In IEEE 802.16j relay networks, wireless communications are carried out based on TDMA where the wireless network resources are divided into multiple time slots and they are assigned to wireless links between relay nodes as transmission opportunities. The network performance is improved by decreasing the total number of different time slots assigned to all links in a single scheduling cycle, because it brings the increase in the transmission opportunities of the links per unit time. Although it can be achieved when multiple links utilize the same time slot, the capacity of such links is degraded due to the radio interference. On the other hand, since all links in the network need to have enough time slots to accommodate their traffic load, degrading the link capacity may increase the total number of different time slots in the scheduling cycle. Therefore, we should determine the time slot assignment by considering the above-mentioned tradeoff relationship. In this paper, we propose heuristic algorithms for time slot assignment problem in IEEE 802.16j relay networks, and evaluate them through extensive simulation experiments. Two algorithms based on different heuristic are introduced. One algorithm assigns a set of time slots to links by a greedy approach. The other algorithm determines a set of links that use a time slot by a brute-force search for maximizing the total link capacity. Performance evaluation results exhibit that the proposed algorithms reduces around 34% and 39% of the total time slots compared with the case where no link utilizes the same time slot, respectively. Meanwhile, they also show that calculation time of the latter algorithm is longer than that of the former algorithm to reduce the total time slots. Thus, we show that there is a tradeoff between performance and calculation time.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Analysis of data transmission in wireless lan for 802.11 e2 eteSAT Journals
Abstract The aim of this paper is to investigate the transmission of data between client and server through different IEEE 802.11 wireless LAN multi- HOP network. To improve this issue, the transmission opportunity (TXOP) mechanism is defined in the IEEE 802.11e standard, with which a wireless node can transmit multiple frames consecutively for a maximum channel occupancy time, called TXOP limit. This paper considers the performance of the TXOP mechanism for multi-hop wireless networks. Focusing on a three-node chain topology, we model it as a tandem queuing network with two nodes. The E2ET is derived and the analysis is validated by simulation. Numerical results show that the TXOP mechanism works well for multi-hop wireless networks. It is also shown that adjusting TXOP limit is significantly important in order to increase the overall throughput. In terms of multi-hop wireless networks, there is little analytical work with regard to the E2ET performance. One of the rationales for the analytical difficulty for multi-hop wireless networks is that IEEE 802.11 MAC protocol is too complex to model the behavior of multi-hop frame transmissions. Keywords: IEEE 802.11e, multi-hop wireless LAN, TXOP, E2ET
Solving bandwidth guaranteed routing problem using routing dataIJCNCJournal
This paper introduces a traffic engineering routing algorithm that aims to accept as many routing demands
as possible on the condition that a certain amount of bandwidth resource is reserved for each accepted
demand. The novel idea is to select routes based on not only network states but also information derived
from routing data such as probabilities of the ingress egress pairs and usage frequencies of the links.
Experiments with respect to acceptance ratio and computation time have been conducted against various
test sets. Results indicate that the proposed algorithm has better performance than the existing popular algorithms including Minimum Interference Routing Algorithm (MIRA) and Random Race based Algorithm for Traffic Engineering (RRATE)
.
On the Tree Construction of Multi hop Wireless Mesh Networks with Evolutionar...CSCJournals
Abstract — in this paper, we study the structure of WiMAX mesh networks and the influence of tree’s structure on the performance of the network. From a given network’s graph, we search for trees, which fulfill some network, QoS requirements. Since the searching space is very huge, we use genetic algorithm in order to find solution in acceptable time. We use NetKey representation which is an unbiased representation with high locality, and due to high locality we expect standard genetic operators like n-point cross over and mutation work properly and there is no need for problem specific operators. This encoding belongs to class of weighted encoding family. In contrast to other representation such as characteristics vector encoding which can only indicate whether a link is established or not, weighted encodings use weights for genotype and can thus encode the importance of links. Moreover, by using proper fitness function we can search for any desired QOS constraint in the network.
A New Approach to Improve the Efficiency of Distributed Scheduling in IEEE 80...IDES Editor
The recent standard for broadband wireless
access networks, IEEE 802.16, which resulted in the
development of metropolitan area wireless networks,
includes two network organization modes: Point to Multi
Point and Mesh. The mesh mode provides distributed
channel access operations of peering nodes and uses TDMA
technique for channel access modulation. According to
IEEE 802.16 MAC protocol, there are two scheduling
algorithms for assigning TDMA slots to each network node:
centralized and distributed. In distributed scheduling
algorithm, network nodes have to transmit scheduling
message in order to inform other nodes about their transfer
schedule. In this paper a new approach is proposed to
improve distributed scheduling efficiency in IEEE 802.16
mesh mode, with respect to network condition in every
transferring opportunity. For evaluating the proposed
algorithm efficiency, several extensive simulations are
performed in various network configurations and the most
important system parameters which affect the network
performance are analyzed.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Analysis of data transmission in wireless lan for 802.11 e2 eteSAT Journals
Abstract The aim of this paper is to investigate the transmission of data between client and server through different IEEE 802.11 wireless LAN multi- HOP network. To improve this issue, the transmission opportunity (TXOP) mechanism is defined in the IEEE 802.11e standard, with which a wireless node can transmit multiple frames consecutively for a maximum channel occupancy time, called TXOP limit. This paper considers the performance of the TXOP mechanism for multi-hop wireless networks. Focusing on a three-node chain topology, we model it as a tandem queuing network with two nodes. The E2ET is derived and the analysis is validated by simulation. Numerical results show that the TXOP mechanism works well for multi-hop wireless networks. It is also shown that adjusting TXOP limit is significantly important in order to increase the overall throughput. In terms of multi-hop wireless networks, there is little analytical work with regard to the E2ET performance. One of the rationales for the analytical difficulty for multi-hop wireless networks is that IEEE 802.11 MAC protocol is too complex to model the behavior of multi-hop frame transmissions. Keywords: IEEE 802.11e, multi-hop wireless LAN, TXOP, E2ET
Solving bandwidth guaranteed routing problem using routing dataIJCNCJournal
This paper introduces a traffic engineering routing algorithm that aims to accept as many routing demands
as possible on the condition that a certain amount of bandwidth resource is reserved for each accepted
demand. The novel idea is to select routes based on not only network states but also information derived
from routing data such as probabilities of the ingress egress pairs and usage frequencies of the links.
Experiments with respect to acceptance ratio and computation time have been conducted against various
test sets. Results indicate that the proposed algorithm has better performance than the existing popular algorithms including Minimum Interference Routing Algorithm (MIRA) and Random Race based Algorithm for Traffic Engineering (RRATE)
.
On the Tree Construction of Multi hop Wireless Mesh Networks with Evolutionar...CSCJournals
Abstract — in this paper, we study the structure of WiMAX mesh networks and the influence of tree’s structure on the performance of the network. From a given network’s graph, we search for trees, which fulfill some network, QoS requirements. Since the searching space is very huge, we use genetic algorithm in order to find solution in acceptable time. We use NetKey representation which is an unbiased representation with high locality, and due to high locality we expect standard genetic operators like n-point cross over and mutation work properly and there is no need for problem specific operators. This encoding belongs to class of weighted encoding family. In contrast to other representation such as characteristics vector encoding which can only indicate whether a link is established or not, weighted encodings use weights for genotype and can thus encode the importance of links. Moreover, by using proper fitness function we can search for any desired QOS constraint in the network.
A New Approach to Improve the Efficiency of Distributed Scheduling in IEEE 80...IDES Editor
The recent standard for broadband wireless
access networks, IEEE 802.16, which resulted in the
development of metropolitan area wireless networks,
includes two network organization modes: Point to Multi
Point and Mesh. The mesh mode provides distributed
channel access operations of peering nodes and uses TDMA
technique for channel access modulation. According to
IEEE 802.16 MAC protocol, there are two scheduling
algorithms for assigning TDMA slots to each network node:
centralized and distributed. In distributed scheduling
algorithm, network nodes have to transmit scheduling
message in order to inform other nodes about their transfer
schedule. In this paper a new approach is proposed to
improve distributed scheduling efficiency in IEEE 802.16
mesh mode, with respect to network condition in every
transferring opportunity. For evaluating the proposed
algorithm efficiency, several extensive simulations are
performed in various network configurations and the most
important system parameters which affect the network
performance are analyzed.
Traffic engineering is one of the major issues that has to be addressed in Metro Ethernet networks for quality of service and efficient resource utilization. This paper aims at understanding the relevant issues and outlines novel algorithms for multipoint traffic engineering in Metro Ethernet. We present an algorithmic solution for traffic engineering in Metro Ethernet using optimal multiple spanning trees. This iterative approach distributes traffic across the network uniformly without overloading network resources. We also introduce a new traffic specification model for Metro Ethernet, which is a hybrid of two widely used traffic specification models, the pipe and hose models.
Energy efficient neighbour selection for flat wireless sensor networkscsandit
In this paper we have analyzed energy efficient neighbour selection algorithms for routing in
wireless sensor networks. Since energy saving or consumption is an important aspect of
wireless sensor networks, its precise usage is highly desirable both for the faithful performance
of network and to increase the network life time. For this work, we have considered a flat
network topology where every node has the same responsibility and capability. We have
compared two energy efficient algorithms and analyzed their performances with increase in
number of nodes, time rounds and node failures.
