Seamless handover in wireless networks is to guarantee both service continuity and service quality. In
WiMAX, providing scalability and quality of service for multimedia services during handover is a main
challenge because of high latency and packet loss. In this paper, we created four scenarios using Qualnet
5.2 Network Simulator to analyze the hard handover functionality of WiMAX under different conditions.
The scenarios such as Flag with 5 and 10 sec UCD and DCD interval values, Random mobility scenario
and DEM scenario using 6 WiMAX Cells have been considered. This study is performed over the real
urban area of JNU where we have used JNU map for scenarios 1, 2 and 3 but for scenario 4, the JNU
terrain data has been used. Further, each BS of 6 WiMAX cell is connected to four nodes. All nodes of each
scenario are fixed except Node 1. Node 1 is moving and performing the handover between the different BSs
while sending and receiving real time traffics. Flag mobility model is used in Scenario 1, 2 and 4 to model
the movement of the Node 1 while we use random mobility model in sceanrio3. 5 seconds time interval is
used for Scenarios 1, 3, and 4 while 10 seconds time interval is used for scenario 2 to study the effect of
management messages load on handover. Further, the statistical measures of handover performance of
WiMAX in terms of number of handover performed, throughput, end-to-end delay, jitter, and packets
dropped are observed and evaluated.
General Model for Single and Multiple Channels WLANs with Quality of Service ...ijwmn
In this paper we develop an intergraded model for request mechanism and data transmission in the uplink phase in the presence of channel noise. This model supports quality of service. The wireless channel is prone to many impairments. Thus, certain techniques have to be developed to deliver data to the receiver. We calculated the performance parameters for single and multichannel wireless networks, like the requests throughput, data throughput and the requests acceptance probability and data acceptance probability. The proposed model is general model since it can be applied to different wireless networks such as IEEE802.11a, IEEE802.16e, CDMA operated networks and Hiperlan\2.
PERFORMANCE EVALUATION OF VERTICAL HARD HANDOVERS IN CELLULAR MOBILE SYSTEMSijngnjournal
With the rapid increase of new and diverse cellular mobile services, the overlapping of cells has become typical in the majority of the coverage area of the network. Vertical handovers occur between two layers of cells when a user is switched from one layer to the other. In this paper we investigate the influence of network parameters on vertical hard handover performance in a cell environment. The work considers two layers of cells: a layer of macrocells and a layer of microcells. Handover requests enter the macrocell from neighbor macrocells and from microcells that belong to a different layer. Using Markov chain analysis and simulation we calculate network performance parameters such as mean queue delay, handover dropping probability and channel utilization. We also compare the handover performance for the macrocell and macrocell traffic separately. Our results show the influence of total channels, maximum queue size and handover request arrival rate on handover performance. They also show that when the traffic from each layer is treated with equal priority in the system, the performance of each layer is comparable.
MULTI-HOP BANDWIDTH MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKSIJMIT JOURNAL
An admission control scheme should play the role of a coordinator for flows in a data communication network, to provide the guarantees as the medium is shared. The nodes of a wired network can monitor the medium to know the available bandwidth at any point of time. But, in wireless ad hoc networks, a node must consume the bandwidth of neighboring nodes, during a communication. Hence, the consumption of bandwidth by a flow and the availability of resources to any wireless node strictly depend upon the neighboring nodes within its transmission range. We present a scalable and efficient admission control scheme, Multi-hop Bandwidth Management Protocol (MBMP), to support the QoS requirements
in multi-hop ad hoc networks. We simulate several options to design MBMP and compare the performances of these options through mathematical analysis and simulation results, and compare its effectiveness with the existing admission control schemes through extensive simulations.
IEEE 802.11n Based Wireless Backhaul Enabled by Dual Channel IPT (DCH-IPT) Fo...CSCJournals
Wireless backhaul has received much attention as an enabler of future broadband mobile communication systems because it can reduce deployment cost of pico-cells, an essential part of high capacity system. A high throughput with a minimum delay network is highly appreciated to sustain the increasing proliferation in multimedia transmissions. In this paper, we propose a backhaul network using the Multi-Input Multi-Output (MIMO) IEEE 802.11n standard in conjunction with the Dual Channel Intermittent Periodic Transmit IPT (DCH-IPT) packets forwarding protocol. By using these two techniques (IEEE 802.11n + DCH-IPT), wireless backhaul nodes can meet more demanding communication requirements such as higher throughput, lower average delay, and lower packet dropping rate than those achieved by the currently used backhaul. The current backhaul is based upon Single-Input Single-Output (SISO) IEEE 802.11a,b,g standards in conjunction with Single Channel Conventional (SCH-Conv) relaying protocol in which packets are transmitted continuously from source nodes using single channel. The proposed backhaul will accelerate introduction of picocell based mobile communication systems.
Tight Coupling Internetworking Between UMTS and WLAN: Challenges, Design Arch...CSCJournals
To provide seamless internet connectivity anywhere at any time to the mobile users, there is a strong demand for the integration of wireless access networks for all-IP based Next Generation Networks (NGN). The Wireless Local Area Network (WLAN) is capable of providing high data rate at low cost. However, its services are limited to a small geographical area. Universal Mobile Telecommunications System (UMTS) networks provide global coverage, however, cost is high and the provided data rate do not fulfill the requirements of bandwidth intensive applications. By integrating these two promising technologies; UMTS and WLAN several benefits can be achieved, i.e., load balancing, extension of coverage area, better Quality of Service (QoS), improved security features, etc. Therefore, the integration of these two technologies can provide ubiquitous connectivity and high data rate at low cost to wireless clients. In this paper different integration mechanisms of UMTS and WLAN are investigated. More precisely, an integrated mechanism for the integration of UMTS and WLAN based on two different variations of tight coupling, i.e., interconnecting WLAN with Serving GPRS Support Node (SGSN) and Gateway GPRS Support Node (GGSN) is designed and analyzed. The simulated results reveal that the GGSN-WLAN integration performance is better than the SGSN-WLAN integration for all the applied applications and measurement parameters.
we find out various power aware and data packet rate control with-collision-avoidance (CSMA/CA)-based ad hoc wireless network communication. And identifies that CSMA
General Model for Single and Multiple Channels WLANs with Quality of Service ...ijwmn
In this paper we develop an intergraded model for request mechanism and data transmission in the uplink phase in the presence of channel noise. This model supports quality of service. The wireless channel is prone to many impairments. Thus, certain techniques have to be developed to deliver data to the receiver. We calculated the performance parameters for single and multichannel wireless networks, like the requests throughput, data throughput and the requests acceptance probability and data acceptance probability. The proposed model is general model since it can be applied to different wireless networks such as IEEE802.11a, IEEE802.16e, CDMA operated networks and Hiperlan\2.
PERFORMANCE EVALUATION OF VERTICAL HARD HANDOVERS IN CELLULAR MOBILE SYSTEMSijngnjournal
With the rapid increase of new and diverse cellular mobile services, the overlapping of cells has become typical in the majority of the coverage area of the network. Vertical handovers occur between two layers of cells when a user is switched from one layer to the other. In this paper we investigate the influence of network parameters on vertical hard handover performance in a cell environment. The work considers two layers of cells: a layer of macrocells and a layer of microcells. Handover requests enter the macrocell from neighbor macrocells and from microcells that belong to a different layer. Using Markov chain analysis and simulation we calculate network performance parameters such as mean queue delay, handover dropping probability and channel utilization. We also compare the handover performance for the macrocell and macrocell traffic separately. Our results show the influence of total channels, maximum queue size and handover request arrival rate on handover performance. They also show that when the traffic from each layer is treated with equal priority in the system, the performance of each layer is comparable.
