This document summarizes research on vertical handoff performance in wireless local area networks (WLANs). It examines the data traffic received by different access points as mobile stations move between them. Graphs show how throughput and delay are impacted during handoffs. It also evaluates the performance of file transfer between wireless clients and servers connected by a WLAN backbone network comprising two routers. The document analyzes the effects of station mobility on metrics like traffic, delay, and throughput. In conclusion, it demonstrates vertical handoff triggering between a WiMAX and WLAN network as mobile nodes roam between the base stations.
These ppt are the part 2 of mobile computing concepts. These ppt defines the following things
Wireless Networking
Wireless LAN Overview: IEEE 802.11
Wireless applications
Data Broadcasting
Bluetooth
TCP over wireless
Mobile IP
WAP: Architecture, protocol stack, application
environment, applications.
Handover for 5G Networks using Fuzzy Logic: A ReviewAI Publications
The future organization world will be inserted with various ages of remote advances, like 4G and 5G. Simultaneously, the advancement of new gadgets outfitted with different interfaces is filling quickly as of late. As a result, the upward handover convention is created to give pervasive availability in the heterogeneous remote climate. Handover might be a fundamental a piece of any remote Mobile Communication Network. It is a way of mobile communication and portable communication during which cellular broadcast is relocate from one base station to another without losing connection to the mobile communication. Handover is one problem on Wireless Network (WN) and to unravel this problem various sorts of HO methods utilized in network. Fuzzy logic, Machine Learning and Optimization are the handover solving methods that are studied during this paper. This paper is a review of the handoff techniques. Fuzzy logic is that the best technique to unravel the HO problem and it's further implemented in 4G/5G network.
These ppt are the part 2 of mobile computing concepts. These ppt defines the following things
Wireless Networking
Wireless LAN Overview: IEEE 802.11
Wireless applications
Data Broadcasting
Bluetooth
TCP over wireless
Mobile IP
WAP: Architecture, protocol stack, application
environment, applications.
Handover for 5G Networks using Fuzzy Logic: A ReviewAI Publications
The future organization world will be inserted with various ages of remote advances, like 4G and 5G. Simultaneously, the advancement of new gadgets outfitted with different interfaces is filling quickly as of late. As a result, the upward handover convention is created to give pervasive availability in the heterogeneous remote climate. Handover might be a fundamental a piece of any remote Mobile Communication Network. It is a way of mobile communication and portable communication during which cellular broadcast is relocate from one base station to another without losing connection to the mobile communication. Handover is one problem on Wireless Network (WN) and to unravel this problem various sorts of HO methods utilized in network. Fuzzy logic, Machine Learning and Optimization are the handover solving methods that are studied during this paper. This paper is a review of the handoff techniques. Fuzzy logic is that the best technique to unravel the HO problem and it's further implemented in 4G/5G network.
UNIT II
WIRELESS NETWORKS
Wireless LAN – IEEE 802.11 Standards – Architecture – Services – Mobile Ad hoc Networks- WiFi and WiMAX - Wireless Local Loop
UNIT II MOBILE INTERNET PROTOCOL AND TRANSPORT LAYER
Overview of Mobile IP – Features of Mobile IP – Key Mechanism in Mobile IP – route Optimization. Overview of TCP/IP – Architecture of TCP/IP- Adaptation of TCP Window – Improvement in TCP Performance.
Fuzzy Based Vertical Handoff Decision Controller for Future NetworksIJAEMSJORNAL
Abstract— In Next generation wireless Networks, the received signals (RSS) from different networks do not have a same meaning since each network is composed of its specific characteristics and there is no common pilot signal. Then, RSS comparisons are insufficient for handoff decision and may be inefficient and impractical. A more complex decision criterion that combines a large number of parameters or factors such as monetary cost, bandwidth, and power consumption and user profile is necessary. Though there are a lot works available for vertical handoff decision (VHD) for wireless networks, the selection of best network is still challenging problem. In this paper we propose a Fuzzy based vertical handoff decision controller (FVHDC) Which performs handover decision based on the output of fuzzy based rules.
REDUCING HANDOVER DELAY BY PRESELECTIVE SCANNING USING GPS ijdpsjournal
IEEE 802.11 based mobile communication towers is used very much in many personal and industrial purposes as it provides a continuous connectivity to Mobile Nodes (MNs) and allows them to change their attachment point from old Access Point (A)P to new AP while needed. But one main problem of continuous connectivity is handover latency which consists of scanning, authentication and re-association phases. Scanning is the most time consuming part of handover process. In this paper, we introduce a prescanning mechanism using Global Positioning System (GPS) to reduce handover delay. In our method, scanning is completed almost before actual handover starts. From the simulation results, it can be seen that our proposed mechanism reduces handover delay by a great deal.