FAULT-TOLERANT MULTIPATH ROUTING SCHEME FOR ENERGY EFFICIENT WIRELESS SENSOR ...ijwmn
Themain challengein wireless sensor network is to improve the fault tolerance of each
node and also provide an energy efficient fast data routing service. In this paper we propose an
energyefficient node fault diagnosis and recovery for wireless sensor networks referred as fault tolerant
multipath routing scheme for energy efficientwireless sensor network (FTMRS).The FTMRSis based on
multipath data routing scheme. One shortest path is use for main data routing in FTMRS technique and
other two backup paths are used as alternative path for faulty network and to handle the overloaded
traffic on main channel.Shortest path data routing ensures energy efficient data routing. The
performance analysis of FTMRSshows better results compared to other popular fault tolerant techniques
in wireless sensor networks.
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACEScscpconf
Opportunistic networks are usually formed spontaneously by mobile devices equipped with
short range wireless communication interfaces. The idea is that an end-to-end connection may
never be present. Designing and implementing a routing protocol to support both service
discovery and delivery in such kinds of networks is a challenging problem on account of
frequent disconnections and topology changes. In these networks one of the most important
issues relies on the selection of the best intermediate node to forward the messages towards the
destination. This paper presents a mobile trace based routing protocol that uses the location
information of the nodes in the network. Using the trace information, next hop is selected to forward the packets to destination. Data forwarding is done via the selected nodes. The effectiveness is shown using simulation
Wireless Mesh Network rose as a promising innovation for providing quick and productive communication for which numerous algorithms have been proposed in networking infrastructure. For routing there are various performance parameters such as throughput, network congestion, resiliency, fairness, robustness, network jitter, delay, stability, optimality, simplicity, completeness etc. Robustness provides the capability to deal with all the failures that come across during the connection in the network to increase the network performance. In this paper we have studied and analyzed three algorithms namely on robustness parameter Resilient multicasting [2], Resilient Opportunistic Mesh Routing for Wireless Mesh Network (ROMER) [3], and Buffer Based Routing (BBR) [4], in Wireless Mesh Networks. Analysis through various parameters such as network congestion, network throughput and resiliency [5], shows network performance of BBR is better.
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3ijwmn
This paper presents the design procedure of the NS-3 script for WLAN that is organized according to the hierarchical manner of TCP/IP model. We configure all layers by using NS-3 model objects and set and modify the values used by objects to investigate the effects of MAC parameters (access mechanism, CWmin, CWmax and retry limit) on the performance metrics viz. packet delivery ratio, packet lost ratio, aggregated throughput, and average delay. The simulation results show that RTS/CTS access mechanism outperforms basic access mechanism in saturated state, whereas the MAC parameters have no significant impact on network performance in non-saturated state. A higher value of CWmin improves the aggregated throughput in expense of average delay. The tradeoff relationships among the performance metrics are also observed in results for the optimal values of MAC parameters. Our design procedure represents a good guideline for new NS-3 users to design and modify script and results greatly benefit the network design and management.
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2csandit
In layered networks, reliability is a major concern
as link failures at lower layer will have a
great impact on network reliability. Failure at a l
ower layer may lead to multiple failures at the
upper layers which deteriorate the network performa
nce. In this paper, the scenario of such a
layered wireless sensor network is considered for A
d hoc On-Demand Distance Vector (AODV)
and Multi Commodity Flow (MCF) routing protocols. M
CF is
developed using
polynomial time
approximation algorithms for the failure polynomial
. Both protocols are compared in terms of
different network parameters such as throughput, pa
cket loss and end to end delay. It was
shown that the network reliability is better when M
CF protocol is used. It was also shown that
maximizing the min cut of the layered network maxim
izes reliability in the terms of successful
packet transmission of network. Thetwo routing prot
ocolsare implemented in the scenario of
discrete network event simulator NS-2.
SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...IJCNCJournal
One of the main challenges for researchers to build routing protocols is how to use energy efficiently to extend the lifespan of the whole wireless sensor networks (WSN) because sensor nodes have limited battery power resources. In this work, we propose a Sector Tree-Based clustering routing protocol (STB-EE) for Energy Efficiency to cope with this problem, where the entire network area is partitioned into dynamic sectors (clusters), which balance the number of alive nodes. The nodes in each sector only communicate with their nearest neighbour by constructing a minimum tree based on the Kruskal algorithm and using mixed distance from candidate node to base station (BS) and remaining energy of candidate nodes to determine which node will become the cluster head (CH) in each cluster? By calculating the duration of time in each round for suitability, STB-EE increases the number of data packets sent to the BS. Our simulation results show that the network lifespan using STB-EE can be improved by about 16% and 10% in comparison to power-efficient gathering in sensor information system (PEGASIS) and energy-efficient PEGASIS-based protocol (IEEPB), respectively.
ENHANCEMENT OF OPTIMIZED LINKED STATE ROUTING PROTOCOL FOR ENERGY CONSERVATIONcscpconf
Mobile Ad-hoc network (MANET) is infrastructure less network in which nodes are mobile, self
reconfigurable, battery powered. As nodes in MANET are battery powered, energy saving is an
important issue. We are using routing protocol to save energy so as to extend network lifetime.
We have extended original Optimized Linked State Routing (OLSR) protocol by using two
algorithms and named it as Enhancement in OLSR using Residual Energy approach (EOLSRRE)
and Enhancement in OLSR using Energy Consumption approach (EOLSR-EC). To analyze
relative performance of modified protocol EOLSR-RE and EOLSR-EC over OLSR, we
performed various trials using Qualnet simulator. The performance of these routing protocols is
analyzed in terms of energy consumption, control overheads, end to end delay, packet delivery
ratio. The modified OLSR protocol improves energy efficiency of network by reducing 20 %
energy consumption and 50% control overheads.
Traffic engineering is one of the major issues that has to be addressed in Metro Ethernet networks for quality of service and efficient resource utilization. This paper aims at understanding the relevant issues and outlines novel algorithms for multipoint traffic engineering in Metro Ethernet. We present an algorithmic solution for traffic engineering in Metro Ethernet using optimal multiple spanning trees. This iterative approach distributes traffic across the network uniformly without overloading network resources. We also introduce a new traffic specification model for Metro Ethernet, which is a hybrid of two widely used traffic specification models, the pipe and hose models.
Energy efficient neighbour selection for flat wireless sensor networkscsandit
In this paper we have analyzed energy efficient neighbour selection algorithms for routing in
wireless sensor networks. Since energy saving or consumption is an important aspect of
wireless sensor networks, its precise usage is highly desirable both for the faithful performance
of network and to increase the network life time. For this work, we have considered a flat
network topology where every node has the same responsibility and capability. We have
compared two energy efficient algorithms and analyzed their performances with increase in
number of nodes, time rounds and node failures.
FAULT-TOLERANT MULTIPATH ROUTING SCHEME FOR ENERGY EFFICIENT WIRELESS SENSOR ...ijwmn
Themain challengein wireless sensor network is to improve the fault tolerance of each
node and also provide an energy efficient fast data routing service. In this paper we propose an
energyefficient node fault diagnosis and recovery for wireless sensor networks referred as fault tolerant
multipath routing scheme for energy efficientwireless sensor network (FTMRS).The FTMRSis based on
multipath data routing scheme. One shortest path is use for main data routing in FTMRS technique and
other two backup paths are used as alternative path for faulty network and to handle the overloaded
traffic on main channel.Shortest path data routing ensures energy efficient data routing. The
performance analysis of FTMRSshows better results compared to other popular fault tolerant techniques
in wireless sensor networks.
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACEScscpconf
Opportunistic networks are usually formed spontaneously by mobile devices equipped with
short range wireless communication interfaces. The idea is that an end-to-end connection may
never be present. Designing and implementing a routing protocol to support both service
discovery and delivery in such kinds of networks is a challenging problem on account of
frequent disconnections and topology changes. In these networks one of the most important
issues relies on the selection of the best intermediate node to forward the messages towards the
destination. This paper presents a mobile trace based routing protocol that uses the location
information of the nodes in the network. Using the trace information, next hop is selected to forward the packets to destination. Data forwarding is done via the selected nodes. The effectiveness is shown using simulation
Wireless Mesh Network rose as a promising innovation for providing quick and productive communication for which numerous algorithms have been proposed in networking infrastructure. For routing there are various performance parameters such as throughput, network congestion, resiliency, fairness, robustness, network jitter, delay, stability, optimality, simplicity, completeness etc. Robustness provides the capability to deal with all the failures that come across during the connection in the network to increase the network performance. In this paper we have studied and analyzed three algorithms namely on robustness parameter Resilient multicasting [2], Resilient Opportunistic Mesh Routing for Wireless Mesh Network (ROMER) [3], and Buffer Based Routing (BBR) [4], in Wireless Mesh Networks. Analysis through various parameters such as network congestion, network throughput and resiliency [5], shows network performance of BBR is better.
