behaviour
can be observed in our benchmarking tests. In Figure 2, the Gold, Silver and Bronze subscribers
od channel condition individually using separate scripts. In the benchmarking
not shown explicitly as in simulation. Since it is carried out in
ying to access the data from
. This assumption satisfies the condition based on which the simulation in [11] was
the increased throughput as a
d in the graph in Figure 2 show
11. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 2, April 2015
77
that the different subscription in the bad channel condition with various priorities like high and
medium that enables the subscribers from achieving different levels of throughput as per the
subscriptions. So on the whole, the benchmarking test results confirm the result obtained in [11]
by simulations. The PF scheduler is compared with other competing schedulers proposed in [5][6]
to maximize the average throughput by satisfying the QoS constrains. In [6], each users requires a
certain amount of time slots reserved to be served and in [5] the normalized throughput of the
user is equalized and priori weight is allocated based on the users channel condition and QoS
requirement.
4. CONCLUSION
In traditional wireless networks, fairness was not considered because the cellular channels are
assigned based on pre-reservation strategies, whereas in modern wireless technologies like in 4G
technology, the reservation based allocation will not serve the purpose of the subscribers and the
network operators. These new technologies seriously consider fairness and user throughput as one
of the major requirement. Hence, several scheduling algorithms have been put forth by many
researchers to achieve this feat. Among them, PF scheduling algorithm is a very popular one,
since it offers various degree of flexibility for the operators to serve the people based on the
location, channel environment, service subscription so on so forth. Among this, channel condition
plays a vital role in user throughput and PF offers this required balancing.
The PF scheduler is analysed, and then the mathematical expression for the cell throughput has
been re-produced for the readers convenience based on [11]. In this analysis, the authors have
adopted a slightly modified metric. This approach supports the relationship between the
transmission rate and SNR. The authors have also verified the accuracy of the mathematical
expressions derived with the simulation results. In this paper, more practical approach has been
taken and performed the benchmarking tests and analysed the performance of the PF. The users
were classified as Gold, Silver and Bronze based on the service subscription. Combination of
various scenarios has been tested as specified in Table 1. The outcomes of the benchmarking tests
were compared with [11] and the throughput levels obtained for various scenarios are found
almost the same. Since the benchmarking tests in this paper was carried in a live network, the
factors affecting the throughput were not considered separately as in [11], it is assumed that all
the factors affecting the throughput will be at play in practical environment.
Reference:
[1]. F. Kelly, “Charging and rate control for elastic traffic,” Eur. Trans.Telecommun., vol. 8, no. 1, pp.
33–37, Jan. 1997. S. Liu and V. Bharghavan, “Fair scheduling in wireless packet networks,
IEEE/ACM Trans. Netw., vol. 7, no. 4, pp. 473–489, Aug. 1999.
[2]. A. K. Parekh and R. G. Gallager, “A generalized processor sharing approach to flow control in
integrated services networks: The single-node case, IEEE/ACM Trans. Netw., vol. 1, no. 3, pp. 344–
357, Jun. 1993.
[3]. T. S. E. Ng, I. Stoica, and H. Zhang, “Packet fair queuing algorithms for wireless networks with
location-dependent errors,” in Proc. IEEE INFOCOM, San Francisco, CA, 1998, pp. 1103–1111.
[4]. A. Jalali, R. Padovani, and R. Pankaj, “Data throughput of CDMA-HDR a high efficiency-high data
rate personal communication wireless system, in Proc. IEEE VTC, Tokyo, Japan, 2000, pp. 1854–
1858.
[5]. S. Borst and P. Whiting, “Dynamic rate control algorithms for HDR throughput optimization,” in
Proc. IEEE INFOCOM, Anchorage, AK, 2001, pp. 976–985.
12. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 2, April 2015
78
[6]. X. Liu, E. K. P. Chong, and N. B. Shroff, “Opportunistic transmission scheduling with resource-
sharing constraints in wireless networks,” IEEE J. Sel. Areas Commun., vol. 19, no. 10, pp. 2053–
2064, Oct. 2001.
[7]. “A framework for opportunistic scheduling in wireless networks, Comput. Netw., vol. 41, no. 4, pp.
451–474, Mar. 2003.
[8]. Y. Liu and E. Knightly, “Opportunistic fair scheduling over multiple wireless channels, in Proc. IEEE
INFOCOM, San Francisco, CA, 2003, pp. 1106–1115.