MULTI-HOP BANDWIDTH MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKSIJMIT JOURNAL
An admission control scheme should play the role of a coordinator for flows in a data communication network, to provide the guarantees as the medium is shared. The nodes of a wired network can monitor the medium to know the available bandwidth at any point of time. But, in wireless ad hoc networks, a node must consume the bandwidth of neighboring nodes, during a communication. Hence, the consumption of bandwidth by a flow and the availability of resources to any wireless node strictly depend upon the neighboring nodes within its transmission range. We present a scalable and efficient admission control scheme, Multi-hop Bandwidth Management Protocol (MBMP), to support the QoS requirements
in multi-hop ad hoc networks. We simulate several options to design MBMP and compare the performances of these options through mathematical analysis and simulation results, and compare its effectiveness with the existing admission control schemes through extensive simulations.
IEEE 802.11n Based Wireless Backhaul Enabled by Dual Channel IPT (DCH-IPT) Fo...CSCJournals
Wireless backhaul has received much attention as an enabler of future broadband mobile communication systems because it can reduce deployment cost of pico-cells, an essential part of high capacity system. A high throughput with a minimum delay network is highly appreciated to sustain the increasing proliferation in multimedia transmissions. In this paper, we propose a backhaul network using the Multi-Input Multi-Output (MIMO) IEEE 802.11n standard in conjunction with the Dual Channel Intermittent Periodic Transmit IPT (DCH-IPT) packets forwarding protocol. By using these two techniques (IEEE 802.11n + DCH-IPT), wireless backhaul nodes can meet more demanding communication requirements such as higher throughput, lower average delay, and lower packet dropping rate than those achieved by the currently used backhaul. The current backhaul is based upon Single-Input Single-Output (SISO) IEEE 802.11a,b,g standards in conjunction with Single Channel Conventional (SCH-Conv) relaying protocol in which packets are transmitted continuously from source nodes using single channel. The proposed backhaul will accelerate introduction of picocell based mobile communication systems.
Tight Coupling Internetworking Between UMTS and WLAN: Challenges, Design Arch...CSCJournals
To provide seamless internet connectivity anywhere at any time to the mobile users, there is a strong demand for the integration of wireless access networks for all-IP based Next Generation Networks (NGN). The Wireless Local Area Network (WLAN) is capable of providing high data rate at low cost. However, its services are limited to a small geographical area. Universal Mobile Telecommunications System (UMTS) networks provide global coverage, however, cost is high and the provided data rate do not fulfill the requirements of bandwidth intensive applications. By integrating these two promising technologies; UMTS and WLAN several benefits can be achieved, i.e., load balancing, extension of coverage area, better Quality of Service (QoS), improved security features, etc. Therefore, the integration of these two technologies can provide ubiquitous connectivity and high data rate at low cost to wireless clients. In this paper different integration mechanisms of UMTS and WLAN are investigated. More precisely, an integrated mechanism for the integration of UMTS and WLAN based on two different variations of tight coupling, i.e., interconnecting WLAN with Serving GPRS Support Node (SGSN) and Gateway GPRS Support Node (GGSN) is designed and analyzed. The simulated results reveal that the GGSN-WLAN integration performance is better than the SGSN-WLAN integration for all the applied applications and measurement parameters.
we find out various power aware and data packet rate control with-collision-avoidance (CSMA/CA)-based ad hoc wireless network communication. And identifies that CSMA
Reducing handoff delay by adaptive thresholdijistjournal
In wireless networks data are sent and received with impressive speed and ease. Mobile WiMAX is a
broadband wireless solution that enables coverage of mobile and fixed broadband networks with flexible
network architecture. Devised as a truly broadband access solution, the WiMAX technology offers
promising features in terms of high bandwidth, extended coverage area and low cost. Despite having
many advantages, WiMAX faces major research issues like QoS based bandwidth allocation, Roaming,
Internetworking with other technologies, security and handoff. Handoff occurs when a mobile user goes
from one cell to another without interruption of ongoing session. Many approaches have been proposed
for reducing handoff delay. In this paper, we propose a new approach by which a critical area, an area
far away from serving base station but still inside the coverage of serving base station, is found. And then
overlapping area between serving base stations and neighboring base station are found and tabulated.
According to the size of overlapping area, different weights are assigned where handoff threshold is
changed adaptively to reduce handoff delay.
VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETsCSCJournals
The wireless communication TCP/IP protocol is an important role in developing communication systems and which provides better and reliable communication capabilities in almost all kinds of networking environment. The wireless networking technology and the new kind of requirements in communication systems need some extensions to the original design of TCP for on coming technology development. In this paper we have analyzed six TCP Congestion Control Algorithms and their performance on Mobile Ad-hoc Networks (MANET). More specifically, we describe the performance behavior of BIC, Cubic, TCP Compound, Vegas, Reno and Westwood congestion control algorithms. The evaluation is simulated through Network Simulator (NS2) and the performance of these congestion control algorithms is analyzed with suitable metrics.
Handover Behaviour of Transparent Relay in WiMAX NetworksIDES Editor
The knowledge on handover behaviour in WiMAX
network is essential for network management and planning
in order to achieve optimum system throughput. In this paper
we have analysed the handover behaviour of transparent relay
in several configurations for the IEEE 802.16j Mobile Multihop
Relay (MMR) WiMAX network. The simulation was
performed using NCTUns tool and adopted the hard handover
mechanism for three different relay network topologies with
varying mobile station speeds. The result shows the handover
for internal network is faster than the external network and
by appropriate relay deployment the system throughput can
be increased up to 14.39%.
Modelling and QoS-Achieving Solution in full-duplex Cellular SystemsIJCNCJournal
The global bandwidth scarcity and the ever-growing demand for fast wireless services have motivated the quest for new techniques that enhance the spectral efficiency (SE) of wireless systems. Most conventional SE increasing methods (e.g., adaptive modulation and coding) have already been exhausted. Single-channel full-duplex (SCFD) communication is a new attractive approach in which each node may simultaneously receive and transmit over the same frequency channel, and thus, it has the potential to double the current SE figures. In this paper, we derive a model for the signal-to-interference-plus-noise ratio (SINR) in a SCFD-based cellular system with imperfect self-interference cancellation. Furthermore, given a set of uplink and downlink quality of service requirements, we answer the following two fundamental questions. First, is this set achievable in the SCFD-based cellular system? Second, if the given set is achievable, what is the optimal achieving policy? To that end, we provide a unified model for the SCFD-based cellular system, and give insights in the matrix of interference channel gains. Simulation results suggest that depending on the locations of the users, a combination of full-duplex and half-duplex modes over the whole network is more favourable policy
Design and implementation of new routingIJCNCJournal
Energy consumption is a key element in the Wireless Sensor Networks (WSNs) design. Indeed, sensor nodes are really constrained by energy supply. Hence, how to improve the network lifetime is a crucial and challenging task. Several techniques are available at different levels of the OSI model to maximize the WSN lifetime and especially at the network layer which uses routing strategies to maintain the routes in the network and guarantee reliable communication. In this paper we intend to propose a new protocol called
Combined Energy and Distance Metrics Dynamic Routing Protocol (CEDM-DR). Our new approach considers not only the distance between wireless sensors but also the energy of node acting as a router in order to find the optimal path and achieve a dynamic and adaptive routing.
The performance metrics exploited for the evaluation of our protocol are average energy consumed, network lifetime and packets lost. By comparing our proposed routing strategy to protocol widely used in WSN namely Ad hoc On demand Distance Vector(AODV), simulation results show that CEDM-DR strategy might effectively balance the sensor power consumption and permits accordingly to enhance the network
lifetime. As well, this new protocol yields a noticeable energy saving compared to its counterpart.