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3ijwmn
This paper presents the design procedure of the NS-3 script for WLAN that is organized according to the hierarchical manner of TCP/IP model. We configure all layers by using NS-3 model objects and set and modify the values used by objects to investigate the effects of MAC parameters (access mechanism, CWmin, CWmax and retry limit) on the performance metrics viz. packet delivery ratio, packet lost ratio, aggregated throughput, and average delay. The simulation results show that RTS/CTS access mechanism outperforms basic access mechanism in saturated state, whereas the MAC parameters have no significant impact on network performance in non-saturated state. A higher value of CWmin improves the aggregated throughput in expense of average delay. The tradeoff relationships among the performance metrics are also observed in results for the optimal values of MAC parameters. Our design procedure represents a good guideline for new NS-3 users to design and modify script and results greatly benefit the network design and management.
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2csandit
In layered networks, reliability is a major concern
as link failures at lower layer will have a
great impact on network reliability. Failure at a l
ower layer may lead to multiple failures at the
upper layers which deteriorate the network performa
nce. In this paper, the scenario of such a
layered wireless sensor network is considered for A
d hoc On-Demand Distance Vector (AODV)
and Multi Commodity Flow (MCF) routing protocols. M
CF is
developed using
polynomial time
approximation algorithms for the failure polynomial
. Both protocols are compared in terms of
different network parameters such as throughput, pa
cket loss and end to end delay. It was
shown that the network reliability is better when M
CF protocol is used. It was also shown that
maximizing the min cut of the layered network maxim
izes reliability in the terms of successful
packet transmission of network. Thetwo routing prot
ocolsare implemented in the scenario of
discrete network event simulator NS-2.
SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...IJCNCJournal
One of the main challenges for researchers to build routing protocols is how to use energy efficiently to extend the lifespan of the whole wireless sensor networks (WSN) because sensor nodes have limited battery power resources. In this work, we propose a Sector Tree-Based clustering routing protocol (STB-EE) for Energy Efficiency to cope with this problem, where the entire network area is partitioned into dynamic sectors (clusters), which balance the number of alive nodes. The nodes in each sector only communicate with their nearest neighbour by constructing a minimum tree based on the Kruskal algorithm and using mixed distance from candidate node to base station (BS) and remaining energy of candidate nodes to determine which node will become the cluster head (CH) in each cluster? By calculating the duration of time in each round for suitability, STB-EE increases the number of data packets sent to the BS. Our simulation results show that the network lifespan using STB-EE can be improved by about 16% and 10% in comparison to power-efficient gathering in sensor information system (PEGASIS) and energy-efficient PEGASIS-based protocol (IEEPB), respectively.
ENHANCEMENT OF OPTIMIZED LINKED STATE ROUTING PROTOCOL FOR ENERGY CONSERVATIONcscpconf
Mobile Ad-hoc network (MANET) is infrastructure less network in which nodes are mobile, self
reconfigurable, battery powered. As nodes in MANET are battery powered, energy saving is an
important issue. We are using routing protocol to save energy so as to extend network lifetime.
We have extended original Optimized Linked State Routing (OLSR) protocol by using two
algorithms and named it as Enhancement in OLSR using Residual Energy approach (EOLSRRE)
and Enhancement in OLSR using Energy Consumption approach (EOLSR-EC). To analyze
relative performance of modified protocol EOLSR-RE and EOLSR-EC over OLSR, we
performed various trials using Qualnet simulator. The performance of these routing protocols is
analyzed in terms of energy consumption, control overheads, end to end delay, packet delivery
ratio. The modified OLSR protocol improves energy efficiency of network by reducing 20 %
energy consumption and 50% control overheads.
An Efficient Multiplierless Transform algorithm for Video CodingCSCJournals
This paper presents an efficient algorithm to accelerate software video encoders/decoders by reducing the number of arithmetic operations for Discrete Cosine Transform (DCT). A multiplierless Ramanujan Ordered Number DCT (RDCT) is presented which computes the coefficients using shifts and addition operations only. The reduction in computational complexity has improved the performance of the video codec by almost 58% compared with the commonly used integer DCT. The results show that significant computation reduction can be achieved with negligible average peak signal-to-noise ratio (PSNR) degradation. The average structural similarity index matrix (SSIM) also ensures that the degradation due to the approximation is minimal.
PERFORMANCE ANALYSIS OF ENERGY EFFICIENT SCALABLE HEIRARCHIAL PROTOCOL FOR HO...IAEME Publication
Wireless Sensor nodes connect the physical world to the digital world using smart,
tiny and self configured stand alone devices. These small devices offer pack of
brilliant opportunities to the digital world by capturing and revealing real time events
which later used as data cloud in numerous applications. With impressive
improvements in protocols, node level programming, simulation platforms and
middleware developments sensor nodes have become promising options in the
development of smart cities, gas and chemical industry, precision agriculture etc.
However, these industrial application demands more lifetime and faster-secure data
transmissions. In many applications it is recorded that with increase in network size
LEACH routing protocol functioning degenerate. Further, designing of a promising
routing protocol that can maintain less energy consumption during data gathering
and propagation leads to use of variety of approaches. This work is based on the
abstraction of equal distribution of energy among nodes with scalability.
Experimental results show commendable improvement in network lifespan with
residual energy of nodes to last for longer period. Throughput is also monitored
considering scalability.
JCWAEED: JOINT CHANNEL ASSIGNMENT AND WEIGHTED AVERAGE EXPECTED END-TO-END DE...csandit
In recent years, multi-channel multi-radio Wireless Mesh network has become one of the most important technologies in the evolution of next-generation networks. Its multi-hop, selforganization,self-healing and simple deployment is an effective way to solve the bottleneck problem of last mile. In this paper, we propose a new routing metric called WAEED, deployed in JCWAEED protocol, a joint channel assignment and weighted average expected end-to-end delay routing protocol which considers both interference suppression with factor IF and end-toend delay. Additionally, we give the exact calculation formula of transmission delay and queuing delay. Simulations results demonstrate that JCWAEED outperforms other joint design routing protocols in terms of throughput, end-to-end delay and packet loss rate.
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Throughput analysis of non-orthogonal multiple access and orthogonal multipl...IJECEIAES
This study introduces the non-orthogonal multiple access (NOMA) technique into the wireless energy harvesting K-hop relay network to increase throughput. The relays have no dedicated energy source and thus depend on energy harvested by wireless from a power beacon (PB). Recently, NOMA has been promoted as a technology with the potential to enhance connectivity, reduce latency, increase fairness amongst users, and raise spectral effectiveness compared to orthogonal multiple access (OMA) technology. For performance considerations, we derive exact throughput expressions for NOMA and OMA-assisted multi-hop relaying and compare the performance between the two. The obtained results are validated via Monte Carlo simulations.
In this paper, we examine WiMAX – based network and evaluate the performance for quality of service (QoS) using an idea of IEEE 802.16 technology. In our models, the study used a multiprocessor architecture organized by the interconnection network. OPNET Modeler is used to simulate the architecture and to calculate the performance criteria (i.e. throughput, delay and data dropped) that
slightly concerned in network estimation. It is concluded that our models shorten the time quite a bit for
obtaining the performance measures of an end-to-end delay as well as throughput can be used as an
effective tool for this purpose.
Dear Student,
DREAMWEB TECHNO SOLUTIONS is one of the Hardware Training and Software Development centre available in
Trichy. Pioneer in corporate training, DREAMWEB TECHNO SOLUTIONS provides training in all software
development and IT-related courses, such as Embedded Systems, VLSI, MATLAB, JAVA, J2EE, CIVIL,
Power Electronics, and Power Systems. It’s certified and experienced faculty members have the
competence to train students, provide consultancy to organizations, and develop strategic
solutions for clients by integrating existing and emerging technologies.
ADD: No:73/5, 3rd Floor, Sri Kamatchi Complex, Opp City Hospital, Salai Road, Trichy-18
Contact @ 7200021403/04
phone: 0431-4050403
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3ijwmn
This paper presents the design procedure of the NS-3 script for WLAN that is organized according to the
hierarchical manner of TCP/IP model. We configure all layers by using NS-3 model objects and set and
modify the values used by objects to investigate the effects of MAC parameters (access mechanism, CWmin,
CWmax and retry limit) on the performance metrics viz. packet delivery ratio, packet lost ratio, aggregated
throughput, and average delay. The simulation results show that RTS/CTS access mechanism outperforms
basic access mechanism in saturated state, whereas the MAC parameters have no significant impact on
network performance in non-saturated state. A higher value of CWmin improves the aggregated throughput
in expense of average delay. The tradeoff relationships among the performance metrics are also observed
in results for the optimal values of MAC parameters. Our design procedure represents a good guideline for
new NS-3 users to design and modify script and results greatly benefit the network design and
management.
PREDICTING COMMUNICATION DELAY AND ENERGY CONSUMPTION FOR IEEE 802.15.4/ZIGB...IJCNC
The Wireless Sensor Networks (WSN) particularly for real time applications raise fundamental problems
for the scientific community. These problems are related to the limit of energy resource and the real time
constraints on the communication delay. The well functioning of such networks depends mainly on the
network lifetime result of nodes energies and the communication delay which should meet the required
deadlines. Thus, the well design of Real-Time Wireless Sensor Networks must be with the prediction of
the energy consumption and the communication delay. Therefore, this paper propose an analytical model
to predict the lifetime and the delay in IEEE 802.15.4/ZigBee WSN. Our proposed model is based on
realistic assumptions. It considers the most important network features such as idle times from the
Backoff, overhearing and interferences by collisions and transmission errors. Compared to simulation
results and other analytical approaches, our model gives a reliable lifetime and delay prediction.