Call Admission Control (CAC) with Load Balancing Approach for the WLAN NetworksIJARIIT
The cell migrations take place between the different network operators, and require the significant information exchange between the operators to handle the migratory users. The new user registration requires the pre-shared information from the user’s equipment, which signifies the user recognition before registering the new user over the network. In this thesis, the proposed model has been aimed at the development of the new call admission control mechanism with the sub-channel assignment. The very basic utilization of the proposed model is to increase the number of the users over the given cell units, which is realized by using the sub-channel assignment to the users of the network. The proposed model is aimed at solving the issue by assigning the dual sub channels over the single communication channel. Also the proposed model is aimed at handling the minimum resource users by incorporating the load balancing approach over the given network segment. The load balancing approach shares the load of the overloaded cell with the cell with lowest resource utilization. The proposed model performance has been evaluated in the various scenarios and over all of the BTS nodes. The proposed model results have been obtained in the form of the resource utilization, network load, transmission delay, consumed bandwidth and data loss. The proposed model has shown the efficiency obtained by using the proposed call admission control (CAC) along with the new load balancing mechanism. The proposed model has shown the robustness of the proposed model in handling the cell overloading factors.
UNIT II
WIRELESS NETWORKS
Wireless LAN – IEEE 802.11 Standards – Architecture – Services – Mobile Ad hoc Networks- WiFi and WiMAX - Wireless Local Loop
UNIT II MOBILE INTERNET PROTOCOL AND TRANSPORT LAYER
Overview of Mobile IP – Features of Mobile IP – Key Mechanism in Mobile IP – route Optimization. Overview of TCP/IP – Architecture of TCP/IP- Adaptation of TCP Window – Improvement in TCP Performance.
Fuzzy Based Vertical Handoff Decision Controller for Future NetworksIJAEMSJORNAL
Abstract— In Next generation wireless Networks, the received signals (RSS) from different networks do not have a same meaning since each network is composed of its specific characteristics and there is no common pilot signal. Then, RSS comparisons are insufficient for handoff decision and may be inefficient and impractical. A more complex decision criterion that combines a large number of parameters or factors such as monetary cost, bandwidth, and power consumption and user profile is necessary. Though there are a lot works available for vertical handoff decision (VHD) for wireless networks, the selection of best network is still challenging problem. In this paper we propose a Fuzzy based vertical handoff decision controller (FVHDC) Which performs handover decision based on the output of fuzzy based rules.
REDUCING HANDOVER DELAY BY PRESELECTIVE SCANNING USING GPS ijdpsjournal
IEEE 802.11 based mobile communication towers is used very much in many personal and industrial purposes as it provides a continuous connectivity to Mobile Nodes (MNs) and allows them to change their attachment point from old Access Point (A)P to new AP while needed. But one main problem of continuous connectivity is handover latency which consists of scanning, authentication and re-association phases. Scanning is the most time consuming part of handover process. In this paper, we introduce a prescanning mechanism using Global Positioning System (GPS) to reduce handover delay. In our method, scanning is completed almost before actual handover starts. From the simulation results, it can be seen that our proposed mechanism reduces handover delay by a great deal.
Call Admission Control (CAC) with Load Balancing Approach for the WLAN NetworksIJARIIT
The cell migrations take place between the different network operators, and require the significant information exchange between the operators to handle the migratory users. The new user registration requires the pre-shared information from the user’s equipment, which signifies the user recognition before registering the new user over the network. In this thesis, the proposed model has been aimed at the development of the new call admission control mechanism with the sub-channel assignment. The very basic utilization of the proposed model is to increase the number of the users over the given cell units, which is realized by using the sub-channel assignment to the users of the network. The proposed model is aimed at solving the issue by assigning the dual sub channels over the single communication channel. Also the proposed model is aimed at handling the minimum resource users by incorporating the load balancing approach over the given network segment. The load balancing approach shares the load of the overloaded cell with the cell with lowest resource utilization. The proposed model performance has been evaluated in the various scenarios and over all of the BTS nodes. The proposed model results have been obtained in the form of the resource utilization, network load, transmission delay, consumed bandwidth and data loss. The proposed model has shown the efficiency obtained by using the proposed call admission control (CAC) along with the new load balancing mechanism. The proposed model has shown the robustness of the proposed model in handling the cell overloading factors.
