SlideShare a Scribd company logo
International Journal of Research in Advent Technology, Vol.2, No.7, July 2014 
E-ISSN: 2321-9637 
7 
Vertical Handoff Performance in WLAN Wireless 
Networks 
Renu1, Anil Dudy2 
Electronics and communication1, 2,Shri Baba Mastnath Engg. college1, 2 
Email:renudalal89@gmail.com1, anildudy10@gmail.com2 
Abstract- The WiFi handoff setup compares the data traffic received by different APs in the network. Since 
the initial stations of AP_0 are mobile ones, AP_0 receives data traffic only at the beginning and then at end of 
simulation when its stations start their tour and come back. Additionally, it receives data traffic when the 
stations started from south visit its section and get connected to it. In contrast to AP_0, AP_2 has stable stations, 
so the data traffic received by it does not drop to 0 like AP_0's traffic. As expected, its received data traffic 
doubles when the moving stations from west and south cross its section. AP_3 is visited by all moving stations 
at the same time. Hence, its received data traffic is tripled when this happens during simulation. Hence the 
throughput and delay for the wlan MS is obtained. The vertical handover setup consists of a gateway, 
application server providing voice service to the wimax BS and to the wlan router. 
Index Terms- AP, DCF, PCF, LAN, WLAN 
1. INTRODUCTION 
Communication is always necessary in building 
relations to mankind, when two persons meet they 
need some medium to interchange their views but due 
to distance barriers some tools are required to 
communicate each other. At the end of 19th century, 
renowned scientist Graham Bell laid the first stone in 
the field of communication using different tools 
regardless of distance. He invented first wired base 
telephony equipment. It was the solution for the voice 
communication for the people how far apart they are. 
After this radio based communication systems Era 
started. It was an extension of wired based networks. 
In the beginning it was developed for some special 
purposes like military and police usage. With the 
passage of time these systems emerged to allow 
common peoples to communicate with each other, 
rather than using wired based network. After this the 
age of faster communication and capabilities of voice 
get started and evolved into new telecommunication 
system. The capability to achieve wireless access 
anywhere, anytime, and anyplace has become 
common expectation as it provides significant 
flexibility and freedom in mobility. But to achieve 
global mobility in heterogeneous networks for any 
mobile device requires seamless connectivity using 
vertical handoff. Since none of the existing wireless 
frameworks provide practical solutions for vertical 
handoff. End-to-End Vertical Handoff (E2EVH) 
proposed in this paper offers a new concept to 
perform vertical handoff between heterogeneous 
wireless networks. To deliver network services 
without interruption, E2EVH present a novel design 
to monitor the network availability, it then picks the 
best accessible network for application layer [1]. 
2. WIRELESS LAN SYSTEM 
The Wireless Local Area Network (WLAN) is an 
unlicensed band of 802.11 ISM frequency band. 
802.11 is one of the recent communication 
technologies of IEEE standard. It specifies 
medium access control (MAC) and physical layer 
that is why it is called Wireless LAN. It has three 
widely used types which operates on different 
frequency bands. These three types are 802.11a, 
802.11b and 802.11g. 802.11a operates on 5 GHz 
frequency band and it gives the maximum data rate 
speed of 54 Mbps, which is higher than 802.11b 
because 802.11b operates on 2.4 GHz frequency 
band and give the maximum data rate speed of 
11Mbps. 802.11b operates. 802.11g is recently 
developed standards of Wireless LAN. It also 
operates on 2.4 GHz frequency band and give the 
maximum data rate speed of 54 Mbps. In 802.11 
Wireless LAN standards, the two types of MAC 
protocols Distributed Coordination Function (DCF) 
and Point Coordination Function (PCF) are used. 
Nowadays the most applications available in the 
markets are uses DCF because it is simple, 
robust and easy to implement. 
DCF is the basic MAC layer function in Wireless 
LANs, Which used Carrier Sense Multiple Access 
technique (CSMA) also with an addition of 
Collision Avoidance of (CA). It resolves the CA 
problems of the packets transmitted at the same 
time. 
Architecture of Wireless LAN 
Wireless Local Area Network instigate as an 
overlay to the Wired Local Area Network. 
Lightweight and Autonomous are two discrete 
architectures used in WLAN environment.
International Journal of Research in Advent Technology, Vol.2, No.7, July 2014 
E-ISSN: 2321-9637 
8 
Each of the architectures has wide impact on 
wired LAN architecture. The selection of 
WLAN architecture is based on the consideration 
of building, future proof, integrated wired and 
Wireless LAN to accomplish high return on 
investment. Both architectures are popular but 
Lightweight architecture has plus advantages over 
the WLAN market. 
2.1 Lightweight Model 
Lightweight is the part of WLAN architecture. 
With most of wireless intelligence which residing 
at central controlling device, lightweight Wireless 
Access Point architecture have narrow 
functionality. 
Fig 1: Lightweight Architecture Model 
Lightweight model is simple. The devices that 
provide the communication to the end user as 
Access Layer are identified by lightweight. 
Distribution layer provide the inter 
communication and the top layer (Core Layer) of 
Lightweight model is responsible fast and 
consistent data between networks. 
Wireless Access Point (WAP) resides at the 
interface of access layer and provides the 
communication interface to end user. In 
lightweight architecture model, the 
management of operation is easy because it give 
the permission to WAP from single device, 
because the lightweight WAP have the knowledge 
of visibility and attentiveness of the neighbours 
WAPs. They can observe and if any one of their 
neighbours becomes the victim of fault it notifies 
the wireless controller. 
Lightweight WAP may be Self-healing because 
to pay compensation for unsuccessful counterpart, 
controller commands the neighbouring WAP to 
regulate their power level, where as in 
autonomous there is no concept of the visibility of 
its WAP neighbouring and in this case to perform 
self healing it cannot adjust the power level. 
If single WAP is busy or overloaded then in 
this situation wireless controller can relieve the 
wireless client to neighbouring WAP. In critical 
applications such as VoIP, self-healing and load 
balancing are important issues. 
2.2 Autonomous Model 
In Autonomous Model WAP is not mandatory as 
shown in Fig. 2. 
Fig 2: Autonomous Architecture Model 
Autonomous Wireless Access Point sustains 
the switching and strong security as well as 
networking function that are indispensable to 
route the wireless traffic. As in autonomous 
system there is no concept of the visibility of 
WAP so it cannot make the load balancing. 
Autonomous model cannot differentiate whether 
nearest WAP is part of WLAN infrastructure or 
illegal rouge WAP. The difference between the 
autonomous and lightweight is negligible. The 
difference is only this that lightweight have one 
extra component (WLAN controller). 
VERTICAL HANDOVER 
Between the heterogeneous wireless networks the 
handover process can be set apart in to handover 
execution and handover decision process. In 
handover decision process both the mobile node 
and network decides that when the handover 
process will be occur. After taken handover 
decision, the handover execution process 
continues. The handover decision process 
involves supplementary network information such
International Journal of Research in Advent Technology, Vol.2, No.7, July 2014 
E-ISSN: 2321-9637 
9 
as replica address detection time in Mobile IPv6, 
when handover decision and detection process 
overlaps. The handover delay can be alienated in 
to three main mechanisms. 
Discovery Time (td) 
In this process via link layer beacon, the mobile 
terminal perceive that it is in the under the range 
of new wireless network from where it get the 
Router Advertisement (RA) of new access router. 
Through the RA and triggered-based router 