Video transmission over wireless network requires
link reliability. Videos are having more data to be transmitted
during communication. The criticality and load of the network
increases when some video data is communicated over the
network. Firstly, describes the characteristics of Mobile Ad hoc
Networks and their Routing protocol, and second a mobile ad
hoc network (MANET) which consists of set mobile wireless
nodes and one fixed wireless server are design using ns-2. In this
research we will simulate three MANET routing protocols such
as AODV against three different parameters i.e. delay, network
load, throughput and retransmission.
Markovian Queueing Model for Throughput Maximization in D2D-Enabled Cellular ...IJECEIAES
Device-to-Device (D2D) communication has been considered a key enabling technol- ogy that can facilitate spectrum sharing in 4G and 5G cellular networks. In order to meet the high data rate demands of these new generation cellular networks, this paper considers the optimization of available spectrum resource through dynamic spectrum access. The utilization of continuous-time Markov chain (CTMC) model for efficient spectrum access in D2D-enabled cellular networks is investigated for the purpose of determining the impact of this model on the capacity improvement of cellular networks. The paper considers the use of CTMC model with both queueing and non-queueing cases called 13-Q CTMC and 6-NQ CTMC respectively with the aim of improving the overall capacity of the cellular network under a fairness constraint among all users. The proposed strategy consequently ensures that spectrum access for cellular and D2D users is optimally coordinated by designing optimal spectrum access probabilities. Numerical simulations are performed to observe the impact of the proposed Markovian queueing model on spectrum access and consequently on the capacity of D2D-enabled cellular networks. Results showed that the proposed 13-Q CTMC provide a more spectrumefficient sharing scheme, thereby enabling better network performances and larger capabilities to accommodate more users.
Achieving Transmission Fairness in Distributed Medium Access Wireless Mesh Ne...ijwmn
Wireless mesh networking gained an international interest over the years as a result to high recognition in
the wireless industry as a cost effective, scalable, wider coverage and capacity capable wireless technology.
The contention based distributed medium access in wireless networks has advanced not only in supporting
the quality of multimedia but also achieving high throughput and to minimize packet delay overheads in
legacy systems. Unfortunately, the impact of such enhancement has not been fully justified with mesh
network environments yet. The medium access frames are required to be contended over multi-hops to
overcome the challenges of improving overall system performance through concurrent transmissions. The
goal of this paper is to discuss the issues and challenges of transmission fairness and the effect of
concurrent transmission on system performance. To mitigate transmission fairness issues, we review
existing open literature on mesh networking and provide guidelines for better system design and
deployment. Finally, we conclude the paper with future research directions. This study may help network
designer and planner to overcome the remaining challenging issues in the design and deployment of WMNs
worldwide.
An Efficient Wireless Backhaul Utilizing MIMO Transmission and IPT ForwardingCSCJournals
Wireless backhaul has been received much attention as an enabler of future broadband mobile communication systems because it can reduce deployment cost of pico-cells, an essential part of high capacity system. A high performance network, high throughput, low average delay and low packet loss rate, is highly appreciated to sustain the increasing proliferation in multimedia transmissions. The critical issue reducing the performance of wireless backhaul is the interference occurred in the network due to simultaneous nodes transmissions. In this research, we propose a high performance wireless backhaul using the low interference sensitivity MIMO based nodes. MIMO transmission has a better BER performance over SISO one even with the same transmission rate and bandwidth, which means that MIMO can operate at lower SINR values than SISO and give the same performance. This MIMO robust performance against interference gives us a greater benefit when adopted as a wireless interface in wireless backhaul than SISO. These facts motivated us to use the IEEE 802.11n the current MIMO standard to design a MIMO based wireless backhaul. In addition and to justify our assumptions, we investigate the effect of MIMO channels correlation, a major drawback in MIMO transmission, upon the system performance, and prove the robustness of the scheme under different MIMO channels correlation values. After proving the effectiveness of MIMO as a wireless interface for wireless backhaul, we further improve the performance of this MIMO-backhaul using the high efficient Intermittent Periodic Transmit (IPT) forwarding protocol. IPT is a reduced interference packet forwarding protocol with a more efficient relay performance than conventional method in which packets are transmitted continuously form the source nodes. By using these two techniques (IEEE 802.11n (MIMO) + IPT), wireless backhaul nodes can meet more demanding communication requirements such as higher throughput, lower average delay, and lower packet dropping rate than those achieved by simply applying IEEE 802.11n to conventionally relayed backhaul. The proposed wireless backhaul will accelerate introduction of picocell based mobile communication systems.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
MULTI-CRITERIA HANDOVER DECISION FOR HETEROGENEOUS NETWORKS: CARRIER AGGREGAT...IJCNCJournal
Carrier aggregation and integration of heterogeneous networks allow the mobile user equipment to benefit from wider bandwidth and radio coverage of different access technologies. However, these technologies have increased handoff scenario probability through user equipment’s mobility, leading to high outage probability and low throughput. Handover is an important aspect of mobility management which allows users to migrate from one cell to another without losing connections. But no lone access technology meets the requirements of providing seamless communication without loss and delay. Therefore, high-quality service continuity and reliable user equipment access to network anywhere and at any time require the
design of an appropriate handover decision algorithm. In this paper, a multi-criteria based handover decision-making algorithm is proposed to evade loss of communication and provide better performance to the system. It adaptively makes handover decisions based on different decision criteria (load, availability of resources, and the handover scenario type) in addition to signal interference to noise ratio. The multicriteria handover decision making algorithm-based method chooses among the cells that satisfy the requirements for the handover. As compared to some existing handover decision algorithms, simulation result shows that this algorithm improves system performance in terms of handover failure by 93%, 72%,
and 58%; radio link failure reduction by 77%, 43%, and 22%; and handover ping–pong by 81%, 59%, and 36% over the conventional received signal strength, received wireless transmission line, and multiinfluence factor hand over decisions respectively.
17 9253 denial of impedance for mobile cellular (edit ari)IAESIJEECS
Wireless network broadly utilized today incorporate, cell system, remote cross section system (WMNs), remote neighbourhood and individual zone system. The expanding interest for these systems has transformed range into a valuable asset. Consequently, there is dependably a requirement for techniques to pack more bits/Hz. In this paper, we list the purposes behind this far reaching doubt, and talk about how present and future patterns will expand the need and reasonability of multiuser collectors for both the uplink, where numerous offbeat clients will be all the while identified, and the downlink, where clients will be planned and generally orthogonal zed, yet the portable handset will in any case need to adapt to a couple of predominant meddling base stations. New results for impedance wiping out beneficiaries that utilization traditional front finishes are appeared to ease a large number of the deficiencies of earlier systems, especially for the testing uplink. This paper gives a diagram of key late research leaps forward on obstruction cancelation, and highlights framework level contemplations for future multiuser recipients.
Performance evaluation of the IEEE 802.11n random topology WLAN with QoS appl...IJECEIAES
The IEEE 802.11n supports high data rate transmissions due its physical layer Multiple Input Multiple Output (MIMO) advanced antenna system and MAC layer enhancement features (frame aggregation and block acknowledgement). As a result this standard is very suitable for multimedia services through its Enhanced Distributed Channel Access (EDCA). This paper focuses on evaluating the Quality of Service (QoS) application on the performance of the IEEE 802.11n random topology WLAN. Three different number of nodes (3, 9 and 18) random topology with one access point are modeled and simulated by using the Riverbed OPNET 17.5 Modular to investigate the Wireless Local Area Network (WLAN) performance for different spatial streams. The result clarified the impact of QoS application and showed that its effect is best at the 18 node number topology. For a 4x4 MIMO, when QoS is applied and with respect to the no QoS application case, simulation results show a maximum improvement of 86.4%, 33.9%, 52.2% and 68.9% for throughput, delay, data drop and retransmission attempts, respectively.