A Survey on Vehicle to Infrastructure Communication SystemIOSR Journals
Abstract: Vehicle-to-Infrastructure (V2I) Communications for Safety is the wireless exchange of critical safety
and operational data between vehicles and roadway infrastructure, intended primarily to avoid motor vehicle
crashes. Vehicle-to-infrastructure (V2I) communication based on wireless local area network (WLAN) IEEE
802.11 standard technology can support user in-motion to achieve preferable Internet connectivity. This
standard is created for urgent short message transmission.The IEEE 802.11 standard defines an infracture
mode with at least one central access point connected to a wired network. In this paper we present an
experimental study of IEEE802.11g using off-the-shelf devices in vehicle-to-infrastructure small scale scenario.
In order to evaluate the V2I the type of communication in large scale scenario and intelligent transportation
systems (ITS) will necessitate wireless vehicle-to-infrastructure (V2I) communica-tions. This wireless link can
be implemented by several technolo-gies, such as digital broadcasting, cellular communication, or dedicated
short range communication (DSRC) systems. Analyses of the coverage and capacity requirements are presented
when each of the three systems are used to implement the V2I link
Keywords: Short Range Vehicle Network; 802.11g; wireless network; goodput; network performance;
transport; mobile stations; auto traffic; vehicle speed
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...IOSR Journals
Abstract : Wireless communications is the fastest growing segment of the communications industry. Everyone wants the quality of services anytime & anywhere. Wireless networks can integrate various heterogeneous radio access technologies as GSM, WLAN, Wimax etc. WiMAX is an IP based, wireless broadband access technology that provides performance similar to 802.11/Wi-Fi networks with the coverage and QOS (quality of service) of cellular networks. WiMAX is also an acronym meaning "Worldwide Interoperability for Microwave Access (WiMAX). The main promise of interconnecting these heterogeneous networks is to provide high performance in achieving a high data rate and support real time applications. These services require various networks (such as CDMA2000 and Wireless LAN) to be integrated into IP-based networks, which further require a seamless vertical handoff to 4th generation wireless networks. When a mobile host (MH) changes its point of attachment, its IP address gets changed. MH should be able to maintain all the existing connections using the new IP address. This process of changing a connection from one IP address to another one in IP network is called handoff. Vertical handoff is switching from one network to another while maintaining the session. Vertical Handoff (VHO) is a major concern for different heterogeneous networks. VHO can be user requested or based on some criteria already designed by the researcher of that particular algorithm. The main objective is to implement efficient & effective handoff scheme between two heterogeneous network ie. 802.11 WLAN & CDMA. Keywords - CDMA , 4G, Vertical Handoff, WLAN
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...IOSR Journals
Wireless communications is the fastest growing segment of the communications industry. Everyone
wants the quality of services anytime & anywhere. Wireless networks can integrate various heterogeneous radio
access technologies as GSM, WLAN, Wimax etc. WiMAX is an IP based, wireless broadband access technology
that provides performance similar to 802.11/Wi-Fi networks with the coverage and QOS (quality of service) of
cellular networks. WiMAX is also an acronym meaning "Worldwide Interoperability for Microwave Access
(WiMAX). The main promise of interconnecting these heterogeneous networks is to provide high performance in
achieving a high data rate and support real time applications. These services require various networks (such as
CDMA2000 and Wireless LAN) to be integrated into IP-based networks, which further require a seamless
vertical handoff to 4th generation wireless networks. When a mobile host (MH) changes its point of attachment,
its IP address gets changed. MH should be able to maintain all the existing connections using the new IP
address. This process of changing a connection from one IP address to another one in IP network is called
handoff. Vertical handoff is switching from one network to another while maintaining the session. Vertical
Handoff (VHO) is a major concern for different heterogeneous networks. VHO can be user requested or based
on some criteria already designed by the researcher of that particular algorithm. The main objective is to
implement efficient & effective handoff scheme between two heterogeneous network ie. 802.11 WLAN &
CDMA
A Study on Access Point Selection Algorithms in Wireless Mesh NetworksEswar Publications
In IEEE 802.11 based wireless mesh network (WMN), a mesh client often finds multiple access points (AP) to associate with. How to select the best AP is the open research problem. The traditional AP selection method defined by IEEE 802.11 standard is based on received signal strength. This method is proven inefficient as it does not consider many important factors such as channel conditions, AP load, etc. Many alternate solutions have been proposed so far in the literature, but they are all focused on wireless local area network (WLAN) environment. As there are significant differences between WLAN and WMN, all these proposed association mechanisms must be redesigned to fit into WMN environment. This paper studies the AP selection problem in the context of WMN. We critically analyze the existing work and identify technical challenges involved in AP selection problem. This paper also provides directions to design the metrics of AP selection method in WMN.