solicitation from access router in the visited 
network, the MT detects the coverage on new 
network. 
Address Configuration Period (tc) 
In this period the MT receive the Router 
Advertisement (RA) and updates its routing 
table and assign the new Care of Address (CoA) 
to all its interfaces. This new CoA based on 
new access router accessible form RA. 
Network Registration Period (tr) 
In this period the binding updates are transmit to 
Home Agent (HA) as well as correspondent node 
and collect the acknowledgement from 
correspondent node. As binding 
acknowledgement from correspondent node is 
elective, so we consider the situation when 
mobile node accept packet from correspondent. 
Thus an IP level handover consist of td, tc and 
tr. This recommended that by optimizing IP-level 
vertical handover delay would really involve 
minimizing the discovery time and network 
registration period, where as address 
configuration period based on mobile device 
computing potential. 
3. Simulation results 
Horizontal handoff in WiFi network 
This scenario shows the mobile station performance 
during horizontal handoff (roaming) between eight 
APs while the MS is moving in clock wise 
direction. This scenario shows WiFi wireless 
technology. This scenario also comprise one video 
conferencing server, one client connected to the 
server via L3 switch and wlan stations surrounding 
the access points. STA_0, STA_1, STA_2, 
STA_18, STA_19, STA_20 are roaming at a speed 
of 30 m/s around the access points and rest all 
stations are stationary. All the links used here are 
100 BASE T links. The MS is roaming from AP0 to 
AP7 at the speed of 1 m/sec. The throughput of the 
MS that is stable between 10k – 20k bit/sec. But the 
throughput drops down during the handoff. The 
maxim delay points are 0.040 sec., which is 
considered to be tolerable for most applications. 
Fig. 3 : Set–up of WiFi Handoff 
Table 1 : Wireless LAN Parameters (for mobile 
node) 
BSS Identifier 0 
Access Point 
Functionality 
Disabled 
Physical Characteristics Direct Sequence 
Data Rate (bps) 11 Mbps 
Transmit Power (W) 0.002 
Packet Reception- 
-95 
Power Threshold (dbm) 
CTS-to-self Option Enabled 
Short Retry Limit 7 
Long Retry Limit 4 
AP Beacon Interval 
(secs) 
0.02 
Max Receive Lifetime 
(secs) 
0.5 
Buffer Size (bits) 256000 
Roaming Capability Enabled 
Large Packet 
Processing 
Drop 
Initially due to set up time, the delay is more. Then 
the mobile node and the stations start roaming 
around the access points and hence the delay is 
almost constant. Then after 9 minutes there is small 
increase in the delay which is again due to the non
International Journal of Research in Advent Technology, Vol.2, No.7, July 2014 
E-ISSN: 2321-9637 
10 
availability of stations. (bits/sec). The simulation 
time is 10 min. The throughput drops during 
handoff. 
Fig 4 : Throughput and delay for MS in the WiFi 
set-up 
Wlan Backbone 
OPNET WLAN models support wireless-LAN 
backbones that consist of routers with WLAN 
interfaces belonging to the same BSS. These 
backbones can serve to WLAN EBSSs as well, where 
they are connected to the wireless backbone via their 
access points like they would be connected to a wired 
backbone. This scenario is built to provide an 
example on configuring such networks. 
Fig 5 : Wlan network with wireless sever, router, 
wireless clients 
The network contains wireless FTP clients and a 
wireless FTP servers. The clients and server belong 
to different wireless- LANs, BSS 0 and BSS 1, 
respectively. These two LANs connected to each 
other with two routers. These routers, which have 
two WLAN interfaces, serve as the access points for 
BSS 0 and BSS 1 and also compose the WLAN-backbone, 
which is the BSS 2. To achieve this, 
among the two WLAN interfaces of Wireless 
Router 0, the first interface, IF0, was configured as 
an access point and its BSS ID was set to 0. The 
access point fuctionality of the other interface, IF1, 
was disabled and its BSS ID was set to 2. The 
second router was also configured similarly. Hence, 
IF0s on the routers became the access points, and 
IF1s were connected to the backbone. The 
backbone-LAN, BSS 2, does not have an access 
point and doesn't need to have one, though it is 
possible to configure one of the backbone interfaces 
as an access point. Additionally the physical layer 
technology used by IF1s on the routers are set to 
"OFDM (802.11a)" to enable 802.11a data rates and 
their data rates are set to 54 Mbps. In other words, 
BSS 2 deploys the 802.11a PHY, while BSS 0 and 
BSS 1 use 802.11/11b PHYs. FTP client 5 is 
moving at a speed of 1 m/s in the defined trajectory 
path. While all other clients are stationary. 
Two routers form a wireless backbone network. 
FTP server, wireless router 1 is in one BSS, 
wireless router 0 and wireless router 1 are in other 
BSS, the FTP clients and wireless router 0 are in 
another BSS. 
Table 2 : Wireless LAN Parameters (for 
Wireless FTP clients) 
BSS Identifier 0 
Access Point 
Functionality 
Disabled 
Physical Characteristics Direct Sequence 
Data Rate (bps) 2 Mbps 
Transmit Power (W) 0.005 
Packet Reception- 
-95 
Power Threshold (dbm) 
CTS-to-self Option Enabled 
Short Retry Limit 7 
Long Retry Limit 4 
AP Beacon Interval 
(secs) 
0.02 
Max Receive Lifetime 
(secs) 
0.5 
Buffer Size (bits) 256000 
Roaming Capability Enabled 
Large Packet 
Processing 
Drop
International Journal of Research in Advent Technology, Vol.2, No.7, July 2014 
E-ISSN: 2321-9637 
11 
The performance of all the wireless FTP clients is 
observed and graphs obtained for delay, throughput 
and traffic received, traffic sent for the FTP clients. 
Since the FTP data is sent and received in the form 
of packets, hence the graphs show various sharp 
peaks. 
Simulation time is taken as 4 Minutes. 
Fig 6: Traffic received and traffic sent (packets/sec) for FTP 
client 5 
Fig 7 : delay and throughput for FTP client 5 
Fig. 8 : Delay and throughput for FTP client 2 
Fig. 9 : Traffic received and traffic sent (packets/sec) for FTP 
client 2 
The differences in the delay, throughput of FTP 
client 5 and FTP client 2 can be easily seen from the 
above graphs. As we know that FTP client 5 is 
roaming in BSS 0 following some defined 
trajectory, while FTP client 2 is stationary as all 
others are. And hence the traffic received (bits/sec),
International Journal of Research in Advent Technology, Vol.2, No.7, July 2014 
E-ISSN: 2321-9637 
12 
traffic sent (bits/sec), delay (sec), throughput 
(bits/sec) is different for them. 
Figure 10: Delay and throughput for the Wireless 
FTP Server 
From the above graph it is clear that the set up time is 
more than 1 minute, after which the FTP data packets 
transmission starts. 
Results saved with the scenario indicate the FTP 
traffic successfully flowing over the WLAN backbone 
between the wireless clients and server. 
4. CONCLUSION 
The vertical handover setup consists of a gateway, 
application server providing voice service to the 
wimax BS and to the wlan router. Initially both the 
mobile nodes are placed near the wimax BS from 
where they start roaming towards the wlan router. As 
they reach near the router, the wimax throughput is 
reduced and the WLAN throughput starts increasing 
which depicts vertical handoff triggering properties. 
The graphs for throughput and delay are obtained as 
expected. 
REFERENCES 
[1] Di Tian ; Georganas, Nicolas D., et.al. 
"Energy efficient routing with delivery in 
wireless sensor networks”, IEEE Wireless 
Communications and Networking, Vol: 3, Pag: 
1923 – 1929, 2003. 
[2] El-Hoiydi: On the Lifetime of Wireless Sensor 
Networks, IEEE Com- munications Letters, Vol. 
9, No. 11, November 2005. 
[3] Carlos de Morais Cordeiro, Dharma Prakash 
Agrawal ,Ad-hoc and sensor networks theory and 
application, World Scientific publication,2006. 
[4] L. Pomante: Wireless Sensor Networks, Seminar 
in Wireless Communications -University of 
L’Aquila, March 2007. 
[5] Shah, T. ; Javaid, N. ; Qureshi, T.N., 
"Energy Efficient Sleep Awake Aware 
(EESAA)intelligent Sensor Network routing proto 
col”, International Multitopic Conference 
(INMIC), , Page(s): 317 – 322, 2012. 
[6] W. Heinzelman, A. Chandrakasan, and H. 
Balakrishnan, “Energy-efficient routing protocols 
for wireless micro sensor networks,” in Proc. 
33rdHawaii Int. Conf. System Sciences(HICSS), 
Maui, HI,Jan. 2000