GTSH: A New Channel Assignment Algorithm in Multi-Radio Multi-channel Wireles...IJERA Editor
One of the complexities in a wireless mesh networks is its low throughput. For this reason and due to the fact that throughput is highly reduced by increased number of nodes, it is difficult to extend such networks. Therefore, providing a high throughput in these networks is an essential goal. The main lowering cause of efficiency of such networks is interference between wireless links. A high interference leads to a reduced throughput. In this research, two channel assignment methods were presented using genetic and tabu search algorithms and their advantages and disadvantages were assessed. Finally, a new method combining the advantages of both methods was proposed. With the help of NS2 network simulator, our work was simulated and the combination results of the two methods were compared. The results were indicative of the better performance of the hybrid method and significant increase of throughput in the network.
Efficiency enhancement using optimized static scheduling technique in TSCH ne...IJECEIAES
In recent times, the reliable and real-time data transmission becomes a mandatory requirement for various industries and organizations due to the large utilization of Internet of Things (IoT) devices. However, the IoT devices need high reliability, precise data exchange and low power utilization which cannot be achieved by the conventional Medium Access Control (MAC) protocols due to link failures and high interferences in the network. Therefore, the Time-Slotted Channel Hopping (TSCH) networks can be used for link scheduling under the IEEE 802.15.4e standard. In this paper, we propose an Optimized Static Scheduling Technique (OSST) for the link scheduling in IEEE 802.15.4e based TSCH networks. In OSST the link schedule is optimized by considering the packet latency information during transmission by checking the status of the transmitted packets as well as keeping track of the lost data packets from source to destination nodes. We evaluate the proposed OSST model using 6TiSCH Simulator and compare the different performance metrics with Simple distributed TSCH Scheduling.
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless NetworksCSCJournals
Heterogeneous Wireless Networks are considered nowadays as one of the potential areas in research and development. The traffic management’s schemes that have been used at the fusion points between the different wireless networks are classical and conventional. This paper is focused on developing a novel scheme to overcome the problem of traffic congestion in the fusion point router interconnected the heterogeneous wireless networks. The paper proposed an EF-AQM algorithm which provides an efficient and fair allocation of bandwidth among different established flows. Finally, the proposed scheme developed, tested and validated through a set of experiments to demonstrate the relative merits and capabilities of a proposed scheme
Energy Behavior in Ad Hoc Network Minimizing the Number of Hops and Maintaini...CSCJournals
Wireless ad-hoc mesh network is a special kind of network, where all of the nodes move in time. The topology of the network changes as the nodes are in the proximity of each other. Ad-hoc networks are generally self-configuring no stable infrastructure takes a place. In this network, each node should help relaying packets of neighboring nodes using multi-hop routing mechanism. This mechanism is needed to reach far destination nodes to solve problem of dead communication. This multiple traffic "hops" within a wireless mesh network caused dilemma. Wireless mesh network that contain multiple hops become increasingly vulnerable to problems such as energy degradation and rapid increasing of overhead packets. This paper provides a generic routing framework that balances energy efficient broadcast schemes in Wireless (Ad-Hoc) Mesh Network and maintaining connectivity of nodes (mobile terminals). Typically, each node’s activities will consume energy, either for sending packets, receiving or preparing/processing packets. Number of hops, distance of nodes, and size of packet will determine the consumption of energy. The framework is based on the principle that additional relay nodes with appropriate energy and routing metric between source and final destination significantly reduces the energy consumption necessary to deliver packets in Wireless (Ad-Hoc) Mesh Network while keep the connectivity of dynamic nodes. Using the framework, the average network connectivity is kept 18% higher and the lifetime of network lasting more than 2.38% compared with network with Link State Routing mechanism. The simulation notes that the end-to-end delay may increase rapidly if relay nodes are more than five.
Simulator for Energy Efficient Clustering in Mobile Ad Hoc Networkscscpconf
The research on various issues in Mobile ad hoc networks is getting popular because of its
challenging nature and all time connectivity to communicate. Network simulators provide the
platform to analyse and imitate the working of the nodes in the networks along with the traffic
and other entities. The current work proposes the design of a simulator for the mobile ad hoc
networks that provides a test bed for the energy efficient clustering in the dynamic network.
Node parameters like degree of connectivity and average transmission power are considered for
calculating the energy consumption of the mobile devices. Nodes that consume minimum energy among their 1-hop neighbours are selected as the cluster heads.
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Similar to Design And Evaluation of Time Slot Assignment Algorithm For IEEE 802.16j Relay Networks (20)
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
A Survey of Techniques for Maximizing LLM Performance.pptx
Design And Evaluation of Time Slot Assignment Algorithm For IEEE 802.16j Relay Networks
1. Go Hasegawa, Shoichi Takagi, Yoshiaki Taniguchi, Hirotaka Nakano & Morito Matsuoka
International Journal of Computer Networks (IJCN), Volume (6) : Issue (3) : 2014 50
Design And Evaluation of Time Slot Assignment Algorithm
For IEEE 802.16j Relay Networks
Go Hasegawa hasegawa@cmc.osaka-u.ac.jp
Cybermedia Center
Osaka University
Toyonaka, Osaka, 560-0043, Japan
Shoichi Takagi s-takagi@ist.osaka-u.ac.jp
Graduate School of Information Science and Technology
Osaka University
Suita, Osaka, 565-0871, Japan
Yoshiaki Taniguchi y-tanigu@kindai.ac.jp
Faculty of Science and Engineering
Kinki University
Higashi-Osaka, Osaka, 577-8502, Japan
Hirotaka Nakano nakano@ane.cmc.osaka-u.ac.jp
Cybermedia Center
Osaka University
Toyonaka, Osaka, 560-0043, Japan
Morito Matsuoka matsuoka@cmc.osaka-u.ac.jp
Cybermedia Center
Osaka University
Toyonaka, Osaka, 560-0043, Japan
Abstract
In IEEE 802.16j relay networks, wireless communications are carried out based on TDMA where
the wireless network resources are divided into multiple time slots and they are assigned to
wireless links between relay nodes as transmission opportunities. The network performance is
improved by decreasing the total number of different time slots assigned to all links in a single
scheduling cycle, because it brings the increase in the transmission opportunities of the links per
unit time. Although it can be achieved when multiple links utilize the same time slot, the capacity
of such links is degraded due to the radio interference. On the other hand, since all links in the
network need to have enough time slots to accommodate their traffic load, degrading the link
capacity may increase the total number of different time slots in the scheduling cycle. Therefore,
we should determine the time slot assignment by considering the above-mentioned tradeoff
relationship. In this paper, we propose heuristic algorithms for time slot assignment problem in
IEEE 802.16j relay networks, and evaluate them through extensive simulation experiments. Two
algorithms based on different heuristic are introduced. One algorithm assigns a set of time slots
to links by a greedy approach. The other algorithm determines a set of links that use a time slot
by a brute-force search for maximizing the total link capacity. Performance evaluation results
exhibit that the proposed algorithms reduces around 34% and 39% of the total time slots
compared with the case where no link utilizes the same time slot, respectively. Meanwhile, they
also show that calculation time of the latter algorithm is longer than that of the former algorithm to
reduce the total time slots. Thus, we show that there is a tradeoff between performance and
calculation time.
Keywords: IEEE 802.16j, Radio Interference, TDMA, Time Slot Assignment, Heuristic Algorithm.
2. Go Hasegawa, Shoichi Takagi, Yoshiaki Taniguchi, Hirotaka Nakano & Morito Matsuoka
International Journal of Computer Networks (IJCN), Volume (6) : Issue (3) : 2014 51
1. INTRODUCTION
Wireless relay networks based on IEEE 802.16 (referred as relay networks below) are attracting
increasing attention because they can provide wireless broadband service at low cost [1].
Specifically, IEEE 802.16j [2–4] is the standard that adds a multihop relay function to IEEE
802.16e [5]. By the multihop relay function, we can easily provide wide area access environment.
As show in Figure 1, a relay network is composed of a gateway node, relay nodes and client
terminals. The gateway node is connected to the backhaul networks with wired links and the relay
nodes relay messages between the backhaul networks and the client terminals via wireless links
[6].
FIGURE 1: IEEE 802.16j Relay Network.
Generally, in wireless networks, when multiple nodes communicate on the same channel at the
same time, the nodes cannot communicate correctly due to radio interference [7–9]. IEEE 802.16j
adopts Time Division Multiple Access (TDMA) mechanism to reduce the radio interference [10,
11]. In TDMA, the wireless network resources are divided into multiple time slots and they are
assigned to wireless links between relay nodes as transmission opportunities. The relay nodes
communicate via the wireless links only at assigned time slots. To avoid performance degradation
due to radio interference, disjoint time slots are assigned to links that would interfere with each
other [12, 13]. Conversely, multiple links can communicate simultaneously at a single time slot if
interference is weak. This means the spatial reuse of the wireless network resource [14, 15].