Recital Study of Various Congestion Control Protocols in wireless networkiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
CROSS-LAYER RESOURCE ALLOCATION SCHEME UNDER HETEROGENEOUS CONSTRAINTS FOR NE...IJNSA Journal
In the next generation wireless networks, the growing demand for new wireless applications is accompanied with high expectations for better quality of service (QoS) fulfillment especially for multimedia applications. Furthermore, the coexistence of future unlicensed users with existing licensed users is becoming a challenging task in the next generation communication systems to overcome the underutilization of the spectrum. A QoS and interference aware resource allocation is thus of special interest in order to respond to the heterogeneous constraints of the next generation networks. In this work, we address the issue of resource allocation under heterogeneous constraints for unlicensed multiband ultra-wideband (UWB) systems in the context of Future Home Networks, i.e. the wireless personal area network (WPAN). The problem is first studied analytically using a heterogeneous constrained optimization problem formulation. After studying the characteristics of the optimal solution, we propose a low-complexity suboptimal algorithm based on a cross-layer approach that combines information provided by the PHY and MAC layers. While the PHY layer is responsible for providing the channel quality of the unlicensed UWB users as well as their interference power that they cause on licensed users, the MAC layer is responsible for classifying the unlicensed users using a two-class based approach that guarantees for multimedia services a high-priority level compared to other services. Combined in an efficient and simple way, the PHY and MAC information present the key elements of the aimed resource allocation. Simulation results demonstrate that the proposed scheme provides a good tradeoff between the QoS satisfaction of the unlicensed applications with hard QoS requirements and the limitation of the interference affecting the licensed users.
Enhancing Cloud Computing Security for Data Sharing Within Group Membersiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Performance assessment of VoIP service over different handover mechanisms in ...IJECEIAES
Many researchers have discussed various topics in universal mobile telecommunication system (UMTS) networks: the process of switching from one cell to another for the subscriber and the impact of the quality of the connection during the transition process, quality of services (QoS), the quality of the uplink and downlink carrier line, the various types of code for the voice transmitted through the Internet, especially the research that discussed voice over internet protocol (VoIP) technology as voice travels from cell to cell in mobile networks, depending on the type of delivery. In this paper, a proposed scenario of a UMTS network was implemented to evaluate the multicellular VoIP movement; the proposed UMTS network was simulated using the OPNET 14.5 simulator. The calculation and analysis of the different parameters of the user while moving from one cell to another with different movement speeds considered, the best mean opinion score (MOS) value (3.19) registered for the scenario (soft handover) comparing with another type of handover (3.00).
EVALUATION OF PARAMETERS FOR IMPROVING HANDOFF PERFORMANCE IN MOBILE WIMAX NE...ijdpsjournal
Mobile WiMAX is the latest technology that promises broadband wireless access over long distance. In order to support mobility and continuous network connectivity in mobile WiMAX, it is necessary to provide handoff. Handoff is an essential process in wireless networks to guarantee continuous and effective services. This paper focuses on the analysis of the performance of the handoff process in Mobile WiMAX. This paper aims to find out the factors/parameters of the WiMAX module that affect handoff performance the most, such as handoff duration of less than 50 ms and mobility speed up to 120km/hour. Simulation results show that some of the parameters of WiMAX do not have any influence on handoff latency, while others have great impact towards achieving shorter handoff duration time. The results also show that handoff times could vary for different speeds of the Mobile Station (MS).
Reducing handoff delay by adaptive thresholdijistjournal
In wireless networks data are sent and received with impressive speed and ease. Mobile WiMAX is a
broadband wireless solution that enables coverage of mobile and fixed broadband networks with flexible
network architecture. Devised as a truly broadband access solution, the WiMAX technology offers
promising features in terms of high bandwidth, extended coverage area and low cost. Despite having
many advantages, WiMAX faces major research issues like QoS based bandwidth allocation, Roaming,
Internetworking with other technologies, security and handoff. Handoff occurs when a mobile user goes
from one cell to another without interruption of ongoing session. Many approaches have been proposed
for reducing handoff delay. In this paper, we propose a new approach by which a critical area, an area
far away from serving base station but still inside the coverage of serving base station, is found. And then
overlapping area between serving base stations and neighboring base station are found and tabulated.
According to the size of overlapping area, different weights are assigned where handoff threshold is
changed adaptively to reduce handoff delay.
VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETsCSCJournals
The wireless communication TCP/IP protocol is an important role in developing communication systems and which provides better and reliable communication capabilities in almost all kinds of networking environment. The wireless networking technology and the new kind of requirements in communication systems need some extensions to the original design of TCP for on coming technology development. In this paper we have analyzed six TCP Congestion Control Algorithms and their performance on Mobile Ad-hoc Networks (MANET). More specifically, we describe the performance behavior of BIC, Cubic, TCP Compound, Vegas, Reno and Westwood congestion control algorithms. The evaluation is simulated through Network Simulator (NS2) and the performance of these congestion control algorithms is analyzed with suitable metrics.
Handover Behaviour of Transparent Relay in WiMAX NetworksIDES Editor
The knowledge on handover behaviour in WiMAX
network is essential for network management and planning
in order to achieve optimum system throughput. In this paper
we have analysed the handover behaviour of transparent relay
in several configurations for the IEEE 802.16j Mobile Multihop
Relay (MMR) WiMAX network. The simulation was
performed using NCTUns tool and adopted the hard handover
mechanism for three different relay network topologies with
varying mobile station speeds. The result shows the handover
for internal network is faster than the external network and
by appropriate relay deployment the system throughput can
be increased up to 14.39%.
Modelling and QoS-Achieving Solution in full-duplex Cellular SystemsIJCNCJournal
The global bandwidth scarcity and the ever-growing demand for fast wireless services have motivated the quest for new techniques that enhance the spectral efficiency (SE) of wireless systems. Most conventional SE increasing methods (e.g., adaptive modulation and coding) have already been exhausted. Single-channel full-duplex (SCFD) communication is a new attractive approach in which each node may simultaneously receive and transmit over the same frequency channel, and thus, it has the potential to double the current SE figures. In this paper, we derive a model for the signal-to-interference-plus-noise ratio (SINR) in a SCFD-based cellular system with imperfect self-interference cancellation. Furthermore, given a set of uplink and downlink quality of service requirements, we answer the following two fundamental questions. First, is this set achievable in the SCFD-based cellular system? Second, if the given set is achievable, what is the optimal achieving policy? To that end, we provide a unified model for the SCFD-based cellular system, and give insights in the matrix of interference channel gains. Simulation results suggest that depending on the locations of the users, a combination of full-duplex and half-duplex modes over the whole network is more favourable policy
Design and implementation of new routingIJCNCJournal
Energy consumption is a key element in the Wireless Sensor Networks (WSNs) design. Indeed, sensor nodes are really constrained by energy supply. Hence, how to improve the network lifetime is a crucial and challenging task. Several techniques are available at different levels of the OSI model to maximize the WSN lifetime and especially at the network layer which uses routing strategies to maintain the routes in the network and guarantee reliable communication. In this paper we intend to propose a new protocol called
Combined Energy and Distance Metrics Dynamic Routing Protocol (CEDM-DR). Our new approach considers not only the distance between wireless sensors but also the energy of node acting as a router in order to find the optimal path and achieve a dynamic and adaptive routing.
The performance metrics exploited for the evaluation of our protocol are average energy consumed, network lifetime and packets lost. By comparing our proposed routing strategy to protocol widely used in WSN namely Ad hoc On demand Distance Vector(AODV), simulation results show that CEDM-DR strategy might effectively balance the sensor power consumption and permits accordingly to enhance the network
lifetime. As well, this new protocol yields a noticeable energy saving compared to its counterpart.