More Related Content

What's hot

Lecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkLecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkChandra Meena
 
Lect4
Lect4Lect4
It2402 mobile communication unit2
It2402 mobile communication unit2It2402 mobile communication unit2
It2402 mobile communication unit2
RMK ENGINEERING COLLEGE, CHENNAI
 
It6601 mobile computing unit2
It6601 mobile computing unit2It6601 mobile computing unit2
It6601 mobile computing unit2
RMK ENGINEERING COLLEGE, CHENNAI
 
Ad-hoc Networks by Ashok Panwar
Ad-hoc Networks by Ashok PanwarAd-hoc Networks by Ashok Panwar
Ad-hoc Networks by Ashok Panwar
Ashok Panwar
 
Computer Networks
Computer NetworksComputer Networks
Computer Networks
Master Gupta
 
IT6601 Mobile Computing Unit IV
IT6601 Mobile Computing Unit IVIT6601 Mobile Computing Unit IV
IT6601 Mobile Computing Unit IV
pkaviya
 
Fuzzy Based Vertical Handoff Decision Controller for Future Networks
Fuzzy Based Vertical Handoff Decision Controller for Future NetworksFuzzy Based Vertical Handoff Decision Controller for Future Networks
Fuzzy Based Vertical Handoff Decision Controller for Future Networks
IJAEMSJORNAL
 
IRJET- Viability of Smart City Applications with Lora WAN
IRJET- Viability of Smart City Applications with Lora WANIRJET- Viability of Smart City Applications with Lora WAN
IRJET- Viability of Smart City Applications with Lora WAN
IRJET Journal
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and Services
Sayed Chhattan Shah
 
Mobility Management Approaches for Mobile IP Networks
Mobility Management Approaches for Mobile IP NetworksMobility Management Approaches for Mobile IP Networks
Mobility Management Approaches for Mobile IP Networks
WSO2
 
8.conclusion
8.conclusion8.conclusion
8.conclusion
Basil John
 
REDUCING HANDOVER DELAY BY PRESELECTIVE SCANNING USING GPS
REDUCING HANDOVER DELAY BY PRESELECTIVE SCANNING USING GPS REDUCING HANDOVER DELAY BY PRESELECTIVE SCANNING USING GPS
REDUCING HANDOVER DELAY BY PRESELECTIVE SCANNING USING GPS
ijdpsjournal
 