Decreasing the total number of different time slots which assigned to all links in the scheduling
cycle, referred as schedule length below, means the improvement of the network performance,
since the transmission opportunities of the links per unit time increases [16, 17]. We can reduce
the schedule length by the reasonable level of spatial reuse. However, the excessive level of
spatial reuse brings strong interference because too many links communicate simultaneously at
the same time slot. In addition, the link capacity at an assigned time slot changes according to
received signal and interference strengths, which is evaluated by signal to interference noise ratio
3. Go Hasegawa, Shoichi Takagi, Yoshiaki Taniguchi, Hirotaka Nakano & Morito Matsuoka
International Journal of Computer Networks (IJCN), Volume (6) : Issue (3) : 2014 52
(SINR). This is because IEEE 802.16j employs Adaptive Modulation and Coding (AMC) [18–20],
which selects the modulation method according to the SINR of the link and determines the link
capacity at a time slot. On the other hand, since all links in the network need to have enough time
slots to accommodate their traffic load [21, 22], degrading the link capacity may increase the
schedule length. Therefore, we should determine the time slot assignment by considering the
complex tradeoff between the link capacity and the degree of the spatial reuse.
The past literature [23] revealed that finding the optimum solution for time slot assignment is NP-
hard problem, meaning that reasonable heuristic algorithms are required. Although there are
researches on the time slot assignment for IEEE 802.16j relay networks, as in [24–29], none of
them considers the detailed transmission quality in time slot assignment.
In this paper, we propose heuristic algorithms for time slot assignment problem in IEEE 802.16j
relay networks with consideration of the detailed transmission quality. Two algorithms based on
different heuristic are introduced. One algorithm is based on a greedy approach that assigns a set
of time slots for a link to minimize the number of different time slots utilized by the link. The other
algorithm is based on a brute-force search that determines a set of links for a time slot to
maximize the total link capacity at the time slot. We conduct extensive simulation experiments to
evaluate the performance of these algorithms and assess the tradeoff relationships between the
obtained network performance and the calculation time. We also evaluate the performance of
these algorithms in the various network size.
The rest of this paper is organized as follows. In Section 2, we explain the network model, the
radio propagation model, and the problem definition. We propose the time slot assignment
algorithms in Section 3. Section 4 gives the performance evaluation results through simulation
experiments. Finally, we present the conclusions of this paper and areas for future work in
Section 5.
2. SYSTEM MODEL AND PROBLEM DEFINITION
2.1 Network Model
Figure 2 depicts a relay network model used in this paper. The network is composed of ܰ
wireless nodes. One node is a gateway node denoted by ݒ and the others are relay nodes
denoted by ݒଵ, … ݒேିଵ. When the network topology is being formed, a parameter called as the
estimated transmission distance is used. Each node constructs links to other nodes within the
distance from itself and the tree network topology is constructed the topology construction
algorithms such as in [30]. In the network topology, the gateway node is the root of the tree and
the relay nodes are the internal or leaf nodes. A communication graph ܩ = ሺܸ, ܧሻ is defined
where ܸ = ሼݒ|0 ≤ ݅ ≤ ܰ − 1ሽ is the set of all nodes and ܧ = ሼ݈|1 ≤ ݅ ≤ ||ܧሽ is the set of links. ||ܧ
denotes the number of links in the network. To simplify the explanation below, we introduce the
notations of ݒ
ሺሻ
and ݒ
ሺሻ
to represent the sender and receiver nodes of the link ݈, respectively.
We assume that the network traffic occurs from the client terminals to the backhaul networks. ܳ
denotes the amount of total traffic generated from all client terminals during a single frame
defined in IEEE 802.16j. The traffic load on each link is determined by the sum of the traffic from
the client terminals whose path to the backhaul network includes the link. We denote the traffic
load on ݈ as ܳ.
4. Go Hasegawa, Shoichi Takagi, Yoshiaki Taniguchi, Hirotaka Nakano & Morito Matsuoka
International Journal of Computer Networks (IJCN), Volume (6) : Issue (3) : 2014 53
FIGURE 2: Network Model.
2.2 Time Division Multiple Access (TDMA)
IEEE 802.16j adopts TDMA to avoid the performance degradation due to the radio interference.
In TDMA, the wireless network resources are divided into multiple time slots and they are
assigned to links in the network as transmission opportunities. The relay nodes communicate via
the wireless links only at assigned time slots. The time slots are sequentially denoted as
ݐሺ1ሻ, ݐሺ2ሻ, … from the head of the frame.
We denote the time slot assignment as the matrix ܣ shown below.
ܣ = ൮
ܽଵሺ1ሻ ܽଵሺ2ሻ …
ܽଶሺ1ሻ ܽଶሺ2ሻ …
… … …
ܽ|ா|ሺ1ሻ ܽ|ா|ሺ2ሻ …
൲ (1)
Here, ܽሺ݇ሻ represents the assignment information of the time slot ݐሺ݇ሻ on the link ݈ as follows.
ܽሺ݇ሻ = ቄ
1 if ݐሺ݇ሻ is assigned to ݈ଵ
0 otherwise
(2)
Also, we introduce the variable ܾሺ݇ሻ as follows.
ܾሺ݇ሻ = ቄ
1 if ݐሺ݇ሻ is assigned to one or more links
0 otherwise
(3)
We denote a schedule length as ,ܨ which is defined as follows.
ܨ = ܾሺ݇ሻ
ஶ
ୀଵ
(4)
5. Go Hasegawa, Shoichi Takagi, Yoshiaki Taniguchi, Hirotaka Nakano & Morito Matsuoka
International Journal of Computer Networks (IJCN), Volume (6) : Issue (3) : 2014 54
Note that the time slot assignment with smaller ܨ means the larger performance since we can
accommodate the traffic load on all links in the network with smaller number of different time
slots. Moreover, a set of links assigned ݐሺ݇ሻ is denoted as ܧሺ݇ሻ.
ܧሺ݇ሻሺ⊆ ܧሻ = ሼ݈|ܽሺ݇ሻ = 1, ∀݅ሽ (5)
2.3 Radio Interference Environment
In this paper, we assume the Rayleigh fading channel, which considers multipath fading in non-
line-of-sight environments [31, 32]. In this channel, the radio signal strength changes temporally
due to various factors such as distance, reflection, diffraction, and shadowing [33]. Then, the
radio signal strength received at receiver node ݒ from sender node ݒ, denoted as ܲ,, is defined
as follows [34].
ܲ, = ܴଶ
݁క
ݎܭ,
ିఈ
ܲ (6)
Here, ܴଶ
denotes the influence of multipath fading where ܴ is a random variable according to
Rayleigh distribution. ݁క
denotes the shadowing effect where ߦ is a random variable according to
normal distribution with mean 0 and variance ߪଶ
. ܭ and ߙ are variables of power decay due to
distance. ݎ, is the distance between ݒ and ݒ. ܲ is the transmission signal strength of ݒ.
On the transmission on the link ݈, the SINR of the radio signal received at receiver node ݒ
ሺሻ
from
sender node ݒ
ሺሻ
at time slot ݐሺ݇ሻ is defined as follows [35].
ݏሺ݇ሻ = 10 logଵ
ܲ,
ܲ௦ + ∑ ܲ,∈ாሺሻ
(7)
Here, ܲ௦ is the strength of environmental noise.
We assume that the receiver node successfully receives the radio signal from the sender node if
the SINR at receiver node is larger than ܤ that represents the capture threshold. Because we
also assume the Rayleigh fading channel, the SINR is stochastically changed for every
communication even if the condition about interference are same. Therefore, the probability at
which the SINR at receiver node ݒ
ሺሻ
from sender node ݒ
ሺሻ
at time slot ݐሺ݇ሻ is larger than ܤ is
defined as follows [35].
,ሺܭሻ = ܲ, > 10
ಳ
భబ ቌܲ௦ + ܲ,
∈ாሺሻ
ቍ (8)
In this paper, the capacity of a link at assigned a time slot is determined by AMC defined in IEEE
802.16-2009 [3]. AMC selects the modulation method according to the SINR of the link. If the
SINR is large, the sender node selects a modulation method that enables high-speed
transmission. If the SINR is small, the sender node selects a low-speed modulation method with
robustness against bit errors [36, 37]. Considering stochastic fluctuation of SINR in Rayleigh
fading channel assumed in this work, we calculate ݂ሺ݇ሻ, that represents the capacity of the link ݈
at a time slot ݐሺ݇ሻ as follows.
݂ሺ݇ሻ = ൞ ݀ሺ,௨ೢ
ሺ݇ሻ −
௪ୀ
,௨ೢశభ
ሺ݇ሻሻ if ܽሺ݇ሻ = 1
0 otherwise
(9)
6. Go Hasegawa, Shoichi Takagi, Yoshiaki Taniguchi, Hirotaka Nakano & Morito Matsuoka
International Journal of Computer Networks (IJCN), Volume (6) : Issue (3) : 2014 55
Here, the capacity of the link ݈ becomes ݀௪ሺݓ = 0,1, … ,ܦ ݀ = 0ሻ when ܤ௪ ≤ ݏሺ݇ሻ ≤ ܤ௪ାଵ ሺݓ =
0,1, … ,ܦ ݓ = −∞, ݑାଵ = ∞ሻ holds as shown in Table 2.