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environmentijsrd.com
In Wireless Adhoc Network is a group of wireless mobile nodes is an autonomous system of mobile nodes connected by wireless links. Every node operates as an end system and as a router to forward packets. In this paper mainly focused on Mac layer because this layer is most important for the data communication using control the packet loss and we worked on the comparison based performance of wimax802.16 and wireless802.11 networks using Ad hoc on- demand Distance Vector Routing Protocol and Dynamic Source Routing Protocol. In this paper we used the different maximum speed for the network. And this comparison based on unicast On-demand routing procedure and our simulation for mobile ad hoc networks discover and maintain only needed the design and follows the idea that each node by sending routing packets whenever a communication is requested and compared various parameter packet delivery ratio, normalized routing load and e-e delay. These simulations are carried out using the Network simulator version-2. The results presented in this work illustrate the importance in carefully evaluating and implementing routing protocols in an ad hoc environment.
Enhanced Seamless Handoff Using Multiple Access Points in Wireless Local Area...IJERA Editor
The Mobility in wireless cellular communication systems is its backbone so as to enhance the quality of service and maintain the continuous service. Handoff is an important task in maintaining the continuity of call in cellular systems and its failure can result in ongoing call termination. In cellular mobile networks, the coverage region is divided into smaller cells in order to achieve high system capacity. Each cell has a Base-Station (BS), which provides the service to the Mobile Terminals (MTs), i.e. users equipped with phones, within its region. Before a mobile user can communicate with other user(s) in the network, a group of the frequency bands or channels should usually be assigned. The MTs is free to move across cells. When the mobile user crossing a cell boundary or by deterioration in quality of the signal in the current channel, handoff process is initiated. The scope of this project is to design 802.11 handoff schemes to solve the handoff problems in closely-spaced WLANs.The major problem in multiple WLANs are so many users trying to use same access point(AP), and interferences from nearby WLAN. The better hand off scheme based on signal strength and velocity of the nodes is proposed. The simulation results show that the proposed handoff scheme significantly reduces packet losses compared with existing handoff schemes.
Enhanced Seamless Handoff Using Multiple Access Points in Wireless Local Area...IJERA Editor
The Mobility in wireless cellular communication systems is its backbone so as to enhance the quality of service and maintain the continuous service. Handoff is an important task in maintaining the continuity of call in cellular systems and its failure can result in ongoing call termination. In cellular mobile networks, the coverage region is divided into smaller cells in order to achieve high system capacity. Each cell has a Base-Station (BS), which provides the service to the Mobile Terminals (MTs), i.e. users equipped with phones, within its region. Before a mobile user can communicate with other user(s) in the network, a group of the frequency bands or channels should usually be assigned. The MTs is free to move across cells. When the mobile user crossing a cell boundary or by deterioration in quality of the signal in the current channel, handoff process is initiated. The scope of this project is to design 802.11 handoff schemes to solve the handoff problems in closely-spaced WLANs.The major problem in multiple WLANs are so many users trying to use same access point(AP), and interferences from nearby WLAN. The better hand off scheme based on signal strength and velocity of the nodes is proposed. The simulation results show that the proposed handoff scheme significantly reduces packet losses compared with existing handoff schemes.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
Online aptitude test management system project report.pdfKamal Acharya
The purpose of on-line aptitude test system is to take online test in an efficient manner and no time wasting for checking the paper. The main objective of on-line aptitude test system is to efficiently evaluate the candidate thoroughly through a fully automated system that not only saves lot of time but also gives fast results. For students they give papers according to their convenience and time and there is no need of using extra thing like paper, pen etc. This can be used in educational institutions as well as in corporate world. Can be used anywhere any time as it is a web based application (user Location doesn’t matter). No restriction that examiner has to be present when the candidate takes the test.
Every time when lecturers/professors need to conduct examinations they have to sit down think about the questions and then create a whole new set of questions for each and every exam. In some cases the professor may want to give an open book online exam that is the student can take the exam any time anywhere, but the student might have to answer the questions in a limited time period. The professor may want to change the sequence of questions for every student. The problem that a student has is whenever a date for the exam is declared the student has to take it and there is no way he can take it at some other time. This project will create an interface for the examiner to create and store questions in a repository. It will also create an interface for the student to take examinations at his convenience and the questions and/or exams may be timed. Thereby creating an application which can be used by examiners and examinee’s simultaneously.