Wlan IEEE 802.11
Wlan IEEE 802.11Wlan IEEE 802.11
Wlan IEEE 802.11
Adeel Mirza
 
Call Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
Call Admission Control (CAC) with Load Balancing Approach for the WLAN NetworksCall Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
Call Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
IJARIIT
 
Unit 3
Unit 3Unit 3
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...
IRJET Journal
 
J010216776
J010216776J010216776
J010216776
IOSR Journals
 

What's hot (20)

Lecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkLecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc network
 
Lect4
Lect4Lect4
Lect4
 
Ad hoc networks
Ad hoc networksAd hoc networks
Ad hoc networks
 
It2402 mobile communication unit2
It2402 mobile communication unit2It2402 mobile communication unit2
It2402 mobile communication unit2
 
It6601 mobile computing unit2
It6601 mobile computing unit2It6601 mobile computing unit2
It6601 mobile computing unit2
 
Ad-hoc Networks by Ashok Panwar
Ad-hoc Networks by Ashok PanwarAd-hoc Networks by Ashok Panwar
Ad-hoc Networks by Ashok Panwar
 
Computer Networks
Computer NetworksComputer Networks
Computer Networks
 
IT6601 Mobile Computing Unit IV
IT6601 Mobile Computing Unit IVIT6601 Mobile Computing Unit IV
IT6601 Mobile Computing Unit IV
 
Fuzzy Based Vertical Handoff Decision Controller for Future Networks
Fuzzy Based Vertical Handoff Decision Controller for Future NetworksFuzzy Based Vertical Handoff Decision Controller for Future Networks
Fuzzy Based Vertical Handoff Decision Controller for Future Networks
 
IRJET- Viability of Smart City Applications with Lora WAN
IRJET- Viability of Smart City Applications with Lora WANIRJET- Viability of Smart City Applications with Lora WAN
IRJET- Viability of Smart City Applications with Lora WAN
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and Services
 
Mobility Management Approaches for Mobile IP Networks
Mobility Management Approaches for Mobile IP NetworksMobility Management Approaches for Mobile IP Networks
Mobility Management Approaches for Mobile IP Networks
 
8.conclusion
8.conclusion8.conclusion
8.conclusion
 
REDUCING HANDOVER DELAY BY PRESELECTIVE SCANNING USING GPS
REDUCING HANDOVER DELAY BY PRESELECTIVE SCANNING USING GPS REDUCING HANDOVER DELAY BY PRESELECTIVE SCANNING USING GPS
REDUCING HANDOVER DELAY BY PRESELECTIVE SCANNING USING GPS
 
Wlan IEEE 802.11
Wlan IEEE 802.11Wlan IEEE 802.11
Wlan IEEE 802.11
 
Chapter 7 v8.0
Chapter 7 v8.0Chapter 7 v8.0
Chapter 7 v8.0
 
Call Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
Call Admission Control (CAC) with Load Balancing Approach for the WLAN NetworksCall Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
Call Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
 
Unit 3
Unit 3Unit 3
Unit 3
 
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...
 
J010216776
J010216776J010216776
J010216776
 

Viewers also liked

Paper id 2920143
Paper id 2920143Paper id 2920143
Paper id 2920143
IJRAT
 
Paper id 25201420
Paper id 25201420Paper id 25201420
Paper id 25201420IJRAT
 
Paper id 2720144
Paper id 2720144Paper id 2720144
Paper id 2720144
IJRAT
 
Paper id 21201498
Paper id 21201498Paper id 21201498
Paper id 21201498IJRAT
 
Paper id 242014124
Paper id 242014124Paper id 242014124
Paper id 242014124IJRAT
 
Paper id 24201452
Paper id 24201452Paper id 24201452
Paper id 24201452IJRAT
 
Paper id 252014106
Paper id 252014106Paper id 252014106
Paper id 252014106IJRAT
 
Paper id 21201478
Paper id 21201478Paper id 21201478
Paper id 21201478IJRAT
 
Paper id 252014135
Paper id 252014135Paper id 252014135
Paper id 252014135IJRAT
 
Paper id 25201491
Paper id 25201491Paper id 25201491
Paper id 25201491IJRAT
 
Paper id 25201468
Paper id 25201468Paper id 25201468
Paper id 25201468IJRAT
 
Paper id 25201467
Paper id 25201467Paper id 25201467
Paper id 25201467IJRAT
 
Paper id 252014116
Paper id 252014116Paper id 252014116
Paper id 252014116IJRAT
 
Paper id 212014131
Paper id 212014131Paper id 212014131
Paper id 212014131IJRAT
 
TO all Syed Rizwan Ahmed Kazmi
TO all Syed Rizwan Ahmed KazmiTO all Syed Rizwan Ahmed Kazmi
TO all Syed Rizwan Ahmed KazmiRizwan Kazmi
 

Viewers also liked (15)

Paper id 2920143
Paper id 2920143Paper id 2920143
Paper id 2920143
 
Paper id 25201420
Paper id 25201420Paper id 25201420
Paper id 25201420
 
Paper id 2720144
Paper id 2720144Paper id 2720144
Paper id 2720144
 
Paper id 21201498
Paper id 21201498Paper id 21201498
Paper id 21201498
 
Paper id 242014124
Paper id 242014124Paper id 242014124
Paper id 242014124
 
Paper id 24201452
Paper id 24201452Paper id 24201452
Paper id 24201452
 
Paper id 252014106
Paper id 252014106Paper id 252014106
Paper id 252014106
 
Paper id 21201478
Paper id 21201478Paper id 21201478
Paper id 21201478
 
Paper id 252014135
Paper id 252014135Paper id 252014135
Paper id 252014135
 
Paper id 25201491
Paper id 25201491Paper id 25201491
Paper id 25201491
 
Paper id 25201468
Paper id 25201468Paper id 25201468
Paper id 25201468
 
Paper id 25201467
Paper id 25201467Paper id 25201467
Paper id 25201467
 
Paper id 252014116
Paper id 252014116Paper id 252014116
Paper id 252014116
 
Paper id 212014131
Paper id 212014131Paper id 212014131
Paper id 212014131
 
TO all Syed Rizwan Ahmed Kazmi
TO all Syed Rizwan Ahmed KazmiTO all Syed Rizwan Ahmed Kazmi
TO all Syed Rizwan Ahmed Kazmi
 