SINR [dB] Modulation Method Link Capacity
[bits per symbol]
<3 - 0
3-6 BPSK 0.5
6-8.5 QPSK 1
8.5-11.5 QPSK 1.5
11.5-15 16QAM 2
15-19 16QAM 3
19-21 64QAM 4
>21 64QAM 4.5
TABLE 1: Adaptive Modulation and Coding in IEEE 802.16-2009.
2.4 Time Slot Assignment Problem
Smaller schedule length means higher network performance, since the transmission opportunities
of the links per unit time increases. Finding the smallest schedule length for time slot assignment
is defined as follows.
minimize ܨ = ܾሺ݇ሻ
∞
ୀ
subject to ݂ሺ݇ሻ ≥ ܳ
∞
ୀଵ
ሺ∀݅ = 1, 2, … , ||ܧሻ
݂ሺ݇ሻ ≥ 0 ሺܽሺ݇ሻ = 1, ∀݅ = 1, 2, … , |,|ܧ ∀݇ ∈ ℕሻ
(10)
When this problem is solved by brute-force search, 2|ா|×ி∗
time complexity is needed, where ܨ∗
is
shown as follows.
ܨ∗
=
ܳ
݀ଵ
ඈ
|ா|
ୀଵ
(11)
ܨ∗
is equivalent to the schedule length when time slots where a link can transmit smallest
capacity are assigned to all links without spatial reuse.
3. PROPOSED ALGORITHMS
This section introduces the proposed algorithms for time slot assignment problem explained in
Subsection 2.4. We propose two algorithms based on different heuristics called as Time slots for
Link (TfL) algorithm and Links for time Slot (LfT) algorithm. In the following subsections, we
explain the detailed algorithms in turn.
3.1 Time Slots for Link (TfL) Algorithm
TfL algorithm determines time slots utilized by each link in the pre-determined order. In what
follows we assume to assign time slots to links in the order of ሺ݈ଵ, ݈ଶ, … , ݈|ா|ሻ. This means that TfL
algorithm is equivalent to determining the values in Equation (1) row by row from the top row for
link ݈ଵ to the bottom row for link ݈|ா|.
We here explain how to assign time slots utilized by ݈, meaning that we determine the values of
݅th row in Equation (1) after 1st, 2nd, …, ሺ݅ − 1ሻth rows are already calculated. The set of time
slots assigned to ݈ is obtained by solving the optimization problem defined as follows.
7. Go Hasegawa, Shoichi Takagi, Yoshiaki Taniguchi, Hirotaka Nakano & Morito Matsuoka
International Journal of Computer Networks (IJCN), Volume (6) : Issue (3) : 2014 56
minimize ܾሺ݇ሻ
∞
ୀ
subject to ݂ሺ݇ሻ ≥ ܳ
∞
ୀଵ
ሺ∀݆ = 1, 2, … ݅ − 1ሻ
݂ሺ݇ሻ ≥ 0 ሺܽሺ݇ሻ = 1, ∀݇ ∈ ℕሻ
(12)
(13)
(14)
Here, ܾሺ݇ሻ is shown as follows.
ܾሺ݇ሻ = ቄ
1 if ݐሺ݇ሻ is assigned to one or more links in ሼ݈ଵ, ݈ଶ, … , ݈ሽ
0 otherwise
(15)
Equation (12) means that we minimize the schedule length for links ݈ଵ, ݈ଶ, … , ݈. Equations (13) and
(14) represent the constraints in minimization of Equation (12) that the assignment
accommodates the traffic load of links ݈ଵ, ݈ଶ, … , ݈, and that all links using a time slot have the
effective bitrates, respectively. When this problem is solved by brute-force search, 2ி
∗
of the time
complexity is needed where ܨ
∗
is shown as follows.
ܨ
∗
= ܾିଵሺ݇ሻ +
ܳ
݀ଵ
ඈ
∞
ୀଵ
(16)
This equation means that the calculation time for the brute-force search for ݅th link increases
rapidly when ݅ approaches to |.|ܧ Therefore, we utilize the following algorithm based on a greedy
approach.
When assigning time slots to the link ݈, TfL algorithm first tries to use time slots that have been
already assigned to other links to minimize the number of consumed time slots. Then, it uses new
time slots that are not yet assigned to any links. In detail for determining whether the time slot
ݐሺ݇ሻ is assigned to link ݈ , TfL algorithm calculates the capacity of the other links that are
assigned the time slot ݐሺ݇ሻ when ݈ also uses ݐሺ݇ሻ. This is because the SINR would degrade
when the number of links using the same time slot increases. When all links using ݐሺ݇ሻ satisfy
their traffic load, ݐሺ݇ሻ is assigned to the link ݈. After that, we assess whether or not the traffic load
on ݈ is satisfied. If not, we try to add another time slot for the link ݈.
3.2 Links for Time Slots (LfT) Algorithm
LfT algorithm selects links which utilize each time slot to maximize the total link capacity in the
time slot, based on a brute-force search. Therefore, LfT algorithm is equivalent to determining the
values in Equation (1) column by column from left to right.
In what follows we present how to select links which utilize ݐሺ݇ሻ, meaning that we determine the
values of ݇th column in Equation (1) after 1st, 2nd, …, ሺ݇ − 1ሻth columns are already calculated.
The set of links which utilize the time slot ݐሺ݇ሻ is obtained by solving the optimization problem
which is defined as follows.
minimize ݂ሺ݇ሻ
∀∈ாሺሻ
subject to ܽሺ݇ሻ = 0 ൭ ݂ሺܭሻ ≥ ܳ, ∀݅ = 1, 2, … , ||ܧ
ିଵ
ୀଵ
൱
݂ሺ݇ሻ ≥ 0 ሺܽሺ݇ሻ = 1, ∀݅ = 1, 2, … , ||ܧሻ
(17)
(18)
(19)
Equation (17) means that we maximize the total capacity of links assigned the time slot ݐሺ݇ሻ.
Equations (18) and (19) show the constraints in maximization of Equation (17) that we avoid
8. Go Hasegawa, Shoichi Takagi, Yoshiaki Taniguchi, Hirotaka Nakano & Morito Matsuoka
International Journal of Computer Networks (IJCN), Volume (6) : Issue (3) : 2014 57
assigning time slots to links whose traffic load is already satisfied, and that all links in ݐሺ݇ሻ have
positive value of the capacity, respectively. When this problem is solved by a simple brute-force
search, 2|ா|ିหாೖห
of the time complexity is needed where ܧ
is shown in the following equation.
ܧሺ∈ ܧሻ = ൝݈อ ݂ሺ݇ሻ ≥ ܳ, ∀݅ = 1, 2, … , ||ܧ
ିଵ
ୀଵ
ൡ (20)
ܧ
means a set of links which have already been satisfied their traffic load with time slots
ݐሺ1ሻ, ݐሺ2ሻ, … ݐሺ݇ − 1ሻ . This equation means that the calculation time by brute-force search
increases rapidly when ||ܧ increases. Therefore, we introduce the parameter ܮ௫ , which
denotes the upper limit of the number of links using the same time slot. This dramatically
suppresses the space for the brute-force search.
After determining the link assignment for time slot ݐሺ݇ሻ, we check whether or not all links are
satisfied their traffic load. If not, we move to the link assignment for the next time slot ݐሺ݇ + 1ሻ.
4. PERFORMANCE EVALUATION RESULTS AND DISCUSSIONS
In this section, we evaluate the performance of the proposed algorithms through simulation
experiments.
4.1 Simulation Settings
In the experiments, one gateway is placed at the center of a 1x1 square area, and relay nodes
are randomly distributed. The network topology is constructed by the topology construction
algorithm shown in [30] so that the hop count from each relay node to the gateway node becomes
minimized. All nodes have an estimated transmission distance of 0.2, which is used for the
network topology construction. Figure 3 shows an example of the network topology in the
simulation experiments. The traffic load on each link is determined by the sum of the traffic from
the client terminals whose path to the backhaul network includes the link. The traffic demand from
the relay nodes is determined based on their Voronoi Cell [38] size assuming that client terminals
are distributed uniformly in the square area, connect to the nearest relay node, and generate the
same amount of traffic toward backhaul networks.
9. Go Hasegawa, Shoichi Takagi, Yoshiaki Taniguchi, Hirotaka Nakano & Morito Matsuoka
International Journal of Computer Networks (IJCN), Volume (6) : Issue (3) : 2014 58
FIGURE 3: An Example of relay network topology for simulation experiments.
For determining the signal strength from the relay node, we assume that the transmission signal
strength, power decay, and the degree of shadowing effects are identical for all relay nodes.
Then, Equation (8), which represents the probability at which the SINR at receiver node ݒ
ሺሻ
from
sender node ݒ
ሺሻ
at time slot ݐሺ݇ሻ is larger than ,ܤ is calculated as follows [39, 40].
,ሺ݇ሻ = exp ቆ−
ܲܤ௦
ܲݎ,
ିఈ
ቇ ෑ
1
1 + ܤ ൬
,
,
൰
ఈ
∈ாሺሻ
(21)
Note that ߙ and ܤ are set to 5.0 and 4.0, respectively.