Video transmission over wireless network requires
link reliability. Videos are having more data to be transmitted
during communication. The criticality and load of the network
increases when some video data is communicated over the
network. Firstly, describes the characteristics of Mobile Ad hoc
Networks and their Routing protocol, and second a mobile ad
hoc network (MANET) which consists of set mobile wireless
nodes and one fixed wireless server are design using ns-2. In this
research we will simulate three MANET routing protocols such
as AODV against three different parameters i.e. delay, network
load, throughput and retransmission.
Markovian Queueing Model for Throughput Maximization in D2D-Enabled Cellular ...IJECEIAES
Device-to-Device (D2D) communication has been considered a key enabling technol- ogy that can facilitate spectrum sharing in 4G and 5G cellular networks. In order to meet the high data rate demands of these new generation cellular networks, this paper considers the optimization of available spectrum resource through dynamic spectrum access. The utilization of continuous-time Markov chain (CTMC) model for efficient spectrum access in D2D-enabled cellular networks is investigated for the purpose of determining the impact of this model on the capacity improvement of cellular networks. The paper considers the use of CTMC model with both queueing and non-queueing cases called 13-Q CTMC and 6-NQ CTMC respectively with the aim of improving the overall capacity of the cellular network under a fairness constraint among all users. The proposed strategy consequently ensures that spectrum access for cellular and D2D users is optimally coordinated by designing optimal spectrum access probabilities. Numerical simulations are performed to observe the impact of the proposed Markovian queueing model on spectrum access and consequently on the capacity of D2D-enabled cellular networks. Results showed that the proposed 13-Q CTMC provide a more spectrumefficient sharing scheme, thereby enabling better network performances and larger capabilities to accommodate more users.
Achieving Transmission Fairness in Distributed Medium Access Wireless Mesh Ne...ijwmn
Wireless mesh networking gained an international interest over the years as a result to high recognition in
the wireless industry as a cost effective, scalable, wider coverage and capacity capable wireless technology.
The contention based distributed medium access in wireless networks has advanced not only in supporting
the quality of multimedia but also achieving high throughput and to minimize packet delay overheads in
legacy systems. Unfortunately, the impact of such enhancement has not been fully justified with mesh
network environments yet. The medium access frames are required to be contended over multi-hops to
overcome the challenges of improving overall system performance through concurrent transmissions. The
goal of this paper is to discuss the issues and challenges of transmission fairness and the effect of
concurrent transmission on system performance. To mitigate transmission fairness issues, we review
existing open literature on mesh networking and provide guidelines for better system design and
deployment. Finally, we conclude the paper with future research directions. This study may help network
designer and planner to overcome the remaining challenging issues in the design and deployment of WMNs
worldwide.
An Efficient Wireless Backhaul Utilizing MIMO Transmission and IPT ForwardingCSCJournals
Wireless backhaul has been received much attention as an enabler of future broadband mobile communication systems because it can reduce deployment cost of pico-cells, an essential part of high capacity system. A high performance network, high throughput, low average delay and low packet loss rate, is highly appreciated to sustain the increasing proliferation in multimedia transmissions. The critical issue reducing the performance of wireless backhaul is the interference occurred in the network due to simultaneous nodes transmissions. In this research, we propose a high performance wireless backhaul using the low interference sensitivity MIMO based nodes. MIMO transmission has a better BER performance over SISO one even with the same transmission rate and bandwidth, which means that MIMO can operate at lower SINR values than SISO and give the same performance. This MIMO robust performance against interference gives us a greater benefit when adopted as a wireless interface in wireless backhaul than SISO. These facts motivated us to use the IEEE 802.11n the current MIMO standard to design a MIMO based wireless backhaul. In addition and to justify our assumptions, we investigate the effect of MIMO channels correlation, a major drawback in MIMO transmission, upon the system performance, and prove the robustness of the scheme under different MIMO channels correlation values. After proving the effectiveness of MIMO as a wireless interface for wireless backhaul, we further improve the performance of this MIMO-backhaul using the high efficient Intermittent Periodic Transmit (IPT) forwarding protocol. IPT is a reduced interference packet forwarding protocol with a more efficient relay performance than conventional method in which packets are transmitted continuously form the source nodes. By using these two techniques (IEEE 802.11n (MIMO) + IPT), wireless backhaul nodes can meet more demanding communication requirements such as higher throughput, lower average delay, and lower packet dropping rate than those achieved by simply applying IEEE 802.11n to conventionally relayed backhaul. The proposed wireless backhaul will accelerate introduction of picocell based mobile communication systems.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
MULTI-CRITERIA HANDOVER DECISION FOR HETEROGENEOUS NETWORKS: CARRIER AGGREGAT...IJCNCJournal
Carrier aggregation and integration of heterogeneous networks allow the mobile user equipment to benefit from wider bandwidth and radio coverage of different access technologies. However, these technologies have increased handoff scenario probability through user equipment’s mobility, leading to high outage probability and low throughput. Handover is an important aspect of mobility management which allows users to migrate from one cell to another without losing connections. But no lone access technology meets the requirements of providing seamless communication without loss and delay. Therefore, high-quality service continuity and reliable user equipment access to network anywhere and at any time require the
design of an appropriate handover decision algorithm. In this paper, a multi-criteria based handover decision-making algorithm is proposed to evade loss of communication and provide better performance to the system. It adaptively makes handover decisions based on different decision criteria (load, availability of resources, and the handover scenario type) in addition to signal interference to noise ratio. The multicriteria handover decision making algorithm-based method chooses among the cells that satisfy the requirements for the handover. As compared to some existing handover decision algorithms, simulation result shows that this algorithm improves system performance in terms of handover failure by 93%, 72%,
and 58%; radio link failure reduction by 77%, 43%, and 22%; and handover ping–pong by 81%, 59%, and 36% over the conventional received signal strength, received wireless transmission line, and multiinfluence factor hand over decisions respectively.
17 9253 denial of impedance for mobile cellular (edit ari)IAESIJEECS
Wireless network broadly utilized today incorporate, cell system, remote cross section system (WMNs), remote neighbourhood and individual zone system. The expanding interest for these systems has transformed range into a valuable asset. Consequently, there is dependably a requirement for techniques to pack more bits/Hz. In this paper, we list the purposes behind this far reaching doubt, and talk about how present and future patterns will expand the need and reasonability of multiuser collectors for both the uplink, where numerous offbeat clients will be all the while identified, and the downlink, where clients will be planned and generally orthogonal zed, yet the portable handset will in any case need to adapt to a couple of predominant meddling base stations. New results for impedance wiping out beneficiaries that utilization traditional front finishes are appeared to ease a large number of the deficiencies of earlier systems, especially for the testing uplink. This paper gives a diagram of key late research leaps forward on obstruction cancelation, and highlights framework level contemplations for future multiuser recipients.
Performance evaluation of the IEEE 802.11n random topology WLAN with QoS appl...IJECEIAES
The IEEE 802.11n supports high data rate transmissions due its physical layer Multiple Input Multiple Output (MIMO) advanced antenna system and MAC layer enhancement features (frame aggregation and block acknowledgement). As a result this standard is very suitable for multimedia services through its Enhanced Distributed Channel Access (EDCA). This paper focuses on evaluating the Quality of Service (QoS) application on the performance of the IEEE 802.11n random topology WLAN. Three different number of nodes (3, 9 and 18) random topology with one access point are modeled and simulated by using the Riverbed OPNET 17.5 Modular to investigate the Wireless Local Area Network (WLAN) performance for different spatial streams. The result clarified the impact of QoS application and showed that its effect is best at the 18 node number topology. For a 4x4 MIMO, when QoS is applied and with respect to the no QoS application case, simulation results show a maximum improvement of 86.4%, 33.9%, 52.2% and 68.9% for throughput, delay, data drop and retransmission attempts, respectively.