Examination System is very useful for Teachers/Professors. As in the teaching profession, you are responsible for writing question papers. In the conventional method, you write the question paper on paper, keep question papers separate from answers and all this information you have to keep in a locker to avoid unauthorized access. Using the Examination System you can create a question paper and everything will be written to a single exam file in encrypted format. You can set the General and Administrator password to avoid unauthorized access to your question paper. Every time you start the examination, the program shuffles all the questions and selects them randomly from the database, which reduces the chances of memorizing the questions.
ACEP Magazine edition 4th launched on 05.06.2024Rahul
This document provides information about the third edition of the magazine "Sthapatya" published by the Association of Civil Engineers (Practicing) Aurangabad. It includes messages from current and past presidents of ACEP, memories and photos from past ACEP events, information on life time achievement awards given by ACEP, and a technical article on concrete maintenance, repairs and strengthening. The document highlights activities of ACEP and provides a technical educational article for members.
Water billing management system project report.pdfKamal Acharya
Our project entitled “Water Billing Management System” aims is to generate Water bill with all the charges and penalty. Manual system that is employed is extremely laborious and quite inadequate. It only makes the process more difficult and hard.
The aim of our project is to develop a system that is meant to partially computerize the work performed in the Water Board like generating monthly Water bill, record of consuming unit of water, store record of the customer and previous unpaid record.
We used HTML/PHP as front end and MYSQL as back end for developing our project. HTML is primarily a visual design environment. We can create a android application by designing the form and that make up the user interface. Adding android application code to the form and the objects such as buttons and text boxes on them and adding any required support code in additional modular.
MySQL is free open source database that facilitates the effective management of the databases by connecting them to the software. It is a stable ,reliable and the powerful solution with the advanced features and advantages which are as follows: Data Security.MySQL is free open source database that facilitates the effective management of the databases by connecting them to the software.
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...ssuser7dcef0
Power plants release a large amount of water vapor into the
atmosphere through the stack. The flue gas can be a potential
source for obtaining much needed cooling water for a power
plant. If a power plant could recover and reuse a portion of this
moisture, it could reduce its total cooling water intake
requirement. One of the most practical way to recover water
from flue gas is to use a condensing heat exchanger. The power
plant could also recover latent heat due to condensation as well
as sensible heat due to lowering the flue gas exit temperature.
Additionally, harmful acids released from the stack can be
reduced in a condensing heat exchanger by acid condensation. reduced in a condensing heat exchanger by acid condensation.
Condensation of vapors in flue gas is a complicated
phenomenon since heat and mass transfer of water vapor and
various acids simultaneously occur in the presence of noncondensable
gases such as nitrogen and oxygen. Design of a
condenser depends on the knowledge and understanding of the
heat and mass transfer processes. A computer program for
numerical simulations of water (H2O) and sulfuric acid (H2SO4)
condensation in a flue gas condensing heat exchanger was
developed using MATLAB. Governing equations based on
mass and energy balances for the system were derived to
predict variables such as flue gas exit temperature, cooling
water outlet temperature, mole fraction and condensation rates
of water and sulfuric acid vapors. The equations were solved
using an iterative solution technique with calculations of heat
and mass transfer coefficients and physical properties.
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
Paper id 2720145
1. International Journal of Research in Advent Technology, Vol.2, No.7, July 2014
E-ISSN: 2321-9637
7
Vertical Handoff Performance in WLAN Wireless
Networks
Renu1, Anil Dudy2
Electronics and communication1, 2,Shri Baba Mastnath Engg. college1, 2
Email:renudalal89@gmail.com1, anildudy10@gmail.com2
Abstract- The WiFi handoff setup compares the data traffic received by different APs in the network. Since
the initial stations of AP_0 are mobile ones, AP_0 receives data traffic only at the beginning and then at end of
simulation when its stations start their tour and come back. Additionally, it receives data traffic when the
stations started from south visit its section and get connected to it. In contrast to AP_0, AP_2 has stable stations,
so the data traffic received by it does not drop to 0 like AP_0's traffic. As expected, its received data traffic
doubles when the moving stations from west and south cross its section. AP_3 is visited by all moving stations
at the same time. Hence, its received data traffic is tripled when this happens during simulation. Hence the
throughput and delay for the wlan MS is obtained. The vertical handover setup consists of a gateway,
application server providing voice service to the wimax BS and to the wlan router.
Index Terms- AP, DCF, PCF, LAN, WLAN
1. INTRODUCTION
Communication is always necessary in building
relations to mankind, when two persons meet they
need some medium to interchange their views but due
to distance barriers some tools are required to
communicate each other. At the end of 19th century,
renowned scientist Graham Bell laid the first stone in
the field of communication using different tools
regardless of distance. He invented first wired base
telephony equipment. It was the solution for the voice
communication for the people how far apart they are.