We conduct the simulation experiments for the proposed algorithms in Section 3 with various
parameter values. For each parameter set we conduct multiple experiments with different node
placements and evaluate the average performance. We also observe the result of each
simulation trial to assess the detailed performance characteristics of the proposed methods.
4.2 Evaluation Results and Discussions
4.2.1 Schedule Length
Figure 4 shows the distribution of the schedule length obtained by TfL algorithm. We set the
amount of total traffic, which is denoted by ܳ is set to 307,200. This is the result of 100 times
simulation trials, each of which has a different time slot assignment order of links with a fixed
placement of thirty nodes. From this figure, we find that the schedule length obtained by TfL
algorithm is distributed widely even when the node placement is identical, that means that the
performance is largely affected by the time slot assignment order. Therefore, in the rest of the
performance evaluation, we take the shortest schedule length out of 100 simulation trials as the
performance of TfL algorithm.
10. Go Hasegawa, Shoichi Takagi, Yoshiaki Taniguchi, Hirotaka Nakano & Morito Matsuoka
International Journal of Computer Networks (IJCN), Volume (6) : Issue (3) : 2014 59
FIGURE 4: Schedule Length Distribution by TfL Algorithm.
Figure 5 plots the schedule lengths of TfL and LfT algorithms for sampled five placements of thirty
nodes. ܳ is set to 307,200. Note that the results for other node placements have similar
tendency. In the graph, the horizontal axis represents the identifier of the node placement, and
the vertical axis represents the schedule length. For LfT algorithm, we show the results where the
parameter ܮ௫ is set to one through five. Note that LfT algorithm with ܮ௫= 1 represents the
case where no spatial reuse of the wireless network resource is exploited, meaning that only one
link communicates at each time slot. By comparing the results of LfT algorithm with ܮ௫ = 1 and
other results, we observe that the spatial reuse of the wireless network resources can greatly
reduce the schedule length.
FIGURE 5: Schedule Length of Proposed Algorithms.
11. Go Hasegawa, Shoichi Takagi, Yoshiaki Taniguchi, Hirotaka Nakano & Morito Matsuoka
International Journal of Computer Networks (IJCN), Volume (6) : Issue (3) : 2014 60
Table 2 shows the average reduction ratio of the schedule length of the proposed algorithms
against no spatial reuse case. This plots the results of 100 times simulation trials with different
node placements. We can see from Figure 5 and Table 2 that the schedule length of TfL
algorithm is larger than that of LfT algorithm with larger values of ܮ௫ . The reason for this
difference is due to the characteristics of TfL and LfT algorithms. TfL algorithm tries to assign time
slots which are already used by other links. It causes the decrease in the capacity of such links at
the time slots. Consequently, a larger number of different time slots are required for the links to
satisfy their traffic loads. On the other hand, LfT algorithm selects links to maximize the total link
capacity in each time slot. Therefore, in LfT algorithm the interference strength at each time slot is
smaller compared with TfL algorithm. We can also observe from Figure 5 that the schedule length
of LfT algorithm reduces by increasing values of ܮ௫. However, when ܮ௫ is larger than around
three, the degree of performance improvement becomes smaller. This means that the limitation of
search space in LfT algorithm is reasonable as expected.
TfL LfT ܮ௫ = 2 LfT ܮ௫ = 3 LfT ܮ௫ = 4 LfT ܮ௫ = 5
Reduction
Ratio (%)
34.2 31.2 36.2 37.9 38.6
TABLE 2: Average Reduction Ratio of Schedule Length.
4.2.2 Effect of Total Traffic Amount
Figure 6 shows the comparison of the average schedule lengths of both algorithms as a function
of the amount of total traffic (ܳ). The number of nodes is set to thirty and ܮ௫ of LfT algorithm
is set to five. We conduct 50 times of experiments for each value of ܳ. We also plot the 99%
confidential intervals of the schedule length with errorbars. From this figure we first find that the
schedule length increases with the increase in the amount of total traffic. The reason is that the
traffic load of all links increases and the number of required time slot becomes large. We also find
that the schedule length of TfL algorithm is shorter than that of LfT algorithm when the amount of
total traffic is small, and the relationship becomes opposite with large total traffic amount. This is
because of the characteristics of both algorithms in time slot assignment against the traffic load
on each link. TfL algorithm explicitly takes care the satisfaction of the traffic load at each time slot
assignment for a certain link. On the other hand, LfT algorithm first selects the link combinations
to maximize the total link capacity for a certain time slot, and then assesses the satisfaction of
traffic loads on the selected links. This difference affects the effectiveness of time slot assignment
especially when the total traffic amount is small.
FIGURE 6: Average Schedule Length as a Function of Total Traffic Amount.
12. Go Hasegawa, Shoichi Takagi, Yoshiaki Taniguchi, Hirotaka Nakano & Morito Matsuoka
International Journal of Computer Networks (IJCN), Volume (6) : Issue (3) : 2014 61
4.2.3 Comparison With Optimal Solutions
Figure 7 shows the distribution of the schedule length of the proposed algorithms and optimum
solutions for 100 simulation experiments with different node placements. We set the number of
nodes to five and ܳ to 30,720. We obtained the optimum solutions by simple brute-force search
algorithm for all combinations of the time slot assignment to satisfy Equation (10). We observe
from this figure that TfL and LfT algorithms give solutions equivalent to the optimal values in 91%
and 86% of simulation experiments, respectively. From these results we conclude that both
algorithms can give reasonable results of time slot assignment compared with the optimum
solutions.
FIGURE 7: Comparison of Proposed Algorithms with Optimum Solutions.
4.2.4 Calculation Time
Figure 8 presents the calculation time required for a single simulation run by TfL and LfT
algorithms. In Figure 8, the horizontal axis represents the number of nodes in the network and the
vertical axis represents the calculation time. We conducted the simulation experiments on a
computer with a 2.93 GHz CPU and 3 GB of RAM.
13. Go Hasegawa, Shoichi Takagi, Yoshiaki Taniguchi, Hirotaka Nakano & Morito Matsuoka
International Journal of Computer Networks (IJCN), Volume (6) : Issue (3) : 2014 62
FIGURE 8: Calculation Time of Proposed Algorithms.
From Figure 8, we observe for LfT algorithm that the calculation time increases rapidly with the
increase in ܮ௫ and the number of nodes. This is because the number of link combinations by
the brute-force search expands drastically. In detail, when LfT algorithm selects links which utilize
the time slot ݐሺ1ሻ in the ݊ nodes network, the number of possible combinations of links is
∑ ൫
൯
ೌೣ
ୀଵ . Therefore, whichever ܮ௫ and the number of nodes increases, the calculation time for
LfT algorithm increases rapidly.
On the other hand, the calculation time for TfL algorithm increases almost linearly with the
increase in the number of nodes. The reason is that in TfL algorithm, the number of calculations
for the link capacity is ∑
ொ
ௗభ
ሺݔ − 1ሻ
௫ୀଵ at most.
4 CONCLUSIONS
In this paper, we proposed two heuristic algorithms for time slot assignment problem in IEEE
802.16j relay networks. One algorithm assigns a set of time slots to links by a greedy approach to
minimize the number of consumed time slots, while the other algorithm determines a set of links
that use a time slot by a brute-force search for maximizing the total link capacity.
Through extensive simulation experiments, we found that the proposed algorithms can reduce the
number of required time slots by up to 34% and 39%, respectively, compared with the case
where no link utilizes the same time slot. We also found that calculation time of the latter
algorithm is longer than that of the former algorithm. Therefore, we conclude that there is a
tradeoff between performance and calculation time in both algorithms and it is necessary to
choose the algorithm according to which the performance or the calculation time is more
important. Additionally, we showed that the proposed algorithms can obtain the optimum
solutions 91% and 86% simulation experiments.
In future work, the comparative evaluation of the proposed method with existing methods is
necessary. We also plan to improve the proposed algorithms, for example reducing calculation
time and schedule length by exploiting other kinds of heuristic algorithms such as simulated
annealing. Furthermore, we will evaluate the proposed algorithms based on other performance
14. Go Hasegawa, Shoichi Takagi, Yoshiaki Taniguchi, Hirotaka Nakano & Morito Matsuoka
International Journal of Computer Networks (IJCN), Volume (6) : Issue (3) : 2014 63
metrics such as transmission latency and throughput. Implementation of the proposed method as
the driver for the actual WiMAX interface is one of possible future research direction.
5 REFERENCES
[1] I. F. Akyildiz, X. Wang, and W. Wang, “Wireless mesh networks: a survey,” Computer
Networks, vol. 47, no. 4, pp. 445–487, Mar 2005.
[2] V. Genc, S. Murphy, Y. Yu, and J. Murphy, “IEEE 802.16j relay-based wireless access
networks: An overview,” Wireless Communications, vol. 15, no. 5, pp. 56–63, Oct 2008.
[3] IEEE Std 802.16-2009, “IEEE standard for local and metropolitan area networks, part 16: Air
interface for broadband wireless access systems,,” IEEE Standard for Local and metropolitan
area networks, May 2009.
[4] IEEE Std 802.16j-2009, “IEEE standard for local and metropolitan area networks part 16: Air
interface for broadband wireless access systems amendment 1: Multiple relay specification,”
IEEE Standard for Local and metropolitan area networks, June 2009.