Recital Study of Various Congestion Control Protocols in wireless networkiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
CROSS-LAYER RESOURCE ALLOCATION SCHEME UNDER HETEROGENEOUS CONSTRAINTS FOR NE...IJNSA Journal
In the next generation wireless networks, the growing demand for new wireless applications is accompanied with high expectations for better quality of service (QoS) fulfillment especially for multimedia applications. Furthermore, the coexistence of future unlicensed users with existing licensed users is becoming a challenging task in the next generation communication systems to overcome the underutilization of the spectrum. A QoS and interference aware resource allocation is thus of special interest in order to respond to the heterogeneous constraints of the next generation networks. In this work, we address the issue of resource allocation under heterogeneous constraints for unlicensed multiband ultra-wideband (UWB) systems in the context of Future Home Networks, i.e. the wireless personal area network (WPAN). The problem is first studied analytically using a heterogeneous constrained optimization problem formulation. After studying the characteristics of the optimal solution, we propose a low-complexity suboptimal algorithm based on a cross-layer approach that combines information provided by the PHY and MAC layers. While the PHY layer is responsible for providing the channel quality of the unlicensed UWB users as well as their interference power that they cause on licensed users, the MAC layer is responsible for classifying the unlicensed users using a two-class based approach that guarantees for multimedia services a high-priority level compared to other services. Combined in an efficient and simple way, the PHY and MAC information present the key elements of the aimed resource allocation. Simulation results demonstrate that the proposed scheme provides a good tradeoff between the QoS satisfaction of the unlicensed applications with hard QoS requirements and the limitation of the interference affecting the licensed users.
Enhancing Cloud Computing Security for Data Sharing Within Group Membersiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Performance assessment of VoIP service over different handover mechanisms in ...IJECEIAES
Many researchers have discussed various topics in universal mobile telecommunication system (UMTS) networks: the process of switching from one cell to another for the subscriber and the impact of the quality of the connection during the transition process, quality of services (QoS), the quality of the uplink and downlink carrier line, the various types of code for the voice transmitted through the Internet, especially the research that discussed voice over internet protocol (VoIP) technology as voice travels from cell to cell in mobile networks, depending on the type of delivery. In this paper, a proposed scenario of a UMTS network was implemented to evaluate the multicellular VoIP movement; the proposed UMTS network was simulated using the OPNET 14.5 simulator. The calculation and analysis of the different parameters of the user while moving from one cell to another with different movement speeds considered, the best mean opinion score (MOS) value (3.19) registered for the scenario (soft handover) comparing with another type of handover (3.00).
EVALUATION OF PARAMETERS FOR IMPROVING HANDOFF PERFORMANCE IN MOBILE WIMAX NE...ijdpsjournal
Mobile WiMAX is the latest technology that promises broadband wireless access over long distance. In order to support mobility and continuous network connectivity in mobile WiMAX, it is necessary to provide handoff. Handoff is an essential process in wireless networks to guarantee continuous and effective services. This paper focuses on the analysis of the performance of the handoff process in Mobile WiMAX. This paper aims to find out the factors/parameters of the WiMAX module that affect handoff performance the most, such as handoff duration of less than 50 ms and mobility speed up to 120km/hour. Simulation results show that some of the parameters of WiMAX do not have any influence on handoff latency, while others have great impact towards achieving shorter handoff duration time. The results also show that handoff times could vary for different speeds of the Mobile Station (MS).
BIO-INSPIRED SEAMLESS VERTICAL HANDOVER ALGORITHM FOR VEHICULAR AD HOC NETWORKSijwmn
One of the most important factors to implement VANET is by considering the variety of wireless networks available around the city as well as the vehicles traffic scenarios. However, by providing a diverse range of wireless access technologies, it is necessary to provide continuous network connectivity as well as selecting the most suitable network technology and performance. Many researchers have worked on building algorithms for selecting the best network to improve the handover process. However, with high-speed vehicles mobility, the vertical handover process became the most challenging task in order to achieve realtime network selection. This paper proposes a bio-inspired network selection algorithm influenced by insect's behaviour which combines Artificial Bee Colony (ABC) and Particle Swarm Optimization (PSO). The proposed algorithm is applied to process multi-criteria parameters to evaluate the best available network and then execute the handover process seamlessly. The results demonstrate the benefits of the proposed Multi-Criteria ABC-PSO method by reducing the handover decision delays by 25%. It gives the optimum performance in terms of network selections and reduces the handover latency by 14.5%. The proposed algorithm also reduces the number of unnecessary handovers by 48% for three different mobility scenarios based on traffic environments (highway, urban and traffic jam).
General Model for Single and Multiple Channels WLANs with Quality of Service...ijwmn
In this paper we develop an intergraded model for request mechanism and data transmission in the uplink
phase in the presence of channel noise. This model supports quality of service. The wireless channel is prone
to many impairments. Thus, certain techniques have to be developed to deliver data to the receiver. We
calculated the performance parameters for single and multichannel wireless networks, like the requests
throughput, data throughput and the requests acceptance probability and data acceptance probability. The
proposed model is general model since it can be applied to different wireless networks such as IEEE802.11a,
IEEE802.16e, CDMA operated networks and Hiperlan\2.
Impact of Randomness on MAC Layer Schedulers over High Speed Wireless Campus ...ijcsse
IEEE802.11e standard provides an EDCA mechanism to ensure the QoS using service differentiation function for IMM traffics through the WCN. In an EDCA mechanism, IMM traffics have been classified into four categories and each category has specific priority. Many EDCA schedulers allow these traffics to access the channel based on assigned priorities. The IMM high priority traffic is high delay sensitive and required high bandwidth to ensure QoS over the networks. Scheduling mechanism is the effective way to satisfy IMM traffic but it cannot give guarantee because of the randomness of some EDCA schedulers or proposed networks. In order to provide the QoS, scheduling mechanism is the challenging issue to transmit IMM traffic through the channel and it is still need to be solved over WCN. This work aims to examine the effect of the randomness on different MAC layer schedulers' performance and evaluates the performance of the proposed schedulers using different performance metrics in WCN.
A PRACTICAL ROUTE RECONSTRUCTION METHOD FOR WI-FI MESH NETWORKS IN DISASTER S...ijwmn
Computer networks comprise essential infrastructure in modern society and must function even in a disaster situation. Therefore, fault-tolerant networks are being actively studied. Disaster information systems, however, suffer from two main issues: lack of their utilization in peacetime and the difficulty for a non-expert to manage them should a disaster strike. Therefore, we place special emphasis on the development of a reliable network infrastructure that can function during both normal and disaster times, using a Wi-Fi-based wireless mesh network. In a large-scale disaster situation, our goal is to identify a way to reconstruct the mesh network by adding the minimum number of spare access points (APs) to ensure the reachability of all mesh routers to the backbone network. Furthermore, we consider that only public workers without any experience with wireless communication technologies must decide upon the adequate locations for spare APs and install them. Both of simulation experiments and field trial prove the effectiveness of the proposed methods.