Similar to Paper id 2720145

Vertical handover in umts and wlan networks
Vertical handover in umts and wlan networksVertical handover in umts and wlan networks
Vertical handover in umts and wlan networksIAEME Publication
 
Paper id 2720146
Paper id 2720146Paper id 2720146
Paper id 2720146
IJRAT
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
IJERD Editor
 
A Survey on Vehicle to Infrastructure Communication System
A Survey on Vehicle to Infrastructure Communication SystemA Survey on Vehicle to Infrastructure Communication System
A Survey on Vehicle to Infrastructure Communication System
IOSR Journals
 
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
IOSR Journals
 
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
IOSR Journals
 
Analysis of vertical and horizontal handoff
Analysis of vertical and horizontal handoff Analysis of vertical and horizontal handoff
Analysis of vertical and horizontal handoff
Tauseef khan
 
A Study on Access Point Selection Algorithms in Wireless Mesh Networks
A Study on Access Point Selection Algorithms in Wireless Mesh NetworksA Study on Access Point Selection Algorithms in Wireless Mesh Networks
A Study on Access Point Selection Algorithms in Wireless Mesh Networks
Eswar Publications
 
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc EnvironmentComparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
ijsrd.com
 
Enhanced Seamless Handoff Using Multiple Access Points in Wireless Local Area...
Enhanced Seamless Handoff Using Multiple Access Points in Wireless Local Area...Enhanced Seamless Handoff Using Multiple Access Points in Wireless Local Area...
Enhanced Seamless Handoff Using Multiple Access Points in Wireless Local Area...
IJERA Editor
 
Enhanced Seamless Handoff Using Multiple Access Points in Wireless Local Area...
Enhanced Seamless Handoff Using Multiple Access Points in Wireless Local Area...Enhanced Seamless Handoff Using Multiple Access Points in Wireless Local Area...
Enhanced Seamless Handoff Using Multiple Access Points in Wireless Local Area...
IJERA Editor
 
7.chapter
7.chapter7.chapter
7.chapter
Basil John
 
H010524049
H010524049H010524049
H010524049
IOSR Journals
 
Lect3
Lect3Lect3
Improvement Of DSR Protocol
Improvement Of DSR ProtocolImprovement Of DSR Protocol
Improvement Of DSR Protocol
Rajesh Karumanchi
 
ON THE SUPPORT OF MULTIMEDIA APPLICATIONS OVER WIRELESS MESH NETWORKS
ON THE SUPPORT OF MULTIMEDIA APPLICATIONS  OVER WIRELESS MESH NETWORKS ON THE SUPPORT OF MULTIMEDIA APPLICATIONS  OVER WIRELESS MESH NETWORKS
ON THE SUPPORT OF MULTIMEDIA APPLICATIONS OVER WIRELESS MESH NETWORKS ijwmn
 

Similar to Paper id 2720145 (20)

Ha3113551359
Ha3113551359Ha3113551359
Ha3113551359
 
Vertical handover in umts and wlan networks
Vertical handover in umts and wlan networksVertical handover in umts and wlan networks
Vertical handover in umts and wlan networks
 
Aj32242252
Aj32242252Aj32242252
Aj32242252
 
Paper id 2720146
Paper id 2720146Paper id 2720146
Paper id 2720146
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
A Survey on Vehicle to Infrastructure Communication System
A Survey on Vehicle to Infrastructure Communication SystemA Survey on Vehicle to Infrastructure Communication System
A Survey on Vehicle to Infrastructure Communication System
 
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
 
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
 
Analysis of vertical and horizontal handoff
Analysis of vertical and horizontal handoff Analysis of vertical and horizontal handoff
Analysis of vertical and horizontal handoff
 
A Study on Access Point Selection Algorithms in Wireless Mesh Networks
A Study on Access Point Selection Algorithms in Wireless Mesh NetworksA Study on Access Point Selection Algorithms in Wireless Mesh Networks
A Study on Access Point Selection Algorithms in Wireless Mesh Networks
 
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc EnvironmentComparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
 
Gf2411221128
Gf2411221128Gf2411221128
Gf2411221128
 
Enhanced Seamless Handoff Using Multiple Access Points in Wireless Local Area...
Enhanced Seamless Handoff Using Multiple Access Points in Wireless Local Area...Enhanced Seamless Handoff Using Multiple Access Points in Wireless Local Area...
Enhanced Seamless Handoff Using Multiple Access Points in Wireless Local Area...
 
Enhanced Seamless Handoff Using Multiple Access Points in Wireless Local Area...
Enhanced Seamless Handoff Using Multiple Access Points in Wireless Local Area...Enhanced Seamless Handoff Using Multiple Access Points in Wireless Local Area...
Enhanced Seamless Handoff Using Multiple Access Points in Wireless Local Area...
 
7.chapter
7.chapter7.chapter
7.chapter
 
H010524049
H010524049H010524049
H010524049
 
Lect3
Lect3Lect3
Lect3
 
eaodv
eaodveaodv
eaodv
 
Improvement Of DSR Protocol
Improvement Of DSR ProtocolImprovement Of DSR Protocol
Improvement Of DSR Protocol
 
ON THE SUPPORT OF MULTIMEDIA APPLICATIONS OVER WIRELESS MESH NETWORKS
ON THE SUPPORT OF MULTIMEDIA APPLICATIONS  OVER WIRELESS MESH NETWORKS ON THE SUPPORT OF MULTIMEDIA APPLICATIONS  OVER WIRELESS MESH NETWORKS
ON THE SUPPORT OF MULTIMEDIA APPLICATIONS OVER WIRELESS MESH NETWORKS
 