[5] IEEE Std 802.16e-2005 and IEEE Std 802.16-2004/Cor 1-2005, “IEEE standard for local and
metropolitan area networks part 16: Air interface for fixed and mobile broadband wireless
access systems amendment 2: Physical and medium access control layers for combined
fixed and mobile operation in licensed bands and corrigendum 1,” IEEE Std 802.16e-2005
and IEEE Std 802.16-2004/Cor 1-2005 (Amendment and Corrigendum to IEEE Std 802.16-
2004), Feb 2006.
[6] S. W. Peters and R. W. Heath, “The future of WiMAX: Multihop relaying with IEEE 802.16j,”
IEEE Communications Magazine, vol. 47, no. 1, pp. 104–111, Jan. 2009.
[7] P. Gupta and P. R. Kumar, “The capacity of wireless networks,” IEEE Transactions on
Information Theory, vol. 46, no. 2, pp. 388–404, Mar 2000.
[8] A. P. Subramanian, M. M. Buddhikot, and S. Miller, “Interference aware routing in multiradio
wireless mesh networks,” in Proceedings of WiMesh 2006, pp. 55–63, Sept 2006.
[9] G. Zhou, T. He, J. A. Stankovic, and T. Abdelzaher, “RID: Radio interference detection in
wireless sensor networks,” in Proceedings of INFOCOM 2005, vol. 2, pp. 891–901, Mar
2005.
[10] C. Cicconetti, I. F. Akyildiz, and L. Lenzini, “Bandwidth balancing in multi-channel IEEE
802.16 wireless mesh networks,” in Proceedings of INFOCOM 2007, pp. 2108 –2116, May
2007.
[11] R. Nelson and L. Kleinrock, “Spatial TDMA: A collision-free multihop channel access
protocol,” Communications, vol. 33, no. 9, pp. 934 – 944, Sept 1985.
[12] W. Wang, Y. Wang, X.-Y. Li, W.-Z. Song, and O. Frieder, “Efficient interference-aware TDMA
link scheduling for static wireless networks,” in Proceedings of ACM MOBICOM 2006, pp.
262–273, Sept 2006.
[13] S. C. Ergen and P. Varaiya, “TDMA scheduling algorithms for wireless sensor
networks,”Wireless Networks, vol. 16, no. 4, pp. 985–997, May 2010.
[14] P. Djukic and S. Valaee, “Link scheduling for minimum delay in spatial re-use TDMA,” in
Proceedings of INFOCOM 2007, pp. 28 –36, May 2007.
15. Go Hasegawa, Shoichi Takagi, Yoshiaki Taniguchi, Hirotaka Nakano & Morito Matsuoka
International Journal of Computer Networks (IJCN), Volume (6) : Issue (3) : 2014 64
[15] L. Kleinrock and J. Silvester, “Spatial reuse in multihop packet radio networks,” Proceedings
of the IEEE, vol. 75, no. 1, pp. 156–167, Jan 1987.
[16] S. Kompella, J. E. Wieselthier, A. Ephremides, H. D. Sherali, and G. D. Nguyen, “On optimal
SINR-based scheduling in multihop wireless networks,” IEEE/ACM Transactions on
Networking, vol. 18, no. 6, pp. 1713–1724, Dec 2010.
[17] N. A. Abu Ali, A.-E. M. Taha, H. S. Hassanein, and H. T. Mouftah, “IEEE 802.16 mesh
schedulers: Issues and design challenges,” IEEE Network, vol. 22, no. 1, pp. 58 –65, Feb
2008.
[18] A. J. Goldsmith and S. G. Chua, “Adaptive coded modulation for fading channels,”
Communications, vol. 46, no. 5, pp. 595–602, June 1998.
[19] Q. Liu, X.Wang, and G. B. Giannakis, “A cross-layer scheduling algorithm with QoS support
in wireless networks,” IEEE Transactions on Vehicular Technology, vol. 55, no. 3, pp. 839–
847, May 2006.
[20] S. Catreux, V. Erceg, D. Gesbert, and R.W. Heath, “Adaptive modulation and MIMO coding
for broadband wireless data networks,” IEEE Communications Magazine, vol. 40, no. 6, pp.
108–115, June 2002.
[21] R. Fei, K. Yang, S. Ou, and H.-H. Chen, “QoS-aware two-level dynamic uplink bandwidth
allocation algorithms in IEEE 802.16j based vehicular networks,” Wireless Personal
Communications, vol. 56, no. 3, pp. 417–433, Feb. 2011.
[22] D. Ghosh, A. Gupta, and P. Mohapatra, “Admission control and interference-aware
scheduling in multi-hop WiMAX networks,” in Proceedings of MASS 2007, pp. 1–9, Oct
2007.
[23] S. Ramanathan and E. Lloyd, “Scheduling algorithms for multihop radio networks,”
IEEE/ACM Transactions on Networking, vol. 1, no. 2, pp. 166–177, Apr 1993.
[24] I.-K. Fu,W.-H. Sheen, and F.-C. Ren, “Deployment and radio resource reuse in IEEE 802.16j
multi-hop relay network in manhattan-like environment,” in Proceedings of ICICS 2007, pp.
1–5, Dec 2007.
[25] S. W. Kim, J. Y. Jung, and J. W. Jang, “Frequency reuse during relay transmission for
twohop IEEE 802.16j relay networks,” in Proceedings of WCSP 2009, pp. 1–5, Nov 2009.
[26] B. Jaumard, T. M. Murillo, and S. Sebbah, “Scheduling vs. pseudo-scheduling models in
IEEE 802.16j wireless relay networks,” in Proceedings of QBSC 2012, pp. 101–106, May
2012.
[27] G. Hasegawa, R. Ishii, Y. Taniguchi, and H. Nakano, “Time slot assignment algorithms for
reducing transmission latency in IEEE 802.16j multi-hop relay networks,” Journal of
Communications and Networking, vol. 2, no. 3, Mar 2012.
[28] W.-H. Liao, K.-P. Shih, C. Liu, A. K. Dubey, S. Arora, and S. P. Kedia, “An efficient
scheduling algorithm for radio resource reuse in IEEE 802.16j multi-hop relay networks,”
Computers and Electrical Engineering, vol. 37, no. 4, pp. 511–525, July 2011.
[29] W. Wang, C. Chen, Z. Guo, J. Cai, and X. S. Shen, “Isolation band based frequency reuse
scheme for IEEE 802.16j wireless relay networks,” in Proceedings of QSHINE 2008, pp. 1–
7, July 2008.
16. Go Hasegawa, Shoichi Takagi, Yoshiaki Taniguchi, Hirotaka Nakano & Morito Matsuoka
International Journal of Computer Networks (IJCN), Volume (6) : Issue (3) : 2014 65
[30] F. Li, Y. Wang, X.-Y. Li, A. Nusairat, and Y. Wu, “Gateway placement for throughput
optimization in wireless mesh networks,” Mobile Networks and Applications, vol. 13, no. 1-2,
pp. 198–211, Apr 2008.
[31] G. Farhadi and norman C. Beaulieu, “Ergodic capacity of multi-hop wireless relaying systems
in Rayleigh fading,” in Proceedings of GLOBECOM 2008, pp. 1–6, Dec 2008.
[32] B. Sklar, “Rayleigh fading channels in mobile digital communication systems .I.
Characterization,” IEEE Communications Magazine, vol. 35, no. 7, pp. 90–100, July 1997.
[33] A. Chockalingam, M. Zorzi, L. Milstein, and P. Venkataram, “Performance of a wireless
access protocol on correlated Rayleigh fading channels with capture,” IEEE Transactions on
Communications, vol. 46, no. 5, pp. 644–655, May 1998.
[34] M. Zorziy, R. R. Raoz, and L. B. Milstein, “On the accuracy of a first-order markov model for
data transmission on fading channels,” in Proceedings of IEEE ICUPC ’95, pp. 211–215,
Nov 1995.
[35] M. Zorzi and R. Rao, “Capture and retransmission control in mobile radio,” IEEE Journal on
Selected Areas in Communications, vol. 12, no. 8, pp. 1289–1298, Oct 1994.
[36] Q. Liu, S. Zhou, and G. B. Giannakis, “Queuing with adaptive modulation and coding over
wireless links: Cross-layer analysis and design,” IEEE Transactions on Wireless
Communications, vol. 4, no. 3, pp. 1142–1153, May 2005.
[37] R. Fantacci, D. Marabissi, D. Tarchi, and I. Habib, “Adaptive modulation and coding
techniques for OFDMA systems,” IEEE Transactions on Wireless Communications, vol. 8,
no. 9, pp. 4876–4883, Sept 2009.
[38] F. Aurenhammer, “Voronoi diagrams - a survey of a fundamental geometric data structure,”
ACM Computing Surveys, vol. 23, no. 3, pp. 345–405, Sept 1991.
[39] M. Haenggi, “On routing in random Rayleigh fading networks,” IEEE Transactions on
Wireless Communications, vol. 4, no. 4, pp. 1553 – 1562, July 2005.
[40] X. Liu and M. Haenggi, “Performance analysis of Rayleigh fading ad hoc networks with
regular topology,” in Proceedings of GLOBECOM 2005, vol. 5, pp. 2725 –2729, Dec 2005.