COMPARATIVE PERFORMANCE ANALYSIS OF THE IEEE802.11AX AND 802.11AC MIMOLINK FO...pijans
The escalating demand for swift and dependable wireless internet access has spurred the development of
various protocols within 802.11 WLANs. Among them, the 802.11ac protocols have gained widespread
acceptance over the past few years, offering enhanced data transfer rates compared to the 802.11n
standard. However, the persistent congestion of wireless IoT devices, particularly in densely populated
areas, remains a significant challenge. To tackle this issue, IEEE 802.11 has advanced IEEE 802.11ax as
the successor to 802.11ac, introducing critical enhancements at the PHY/MAC layers to improve
throughput in dense scenarios. Additionally, modelling and simulating these protocols are vital for WLAN
researchers and designers to anticipate link characteristics effectively, fostering high-performance WLAN
design. The need for such tools led to the creation of diverse network simulation programs, and NS-2 is
widely accepted as an open-source program that has achieved remarkable success in research. In this
paper, we focus on various connection properties of 802.11ax WLANs through NS-3 simulations, including
MCSs, bonded channels, GI, data encoding, antennas, data rates, link distance, Tx/Rx power, gain, and
payload size. We also compare their performance against 802.11ac, which demonstrates that NS-3
accurately supports most 802.11ax capabilities and outperforms 802.11ac in various scenarios.
QOS ROUTING AND PERFORMANCE EVALUATION FOR MOBILE AD HOC NETWORKS USING OLSR ...ijasuc
Mobile Ad-Hoc network is a collection of mobile nodes in communication without using infrastructure.
As the real-time applications used in today’s wireless network grow, we need some schemes to provide
more suitable service for them. We know that most of actual schemes do not perform well on traffic which
is not strictly CBR. Therefore, in this paper we have studied the impact, respectively, of mobility models
and the density of nodes on the performances (End-to-End Delay, Throughput and Packet Delivery ratio)
of routing protocol (Optimized Link State Routing) OLSR by using in the first a real-time VBR (MPEG-4)
and secondly the Constant Bit Rate (CBR) traffic. Finally we compare the performance on both cases.
Experimentally, we considered the three mobility models as follows Random Waypoint, Random
Direction and Mobgen Steady State. The experimental results illustrate that the behavior of OLSR change
according to the model and the used traffics.
RESOURCE ALLOCATION ALGORITHMS FOR QOS OPTIMIZATION IN MOBILE WIMAX NETWORKSijwmn
WiMAX is based on the standard IEEE 802.16e-2009 for wireless access in Metropolitan Area Networks. It
is one of the solutions for 4G IP based wireless technology. WiMAX utilizes Orthogonal Frequency
Division Multiple Access which also supports Multicast and Broadcast Service with appropriate
Modulation and Coding Scheme. Presently, Scheduling and Resource allocation algorithm in Opportunistic
Layered Multicasting provides multicasting of layered video over mobile WiMAX to ensure better QoS.
Initially, the knowledge based allocation of subcarriers is used for scheduling. In addition, to reduce the
burst overhead, delay and jitter, SWIM (Swapping Min-Max) algorithm is utilized. Another promising
technology that can greatly improve the system performance by exploring the broadcasting nature of
wireless channels and the cooperation among multiple users is the Cooperative Multicast Scheduling
(CMS) technique. The simulation results show, Swapping Min-Max performs better with lesser number of
bursts, Zero jitter and with optimal throughput. The results with Cooperative Multicast Scheduling show
the enhanced throughput for each member in the Multicasting Scenario.
In this paper, we examine WiMAX – based network and evaluate the performance for quality of service (QoS) using an idea of IEEE 802.16 technology. In our models, the study used a multiprocessor architecture organized by the interconnection network. OPNET Modeler is used to simulate the architecture and to calculate the performance criteria (i.e. throughput, delay and data dropped) that
slightly concerned in network estimation. It is concluded that our models shorten the time quite a bit for
obtaining the performance measures of an end-to-end delay as well as throughput can be used as an
effective tool for this purpose.
Efficiency and effectiveness video on demand over worldwide interoperability ...IJECEIAES
(WiMAX) is another solution for readiness broadband networks inside the region, covered or not, by alternative technologies like (ADSL) or cable through this paper by deploying many mobility patterns such as static, random and path for Video on Demand (VoD) over (WiMAX) Network. The performance of varied (QPSK) and (QAM) modulation techniques, by applying the (OPNET) simulator version 17.5. This work is finished in terms of the transmitted traffic and received traffic. Simulation result indicates that once nodes are moving by (SVC) code schema in (WiMAX). The result is an effective and attainable overall performance of (QPSK) which is better than (QAM) modulation technique.
Vehicle Ad Hoc Networks (VANETs) have become a viable technology to improve traffic flow and safety on the roads. Due to its effectiveness and scalability, the Wingsuit Search-based Optimised Link State Routing Protocol (WS-OLSR) is frequently used for data distribution in VANETs. However, the selection of MultiPoint Relays (MPRs) plays a pivotal role in WS-OLSR's performance. This paper presents an improved MPR selection algorithm tailored to WS-OLSR, designed to enhance the overall routing efficiency and reduce overhead. The analysis found that the current OLSR protocol has problems such as redundancy of HELLO and TC message packets or failure to update routing information in time, so a WS-OLSR routing protocol based on improved-MPR selection algorithm was proposed. Firstly, factors such as node mobility and link changes are comprehensively considered to reflect network topology changes, and the broadcast cycle of node HELLO messages is controlled through topology changes. Secondly, a new MPR selection algorithm is proposed, considering link stability issues and nodes. Finally, evaluate its effectiveness in terms of packet delivery ratio, end-to-end delay, and control message overhead. Simulation results demonstrate the superior performance of our improved MR selection algorithm when compared to traditional approaches.
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
So far, Wireless Body Area Networks (WBANs) have played a pivotal role in driving the development of intelligent healthcare systems with broad applicability across various domains. Each WBAN consists of one or more types of sensors that can be embedded in clothing, attached directly to the body, or even implanted beneath an individual's skin. These sensors typically serve asingle application. However, the traffic generated by each sensor may have distinct requirements. This diversity necessitates a dual approach: tailored treatment based on the specific needs of each traffic typeand the fulfillment of application requirements, such asreliability and timeliness. Never the less, the presence of energy constraints and the unreliable nature of wireless communications make QoS provisioning under such networks a non-trivial task. In this context, the current paper introduces a novel Medium AccessControl (MAC) strategy for the regular traffic applications of WBANs, designed to significantly enhance efficiency when compared to the established MAC protocols IEEE 802.15.4 and IEEE 802.15.6, with a particular focus on improving reliability, timeliness, and energy efficiency.
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdfIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
The efficient use of energy in wireless sensor networks is critical for extending node lifetime. The network topology is one of the factors that have a significant impact on the energy usage at the nodes and the quality of transmission (QoT) in the network. We propose a topology control algorithm for software-defined wireless sensor networks (SDWSNs) in this paper. Our method is to formulate topology control algorithm as a nonlinear programming (NP) problem with the objective to optimizing two metrics, maximum communication range, and desired degree. This NP problem is solved at the SDWSN controller by employing the genetic algorithm (GA) to determine the best topology. The simulation results show that the proposed algorithm outperforms the MaxPower algorithm in terms of average node degree and energy expansion ratio.
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
The integration of artificial intelligence technology with a scalable Internet of Things (IoT) platform facilitates diverse smart communication services, allowing remote users to access services from anywhere at any time. The multi-server environment within IoT introduces a flexible security service model, enabling users to interact with any server through a single registration. To ensure secure and privacy preservation services for resources, an authentication scheme is essential. Zhao et al. recently introduced a user authentication scheme for the multi-server environment, utilizing passwords and smart cards, claiming resilience against well-known attacks. This paper conducts cryptanalysis on Zhao et al.'s scheme, focusing on denial of service and privacy attacks, revealing a lack of user-friendliness. Subsequently, we propose a new multi-server user authentication scheme for privacy preservation with fuzzy commitment over the IoT environment, addressing the shortcomings of Zhao et al.'s scheme. Formal security verification of the proposed scheme is conducted using the ProVerif simulation tool. Through both formal and informal security analyses, we demonstrate that the proposed scheme is resilient against various known attacks and those identified in Zhao et al.'s scheme.