More from IJRAT

96202108
9620210896202108
96202108
IJRAT
 
97202107
9720210797202107
97202107
IJRAT
 
93202101
9320210193202101
93202101
IJRAT
 
92202102
9220210292202102
92202102
IJRAT
 
91202104
9120210491202104
91202104
IJRAT
 
87202003
8720200387202003
87202003
IJRAT
 
87202001
8720200187202001
87202001
IJRAT
 
86202013
8620201386202013
86202013
IJRAT
 
86202008
8620200886202008
86202008
IJRAT
 
86202005
8620200586202005
86202005
IJRAT
 
86202004
8620200486202004
86202004
IJRAT
 
85202026
8520202685202026
85202026
IJRAT
 
711201940
711201940711201940
711201940
IJRAT
 
711201939
711201939711201939
711201939
IJRAT
 
711201935
711201935711201935
711201935
IJRAT
 
711201927
711201927711201927
711201927
IJRAT
 
711201905
711201905711201905
711201905
IJRAT
 
710201947
710201947710201947
710201947
IJRAT
 
712201907
712201907712201907
712201907
IJRAT
 
712201903
712201903712201903
712201903
IJRAT
 

More from IJRAT (20)

96202108
9620210896202108
96202108
 
97202107
9720210797202107
97202107
 
93202101
9320210193202101
93202101
 
92202102
9220210292202102
92202102
 
91202104
9120210491202104
91202104
 
87202003
8720200387202003
87202003
 
87202001
8720200187202001
87202001
 
86202013
8620201386202013
86202013
 
86202008
8620200886202008
86202008
 
86202005
8620200586202005
86202005
 
86202004
8620200486202004
86202004
 
85202026
8520202685202026
85202026
 
711201940
711201940711201940
711201940
 
711201939
711201939711201939
711201939
 
711201935
711201935711201935
711201935
 
711201927
711201927711201927
711201927
 
711201905
711201905711201905
711201905
 
710201947
710201947710201947
710201947
 
712201907
712201907712201907
712201907
 
712201903
712201903712201903
712201903
 

Recently uploaded

bank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdfbank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdf
Divyam548318
 
sieving analysis and results interpretation
sieving analysis and results interpretationsieving analysis and results interpretation
sieving analysis and results interpretation
ssuser36d3051
 
Building Electrical System Design & Installation
Building Electrical System Design & InstallationBuilding Electrical System Design & Installation
Building Electrical System Design & Installation
symbo111
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
NidhalKahouli2
 
digital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdfdigital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdf
drwaing
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
dxobcob
 
Online aptitude test management system project report.pdf
Online aptitude test management system project report.pdfOnline aptitude test management system project report.pdf
Online aptitude test management system project report.pdf
Kamal Acharya
 
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
aqil azizi
 
AIR POLLUTION lecture EnE203 updated.pdf
AIR POLLUTION lecture EnE203 updated.pdfAIR POLLUTION lecture EnE203 updated.pdf
AIR POLLUTION lecture EnE203 updated.pdf
RicletoEspinosa1
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
zwunae
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
WENKENLI1
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
Rahul
 
Water billing management system project report.pdf
Water billing management system project report.pdfWater billing management system project report.pdf
Water billing management system project report.pdf
Kamal Acharya
 
Fundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptxFundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptx
manasideore6
 
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
Mukeshwaran Balu
 
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
ssuser7dcef0
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
Victor Morales
 

Recently uploaded (20)

bank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdfbank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdf
 
sieving analysis and results interpretation
sieving analysis and results interpretationsieving analysis and results interpretation
sieving analysis and results interpretation
 
Building Electrical System Design & Installation
Building Electrical System Design & InstallationBuilding Electrical System Design & Installation
Building Electrical System Design & Installation
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
 
digital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdfdigital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdf
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
 
Online aptitude test management system project report.pdf
Online aptitude test management system project report.pdfOnline aptitude test management system project report.pdf
Online aptitude test management system project report.pdf
 
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
 
AIR POLLUTION lecture EnE203 updated.pdf
AIR POLLUTION lecture EnE203 updated.pdfAIR POLLUTION lecture EnE203 updated.pdf
AIR POLLUTION lecture EnE203 updated.pdf
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
 
Water billing management system project report.pdf
Water billing management system project report.pdfWater billing management system project report.pdf
Water billing management system project report.pdf
 
Fundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptxFundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptx
 