After this radio based communication systems Era
started. It was an extension of wired based networks.
In the beginning it was developed for some special
purposes like military and police usage. With the
passage of time these systems emerged to allow
common peoples to communicate with each other,
rather than using wired based network. After this the
age of faster communication and capabilities of voice
get started and evolved into new telecommunication
system. The capability to achieve wireless access
anywhere, anytime, and anyplace has become
common expectation as it provides significant
flexibility and freedom in mobility. But to achieve
global mobility in heterogeneous networks for any
mobile device requires seamless connectivity using
vertical handoff. Since none of the existing wireless
frameworks provide practical solutions for vertical
handoff. End-to-End Vertical Handoff (E2EVH)
proposed in this paper offers a new concept to
perform vertical handoff between heterogeneous
wireless networks. To deliver network services
without interruption, E2EVH present a novel design
to monitor the network availability, it then picks the
best accessible network for application layer [1].
2. WIRELESS LAN SYSTEM
The Wireless Local Area Network (WLAN) is an
unlicensed band of 802.11 ISM frequency band.
802.11 is one of the recent communication
technologies of IEEE standard. It specifies
medium access control (MAC) and physical layer
that is why it is called Wireless LAN. It has three
widely used types which operates on different
frequency bands. These three types are 802.11a,
802.11b and 802.11g. 802.11a operates on 5 GHz
frequency band and it gives the maximum data rate
speed of 54 Mbps, which is higher than 802.11b
because 802.11b operates on 2.4 GHz frequency
band and give the maximum data rate speed of
11Mbps. 802.11b operates. 802.11g is recently
developed standards of Wireless LAN. It also
operates on 2.4 GHz frequency band and give the
maximum data rate speed of 54 Mbps. In 802.11
Wireless LAN standards, the two types of MAC
protocols Distributed Coordination Function (DCF)
and Point Coordination Function (PCF) are used.
Nowadays the most applications available in the
markets are uses DCF because it is simple,
robust and easy to implement.
DCF is the basic MAC layer function in Wireless
LANs, Which used Carrier Sense Multiple Access
technique (CSMA) also with an addition of
Collision Avoidance of (CA). It resolves the CA
problems of the packets transmitted at the same
time.
Architecture of Wireless LAN
Wireless Local Area Network instigate as an
overlay to the Wired Local Area Network.
Lightweight and Autonomous are two discrete
architectures used in WLAN environment.
2. International Journal of Research in Advent Technology, Vol.2, No.7, July 2014
E-ISSN: 2321-9637
8
Each of the architectures has wide impact on
wired LAN architecture. The selection of
WLAN architecture is based on the consideration
of building, future proof, integrated wired and
Wireless LAN to accomplish high return on
investment. Both architectures are popular but
Lightweight architecture has plus advantages over
the WLAN market.
2.1 Lightweight Model
Lightweight is the part of WLAN architecture.
With most of wireless intelligence which residing
at central controlling device, lightweight Wireless
Access Point architecture have narrow
functionality.
Fig 1: Lightweight Architecture Model
Lightweight model is simple. The devices that
provide the communication to the end user as
Access Layer are identified by lightweight.
Distribution layer provide the inter
communication and the top layer (Core Layer) of
Lightweight model is responsible fast and
consistent data between networks.
Wireless Access Point (WAP) resides at the
interface of access layer and provides the
communication interface to end user. In
lightweight architecture model, the
management of operation is easy because it give
the permission to WAP from single device,
because the lightweight WAP have the knowledge
of visibility and attentiveness of the neighbours
WAPs. They can observe and if any one of their
neighbours becomes the victim of fault it notifies
the wireless controller.
Lightweight WAP may be Self-healing because
to pay compensation for unsuccessful counterpart,
controller commands the neighbouring WAP to
regulate their power level, where as in
autonomous there is no concept of the visibility of
its WAP neighbouring and in this case to perform
self healing it cannot adjust the power level.
If single WAP is busy or overloaded then in
this situation wireless controller can relieve the
wireless client to neighbouring WAP. In critical
applications such as VoIP, self-healing and load
balancing are important issues.
2.2 Autonomous Model
In Autonomous Model WAP is not mandatory as
shown in Fig. 2.
Fig 2: Autonomous Architecture Model
Autonomous Wireless Access Point sustains
the switching and strong security as well as
networking function that are indispensable to
route the wireless traffic. As in autonomous
system there is no concept of the visibility of
WAP so it cannot make the load balancing.