[9]. X. Qin and R. Berry, “Exploiting multiuser diversity for medium access control in wireless
networks,” in Proc. IEEE INFOCOM, San Francisco, CA, 2003, pp. 1084–1094.
[10]. P. Viswanath, D. N. C. Tse, and R. Laroia, “Opportunistic beamforming using dumb antennas,” IEEE
Trans. Inf. Theory, vol. 48, no. 6, pp. 1277–1294, Jun. 2002.
[11]. Jin-Ghoo Choi and Saewoon Bhak, "Cell-Throughput Analysis of the Proportional Fair Scheduler in
the Single-Cell Environments", IEEE Transaction on Vehicular Technology.,vol.56,no.2, pp. 766-
778, March.2007.
[12]. L. Massoulié and J. Roberts, “Bandwidth sharing: Objectives and algorithms", IEEE/ACM Trans.
Netw., vol. 10, no. 3, pp. 320–328, Jun. 2002.
[13]. J. M. Holtzman, “Asymptotic analysis of proportional fair algorithm,” in Proc. IEEE PIMRC, San
Diego, CA, 2001, pp. 33–37.
[14]. H. J. Kushner and P. A. Whiting, “Convergence of proportional-fair sharing algorithms under general
conditions,” IEEE Trans.Wireless Commun., vol. 3, no. 4, pp. 1250–1259, Jul. 2004.
[15]. S. Catreux, P. F. Driessen, and L. J. Greenstein, “Data throughputs using multiple-input multiple-
output (MIMO) techniques in a noiselimited cellular environment,” IEEE Trans. Wireless Commun.,
vol. 1, no. 2, pp. 226–234, Apr. 2002.
[16]. A. J. Goldsmith and S.-G. Chua, “Variable-rate variable-power MQAM for fading channels,” IEEE
Trans. Commun., vol. 45, no. 10, pp. 1218– 1230, Oct. 1997.
Author Biographies:
Ramprasad Subramanian is an experienced telecom engineer in the field of 2G/3G and LTE/LTE-A. He
holds M.S (By research) in Information and Communication from Institute of Remote Sensing, Anna
University (India)(2007) and Bachelors of Engineering in Electronics and Communication engineering
from Bharathidasan University (2001)(India). He has done many projects in the area of 2G/3G and LTE.
He has done many consultative projects across Africas/Americas/Asia etc. He was the recipient of India's
best invention award for the year 2004 from Indian Institute of Management Ahmadabad and Government
of India. His current research focuses on 4G mobile networks and vehicular Ad hoc networks.
Roshanak Heidari is PHD student at UTS in Centre for Real-Time Information Networks (CRIN). She
holds a Master's of Science in Electrical Engineering from Islamic Azad University, Science and Research
Branch(Iran)(2007), and a Bachelor of Science Degree in Electrical Engineering ,from Tabriz University
(2004). Her current research work focuses on Optimization for Resource Allocation with Constraints in
Wireless Networks.
Dr Kumbesan Sandrasegaran is an Associate Professor at UTS and Centre for Real-Time Information
Networks (CRIN). He holds a PhD in Electrical Engineering from McGill University (Canada)(1994), a
Master of Science Degree in Telecommunication Engineering from Essex University (1988) and a Bachelor
of Science (Honours) Degree in Electrical Engineering (First Class) (1985). His current research work
focuses on two main areas (a) radio resource management in mobile networks, (b) engineering of remote
monitoring systems for novel applications with industry through the use of embedded systems, sensors and
communications systems. He has published over 100 refereed publications and 20 consultancy reports
spanning telecommunication and computing systems.
AMA Dhanraj brings in expertise in telecom domain over 13 years in various cross domains across
telecom and different access technologies and holds a Bachelor of Engineering in Electronics and
13. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 2, April 2015
79
communication from the University of Madras - India (2001), has contributed to the success of projects in
GSM,WCDMA and LTE as a consultant in Asia/Africa/Middle east, he is currently specializing in
LTE/LTE-A and focus on solution development based on RAN products.
Karthik S is engineer turned Project Manager bringing in rich experience of his technical expertise into
Project Management, Holds a Bachelor of Engineering in Electronics and communication from the
Bharathidasan University- India(2000) and MBA in Information technology from Symbiosis(Dubai), has
delivered over past 14 years various support related activities in Asia-Pacific/Africa/Europe and PMP
certified which he uses his skills to the fullest for effective Project Management contributing to the bottom
line of the organization, Pursuing PGMP currently.