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
 
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
 

Paper id 2720145

  • 1. International Journal of Research in Advent Technology, Vol.2, No.7, July 2014 E-ISSN: 2321-9637 7 Vertical Handoff Performance in WLAN Wireless Networks Renu1, Anil Dudy2 Electronics and communication1, 2,Shri Baba Mastnath Engg. college1, 2 Email:renudalal89@gmail.com1, anildudy10@gmail.com2 Abstract- The WiFi handoff setup compares the data traffic received by different APs in the network. Since the initial stations of AP_0 are mobile ones, AP_0 receives data traffic only at the beginning and then at end of simulation when its stations start their tour and come back. Additionally, it receives data traffic when the stations started from south visit its section and get connected to it. In contrast to AP_0, AP_2 has stable stations, so the data traffic received by it does not drop to 0 like AP_0's traffic. As expected, its received data traffic doubles when the moving stations from west and south cross its section. AP_3 is visited by all moving stations at the same time. Hence, its received data traffic is tripled when this happens during simulation. Hence the throughput and delay for the wlan MS is obtained. The vertical handover setup consists of a gateway, application server providing voice service to the wimax BS and to the wlan router. Index Terms- AP, DCF, PCF, LAN, WLAN 1. INTRODUCTION Communication is always necessary in building relations to mankind, when two persons meet they need some medium to interchange their views but due to distance barriers some tools are required to communicate each other. At the end of 19th century, renowned scientist Graham Bell laid the first stone in the field of communication using different tools regardless of distance. He invented first wired base telephony equipment. It was the solution for the voice communication for the people how far apart they are. After this radio based communication systems Era started. It was an extension of wired based networks. In the beginning it was developed for some special purposes like military and police usage. With the passage of time these systems emerged to allow common peoples to communicate with each other, rather than using wired based network. After this the age of faster communication and capabilities of voice get started and evolved into new telecommunication system. The capability to achieve wireless access anywhere, anytime, and anyplace has become common expectation as it provides significant flexibility and freedom in mobility. But to achieve global mobility in heterogeneous networks for any mobile device requires seamless connectivity using vertical handoff. Since none of the existing wireless frameworks provide practical solutions for vertical handoff. End-to-End Vertical Handoff (E2EVH) proposed in this paper offers a new concept to perform vertical handoff between heterogeneous wireless networks. To deliver network services without interruption, E2EVH present a novel design to monitor the network availability, it then picks the best accessible network for application layer [1]. 2. WIRELESS LAN SYSTEM The Wireless Local Area Network (WLAN) is an unlicensed band of 802.11 ISM frequency band. 802.11 is one of the recent communication technologies of IEEE standard. It specifies medium access control (MAC) and physical layer that is why it is called Wireless LAN. It has three widely used types which operates on different frequency bands. These three types are 802.11a, 802.11b and 802.11g. 802.11a operates on 5 GHz frequency band and it gives the maximum data rate speed of 54 Mbps, which is higher than 802.11b because 802.11b operates on 2.4 GHz frequency band and give the maximum data rate speed of 11Mbps. 802.11b operates. 802.11g is recently developed standards of Wireless LAN. It also operates on 2.4 GHz frequency band and give the maximum data rate speed of 54 Mbps. In 802.11 Wireless LAN standards, the two types of MAC protocols Distributed Coordination Function (DCF) and Point Coordination Function (PCF) are used. Nowadays the most applications available in the markets are uses DCF because it is simple, robust and easy to implement. DCF is the basic MAC layer function in Wireless LANs, Which used Carrier Sense Multiple Access technique (CSMA) also with an addition of Collision Avoidance of (CA). It resolves the CA problems of the packets transmitted at the same time. Architecture of Wireless LAN Wireless Local Area Network instigate as an overlay to the Wired Local Area Network. Lightweight and Autonomous are two discrete architectures used in WLAN environment.
  • 2. International Journal of Research in Advent Technology, Vol.2, No.7, July 2014 E-ISSN: 2321-9637 8 Each of the architectures has wide impact on wired LAN architecture. The selection of WLAN architecture is based on the consideration of building, future proof, integrated wired and Wireless LAN to accomplish high return on investment. Both architectures are popular but Lightweight architecture has plus advantages over the WLAN market. 2.1 Lightweight Model Lightweight is the part of WLAN architecture. With most of wireless intelligence which residing at central controlling device, lightweight Wireless Access Point architecture have narrow functionality. Fig 1: Lightweight Architecture Model Lightweight model is simple. The devices that provide the communication to the end user as Access Layer are identified by lightweight. Distribution layer provide the inter communication and the top layer (Core Layer) of Lightweight model is responsible fast and consistent data between networks. Wireless Access Point (WAP) resides at the interface of access layer and provides the communication interface to end user. In lightweight architecture model, the management of operation is easy because it give the permission to WAP from single device, because the lightweight WAP have the knowledge of visibility and attentiveness of the neighbours WAPs. They can observe and if any one of their neighbours becomes the victim of fault it notifies the wireless controller. Lightweight WAP may be Self-healing because to pay compensation for unsuccessful counterpart, controller commands the neighbouring WAP to regulate their power level, where as in autonomous there is no concept of the visibility of its WAP neighbouring and in this case to perform self healing it cannot adjust the power level. If single WAP is busy or overloaded then in this situation wireless controller can relieve the wireless client to neighbouring WAP. In critical applications such as VoIP, self-healing and load balancing are important issues. 2.2 Autonomous Model In Autonomous Model WAP is not mandatory as shown in Fig. 2. Fig 2: Autonomous Architecture Model Autonomous Wireless Access Point sustains the switching and strong security as well as networking function that are indispensable to route the wireless traffic. As in autonomous system there is no concept of the visibility of WAP so it cannot make the load balancing. Autonomous model cannot differentiate whether nearest WAP is part of WLAN infrastructure or illegal rouge WAP. The difference between the autonomous and lightweight is negligible. The difference is only this that lightweight have one extra component (WLAN controller). VERTICAL HANDOVER Between the heterogeneous wireless networks the handover process can be set apart in to handover execution and handover decision process. In handover decision process both the mobile node and network decides that when the handover process will be occur. After taken handover decision, the handover execution process continues. The handover decision process involves supplementary network information such