Autonomous model cannot differentiate whether
nearest WAP is part of WLAN infrastructure or
illegal rouge WAP. The difference between the
autonomous and lightweight is negligible. The
difference is only this that lightweight have one
extra component (WLAN controller).
VERTICAL HANDOVER
Between the heterogeneous wireless networks the
handover process can be set apart in to handover
execution and handover decision process. In
handover decision process both the mobile node
and network decides that when the handover
process will be occur. After taken handover
decision, the handover execution process
continues. The handover decision process
involves supplementary network information such
3. International Journal of Research in Advent Technology, Vol.2, No.7, July 2014
E-ISSN: 2321-9637
9
as replica address detection time in Mobile IPv6,
when handover decision and detection process
overlaps. The handover delay can be alienated in
to three main mechanisms.
Discovery Time (td)
In this process via link layer beacon, the mobile
terminal perceive that it is in the under the range
of new wireless network from where it get the
Router Advertisement (RA) of new access router.
Through the RA and triggered-based router
solicitation from access router in the visited
network, the MT detects the coverage on new
network.
Address Configuration Period (tc)
In this period the MT receive the Router
Advertisement (RA) and updates its routing
table and assign the new Care of Address (CoA)
to all its interfaces. This new CoA based on
new access router accessible form RA.
Network Registration Period (tr)
In this period the binding updates are transmit to
Home Agent (HA) as well as correspondent node
and collect the acknowledgement from
correspondent node. As binding
acknowledgement from correspondent node is
elective, so we consider the situation when
mobile node accept packet from correspondent.
Thus an IP level handover consist of td, tc and
tr. This recommended that by optimizing IP-level
vertical handover delay would really involve
minimizing the discovery time and network
registration period, where as address
configuration period based on mobile device
computing potential.
3. Simulation results
Horizontal handoff in WiFi network
This scenario shows the mobile station performance
during horizontal handoff (roaming) between eight
APs while the MS is moving in clock wise
direction. This scenario shows WiFi wireless
technology. This scenario also comprise one video
conferencing server, one client connected to the
server via L3 switch and wlan stations surrounding
the access points. STA_0, STA_1, STA_2,
STA_18, STA_19, STA_20 are roaming at a speed
of 30 m/s around the access points and rest all
stations are stationary. All the links used here are
100 BASE T links. The MS is roaming from AP0 to
AP7 at the speed of 1 m/sec. The throughput of the
MS that is stable between 10k – 20k bit/sec. But the
throughput drops down during the handoff. The
maxim delay points are 0.040 sec., which is
considered to be tolerable for most applications.
Fig. 3 : Set–up of WiFi Handoff
Table 1 : Wireless LAN Parameters (for mobile
node)
BSS Identifier 0
Access Point
Functionality
Disabled
Physical Characteristics Direct Sequence
Data Rate (bps) 11 Mbps
Transmit Power (W) 0.002
Packet Reception-
-95
Power Threshold (dbm)
CTS-to-self Option Enabled
Short Retry Limit 7
Long Retry Limit 4
AP Beacon Interval
(secs)
0.02
Max Receive Lifetime
(secs)
0.5
Buffer Size (bits) 256000
Roaming Capability Enabled
Large Packet
Processing
Drop
Initially due to set up time, the delay is more. Then
the mobile node and the stations start roaming
around the access points and hence the delay is
almost constant. Then after 9 minutes there is small
increase in the delay which is again due to the non
4. International Journal of Research in Advent Technology, Vol.2, No.7, July 2014
E-ISSN: 2321-9637
10
availability of stations. (bits/sec). The simulation
time is 10 min. The throughput drops during
handoff.
Fig 4 : Throughput and delay for MS in the WiFi
set-up
Wlan Backbone
OPNET WLAN models support wireless-LAN
backbones that consist of routers with WLAN
interfaces belonging to the same BSS. These
backbones can serve to WLAN EBSSs as well, where
they are connected to the wireless backbone via their
access points like they would be connected to a wired
backbone. This scenario is built to provide an
example on configuring such networks.
Fig 5 : Wlan network with wireless sever, router,
wireless clients
The network contains wireless FTP clients and a
wireless FTP servers. The clients and server belong
to different wireless- LANs, BSS 0 and BSS 1,
respectively. These two LANs connected to each
other with two routers. These routers, which have
two WLAN interfaces, serve as the access points for
BSS 0 and BSS 1 and also compose the WLAN-backbone,
which is the BSS 2. To achieve this,
among the two WLAN interfaces of Wireless
Router 0, the first interface, IF0, was configured as
an access point and its BSS ID was set to 0. The
access point fuctionality of the other interface, IF1,
was disabled and its BSS ID was set to 2. The
second router was also configured similarly. Hence,
IF0s on the routers became the access points, and
IF1s were connected to the backbone. The
backbone-LAN, BSS 2, does not have an access
point and doesn't need to have one, though it is
possible to configure one of the backbone interfaces
as an access point. Additionally the physical layer
technology used by IF1s on the routers are set to
"OFDM (802.11a)" to enable 802.11a data rates and
their data rates are set to 54 Mbps. In other words,
BSS 2 deploys the 802.11a PHY, while BSS 0 and
BSS 1 use 802.11/11b PHYs. FTP client 5 is
moving at a speed of 1 m/s in the defined trajectory
path. While all other clients are stationary.
Two routers form a wireless backbone network.
FTP server, wireless router 1 is in one BSS,
wireless router 0 and wireless router 1 are in other
BSS, the FTP clients and wireless router 0 are in
another BSS.
Table 2 : Wireless LAN Parameters (for
Wireless FTP clients)
BSS Identifier 0
Access Point
Functionality
Disabled
Physical Characteristics Direct Sequence
Data Rate (bps) 2 Mbps
Transmit Power (W) 0.005
Packet Reception-
-95
Power Threshold (dbm)
CTS-to-self Option Enabled
Short Retry Limit 7
Long Retry Limit 4
AP Beacon Interval
(secs)
0.02
Max Receive Lifetime
(secs)
0.5
Buffer Size (bits) 256000
Roaming Capability Enabled
Large Packet
Processing
Drop
5. International Journal of Research in Advent Technology, Vol.2, No.7, July 2014
E-ISSN: 2321-9637
11
The performance of all the wireless FTP clients is
observed and graphs obtained for delay, throughput
and traffic received, traffic sent for the FTP clients.
Since the FTP data is sent and received in the form
of packets, hence the graphs show various sharp
peaks.
Simulation time is taken as 4 Minutes.
Fig 6: Traffic received and traffic sent (packets/sec) for FTP
client 5
Fig 7 : delay and throughput for FTP client 5
Fig. 8 : Delay and throughput for FTP client 2
Fig. 9 : Traffic received and traffic sent (packets/sec) for FTP
client 2
The differences in the delay, throughput of FTP
client 5 and FTP client 2 can be easily seen from the
above graphs. As we know that FTP client 5 is
roaming in BSS 0 following some defined
trajectory, while FTP client 2 is stationary as all
others are. And hence the traffic received (bits/sec),
6. International Journal of Research in Advent Technology, Vol.2, No.7, July 2014
E-ISSN: 2321-9637
12
traffic sent (bits/sec), delay (sec), throughput
(bits/sec) is different for them.
Figure 10: Delay and throughput for the Wireless
FTP Server
From the above graph it is clear that the set up time is
more than 1 minute, after which the FTP data packets
transmission starts.
Results saved with the scenario indicate the FTP
traffic successfully flowing over the WLAN backbone
between the wireless clients and server.
4. CONCLUSION
The vertical handover setup consists of a gateway,
application server providing voice service to the
wimax BS and to the wlan router. Initially both the
mobile nodes are placed near the wimax BS from
where they start roaming towards the wlan router. As
they reach near the router, the wimax throughput is
reduced and the WLAN throughput starts increasing
which depicts vertical handoff triggering properties.
The graphs for throughput and delay are obtained as
expected.
REFERENCES
[1] Di Tian ; Georganas, Nicolas D., et.al.
"Energy efficient routing with delivery in
wireless sensor networks”, IEEE Wireless
Communications and Networking, Vol: 3, Pag:
1923 – 1929, 2003.
[2] El-Hoiydi: On the Lifetime of Wireless Sensor
Networks, IEEE Com- munications Letters, Vol.
9, No. 11, November 2005.
[3] Carlos de Morais Cordeiro, Dharma Prakash
Agrawal ,Ad-hoc and sensor networks theory and
application, World Scientific publication,2006.
[4] L. Pomante: Wireless Sensor Networks, Seminar
in Wireless Communications -University of
L’Aquila, March 2007.
[5] Shah, T. ; Javaid, N. ; Qureshi, T.N.,
"Energy Efficient Sleep Awake Aware
(EESAA)intelligent Sensor Network routing proto
col”, International Multitopic Conference
(INMIC), , Page(s): 317 – 322, 2012.
[6] W. Heinzelman, A. Chandrakasan, and H.
Balakrishnan, “Energy-efficient routing protocols
for wireless micro sensor networks,” in Proc.
33rdHawaii Int. Conf. System Sciences(HICSS),
Maui, HI,Jan. 2000