  • 3. International Journal of Research in Advent Technology, Vol.2, No.7, July 2014 E-ISSN: 2321-9637 9 as replica address detection time in Mobile IPv6, when handover decision and detection process overlaps. The handover delay can be alienated in to three main mechanisms. Discovery Time (td) In this process via link layer beacon, the mobile terminal perceive that it is in the under the range of new wireless network from where it get the Router Advertisement (RA) of new access router. Through the RA and triggered-based router solicitation from access router in the visited network, the MT detects the coverage on new network. Address Configuration Period (tc) In this period the MT receive the Router Advertisement (RA) and updates its routing table and assign the new Care of Address (CoA) to all its interfaces. This new CoA based on new access router accessible form RA. Network Registration Period (tr) In this period the binding updates are transmit to Home Agent (HA) as well as correspondent node and collect the acknowledgement from correspondent node. As binding acknowledgement from correspondent node is elective, so we consider the situation when mobile node accept packet from correspondent. Thus an IP level handover consist of td, tc and tr. This recommended that by optimizing IP-level vertical handover delay would really involve minimizing the discovery time and network registration period, where as address configuration period based on mobile device computing potential. 3. Simulation results Horizontal handoff in WiFi network This scenario shows the mobile station performance during horizontal handoff (roaming) between eight APs while the MS is moving in clock wise direction. This scenario shows WiFi wireless technology. This scenario also comprise one video conferencing server, one client connected to the server via L3 switch and wlan stations surrounding the access points. STA_0, STA_1, STA_2, STA_18, STA_19, STA_20 are roaming at a speed of 30 m/s around the access points and rest all stations are stationary. All the links used here are 100 BASE T links. The MS is roaming from AP0 to AP7 at the speed of 1 m/sec. The throughput of the MS that is stable between 10k – 20k bit/sec. But the throughput drops down during the handoff. The maxim delay points are 0.040 sec., which is considered to be tolerable for most applications. Fig. 3 : Set–up of WiFi Handoff Table 1 : Wireless LAN Parameters (for mobile node) BSS Identifier 0 Access Point Functionality Disabled Physical Characteristics Direct Sequence Data Rate (bps) 11 Mbps Transmit Power (W) 0.002 Packet Reception- -95 Power Threshold (dbm) CTS-to-self Option Enabled Short Retry Limit 7 Long Retry Limit 4 AP Beacon Interval (secs) 0.02 Max Receive Lifetime (secs) 0.5 Buffer Size (bits) 256000 Roaming Capability Enabled Large Packet Processing Drop Initially due to set up time, the delay is more. Then the mobile node and the stations start roaming around the access points and hence the delay is almost constant. Then after 9 minutes there is small increase in the delay which is again due to the non
  • 4. International Journal of Research in Advent Technology, Vol.2, No.7, July 2014 E-ISSN: 2321-9637 10 availability of stations. (bits/sec). The simulation time is 10 min. The throughput drops during handoff. Fig 4 : Throughput and delay for MS in the WiFi set-up Wlan Backbone OPNET WLAN models support wireless-LAN backbones that consist of routers with WLAN interfaces belonging to the same BSS. These backbones can serve to WLAN EBSSs as well, where they are connected to the wireless backbone via their access points like they would be connected to a wired backbone. This scenario is built to provide an example on configuring such networks. Fig 5 : Wlan network with wireless sever, router, wireless clients The network contains wireless FTP clients and a wireless FTP servers. The clients and server belong to different wireless- LANs, BSS 0 and BSS 1, respectively. These two LANs connected to each other with two routers. These routers, which have two WLAN interfaces, serve as the access points for BSS 0 and BSS 1 and also compose the WLAN-backbone, which is the BSS 2. To achieve this, among the two WLAN interfaces of Wireless Router 0, the first interface, IF0, was configured as an access point and its BSS ID was set to 0. The access point fuctionality of the other interface, IF1, was disabled and its BSS ID was set to 2. The second router was also configured similarly. Hence, IF0s on the routers became the access points, and IF1s were connected to the backbone. The backbone-LAN, BSS 2, does not have an access point and doesn't need to have one, though it is possible to configure one of the backbone interfaces as an access point. Additionally the physical layer technology used by IF1s on the routers are set to "OFDM (802.11a)" to enable 802.11a data rates and their data rates are set to 54 Mbps. In other words, BSS 2 deploys the 802.11a PHY, while BSS 0 and BSS 1 use 802.11/11b PHYs. FTP client 5 is moving at a speed of 1 m/s in the defined trajectory path. While all other clients are stationary. Two routers form a wireless backbone network. FTP server, wireless router 1 is in one BSS, wireless router 0 and wireless router 1 are in other BSS, the FTP clients and wireless router 0 are in another BSS. Table 2 : Wireless LAN Parameters (for Wireless FTP clients) BSS Identifier 0 Access Point Functionality Disabled Physical Characteristics Direct Sequence Data Rate (bps) 2 Mbps Transmit Power (W) 0.005 Packet Reception- -95 Power Threshold (dbm) CTS-to-self Option Enabled Short Retry Limit 7 Long Retry Limit 4 AP Beacon Interval (secs) 0.02 Max Receive Lifetime (secs) 0.5 Buffer Size (bits) 256000 Roaming Capability Enabled Large Packet Processing Drop
  • 5. International Journal of Research in Advent Technology, Vol.2, No.7, July 2014 E-ISSN: 2321-9637 11 The performance of all the wireless FTP clients is observed and graphs obtained for delay, throughput and traffic received, traffic sent for the FTP clients. Since the FTP data is sent and received in the form of packets, hence the graphs show various sharp peaks. Simulation time is taken as 4 Minutes. Fig 6: Traffic received and traffic sent (packets/sec) for FTP client 5 Fig 7 : delay and throughput for FTP client 5 Fig. 8 : Delay and throughput for FTP client 2 Fig. 9 : Traffic received and traffic sent (packets/sec) for FTP client 2 The differences in the delay, throughput of FTP client 5 and FTP client 2 can be easily seen from the above graphs. As we know that FTP client 5 is roaming in BSS 0 following some defined trajectory, while FTP client 2 is stationary as all others are. And hence the traffic received (bits/sec),
  • 6. International Journal of Research in Advent Technology, Vol.2, No.7, July 2014 E-ISSN: 2321-9637 12 traffic sent (bits/sec), delay (sec), throughput (bits/sec) is different for them. Figure 10: Delay and throughput for the Wireless FTP Server From the above graph it is clear that the set up time is more than 1 minute, after which the FTP data packets transmission starts. Results saved with the scenario indicate the FTP traffic successfully flowing over the WLAN backbone between the wireless clients and server. 4. CONCLUSION The vertical handover setup consists of a gateway, application server providing voice service to the wimax BS and to the wlan router. Initially both the mobile nodes are placed near the wimax BS from where they start roaming towards the wlan router. As they reach near the router, the wimax throughput is reduced and the WLAN throughput starts increasing which depicts vertical handoff triggering properties. The graphs for throughput and delay are obtained as expected. REFERENCES [1] Di Tian ; Georganas, Nicolas D., et.al. "Energy efficient routing with delivery in wireless sensor networks”, IEEE Wireless Communications and Networking, Vol: 3, Pag: 1923 – 1929, 2003. [2] El-Hoiydi: On the Lifetime of Wireless Sensor Networks, IEEE Com- munications Letters, Vol. 9, No. 11, November 2005. [3] Carlos de Morais Cordeiro, Dharma Prakash Agrawal ,Ad-hoc and sensor networks theory and application, World Scientific publication,2006. [4] L. Pomante: Wireless Sensor Networks, Seminar in Wireless Communications -University of L’Aquila, March 2007. [5] Shah, T. ; Javaid, N. ; Qureshi, T.N., "Energy Efficient Sleep Awake Aware (EESAA)intelligent Sensor Network routing proto col”, International Multitopic Conference (INMIC), , Page(s): 317 – 322, 2012. [6] W. Heinzelman, A. Chandrakasan, and H. Balakrishnan, “Energy-efficient routing protocols for wireless micro sensor networks,” in Proc. 33rdHawaii Int. Conf. System Sciences(HICSS), Maui, HI,Jan. 2000