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
In -Vehicle Ad-Hoc Network (VANET), vehicles continuously transmit and receive spatiotemporal data with neighboring vehicles, thereby establishing a comprehensive 360-degree traffic awareness system. Vehicular Network safety applications facilitate the transmission of messages between vehicles that are near each other, at regular intervals, enhancing drivers' contextual understanding of the driving environment and significantly improving traffic safety. Privacy schemes in VANETs are vital to safeguard vehicles’ identities and their associated owners or drivers. Privacy schemes prevent unauthorized parties from linking the vehicle's communications to a specific real-world identity by employing techniques such as pseudonyms, randomization, or cryptographic protocols. Nevertheless, these communications frequently contain important vehicle information that malevolent groups could use to Monitor the vehicle over a long period. The acquisition of this shared data has the potential to facilitate the reconstruction of vehicle trajectories, thereby posing a potential risk to the privacy of the driver. Addressing the critical challenge of developing effective and scalable privacy-preserving protocols for communication in vehicle networks is of the highest priority. These protocols aim to reduce the transmission of confidential data while ensuring the required level of communication. This paper aims to propose an Advanced Privacy Vehicle Scheme (APV) that periodically changes pseudonyms to protect vehicle identities and improve privacy. The APV scheme utilizes a concept called the silent period, which involves changing the pseudonym of a vehicle periodically based on the tracking of neighboring vehicles. The pseudonym is a temporary identifier that vehicles use to communicate with each other in a VANET. By changing the pseudonym regularly, the APV scheme makes it difficult for unauthorized entities to link a vehicle's communications to its real-world identity. The proposed APV is compared to the SLOW, RSP, CAPS, and CPN techniques. The data indicates that the efficiency of APV is a better improvement in privacy metrics. It is evident that the AVP offers enhanced safety for vehicles during transportation in the smart city.
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
Malware is one of the threats to security of computer networks and information systems. Since malware instances are available sufficiently, there is increased interest among researchers on usage of Artificial Intelligence (AI). Of late AI-enabled methods such as machine learning (ML) and deep learning paved way for solving many real-world problems. As it is a learning-based approach, accumulated training samples help in improving thequality of training and thus leveraging malware detection accuracy. Existing deep learning methods are focusing on learning-based malware detection systems. However, there is need for improving the state of the art through ensemble approach. Towards this end, in this paper we proposed a framework known as Deep Ensemble Framework (DEF) for automatic malware detection. The framework obtains features from training samples. From given malware instance a grayscale image is generated. There is another process to extract the opcode sequences. Convolutional Neural Network (CNN) and Long Short Term Memory (LSTM) techniques are used to obtain grayscale image and opcode sequence respectively. Afterwards, a stacking ensemble is employed in order to achieve efficient malware detection and classification. Malware samples collected fromthe Internet sources and Microsoft are used for theempirical study. An algorithm known as Ensemble Learning for Automatic Malware Detection (EL-AML) is proposed to realize our framework. Another algorithm named Pre-Process is proposed to assist the EL-AML algorithm for obtaining intermediate features required by CNN and LSTM.Empirical study reveals that our framework outperforms many existing methods in terms of speed-up and accuracy.
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficIJCNCJournal
With the emergence of smart devices and the Internet of Things (IoT), millions of users connected to the network produce massive network traffic datasets. These vast datasets of network traffic, Big Data are challenging to store, deal with and analyse using a single computer. In this paper we developed parallel implementation using a High Performance Computer (HPC) for the Non-Negative Matrix Factorization technique as an engine for an Intrusion Detection System (HPC-NMF-IDS). The large IoT traffic datasets of order of millions samples are distributed evenly on all the computing cores for both storage and speedup purpose. The distribution of computing tasks involved in the Matrix Factorization takes into account the reduction of the communication cost between the computing cores. The experiments we conducted on the proposed HPC-IDS-NMF give better results than the traditional ML-based intrusion detection systems. We could train the HPC model with datasets of one million samples in only 31 seconds instead of the 40 minutes using one processor), that is a speed up of 87 times. Moreover, we have got an excellent detection accuracy rate of 98% for KDD dataset.
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
So far, Wireless Body Area Networks (WBANs) have played a pivotal role in driving the development of intelligent healthcare systems with broad applicability across various domains. Each WBAN consists of one or more types of sensors that can be embedded in clothing, attached directly to the body, or even implanted beneath an individual's skin. These sensors typically serve asingle application. However, the traffic generated by each sensor may have distinct requirements. This diversity necessitates a dual approach: tailored treatment based on the specific needs of each traffic typeand the fulfillment of application requirements, such asreliability and timeliness. Never the less, the presence of energy constraints and the unreliable nature of wireless communications make QoS provisioning under such networks a non-trivial task. In this context, the current paper introduces a novel Medium AccessControl (MAC) strategy for the regular traffic applications of WBANs, designed to significantly enhance efficiency when compared to the established MAC protocols IEEE 802.15.4 and IEEE 802.15.6, with a particular focus on improving reliability, timeliness, and energy efficiency.
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
The efficient use of energy in wireless sensor networks is critical for extending node lifetime. The network topology is one of the factors that have a significant impact on the energy usage at the nodes and the quality of transmission (QoT) in the network. We propose a topology control algorithm for software-defined wireless sensor networks (SDWSNs) in this paper. Our method is to formulate topology control algorithm as a nonlinear programming (NP) problem with the objective to optimizing two metrics, maximum communication range, and desired degree. This NP problem is solved at the SDWSN controller by employing the genetic algorithm (GA) to determine the best topology. The simulation results show that the proposed algorithm outperforms the MaxPower algorithm in terms of average node degree and energy expansion ratio.
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
The integration of artificial intelligence technology with a scalable Internet of Things (IoT) platform facilitates diverse smart communication services, allowing remote users to access services from anywhere at any time. The multi-server environment within IoT introduces a flexible security service model, enabling users to interact with any server through a single registration. To ensure secure and privacy preservation services for resources, an authentication scheme is essential. Zhao et al. recently introduced a user authentication scheme for the multi-server environment, utilizing passwords and smart cards, claiming resilience against well-known attacks. This paper conducts cryptanalysis on Zhao et al.'s scheme, focusing on denial of service and privacy attacks, revealing a lack of user-friendliness. Subsequently, we propose a new multi-server user authentication scheme for privacy preservation with fuzzy commitment over the IoT environment, addressing the shortcomings of Zhao et al.'s scheme. Formal security verification of the proposed scheme is conducted using the ProVerif simulation tool. Through both formal and informal security analyses, we demonstrate that the proposed scheme is resilient against various known attacks and those identified in Zhao et al.'s scheme.
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
In -Vehicle Ad-Hoc Network (VANET), vehicles continuously transmit and receive spatiotemporal data with neighboring vehicles, thereby establishing a comprehensive 360-degree traffic awareness system. Vehicular Network safety applications facilitate the transmission of messages between vehicles that are near each other, at regular intervals, enhancing drivers' contextual understanding of the driving environment and significantly improving traffic safety. Privacy schemes in VANETs are vital to safeguard vehicles’ identities and their associated owners or drivers. Privacy schemes prevent unauthorized parties from linking the vehicle's communications to a specific real-world identity by employing techniques such as pseudonyms, randomization, or cryptographic protocols. Nevertheless, these communications frequently contain important vehicle information that malevolent groups could use to Monitor the vehicle over a long period. The acquisition of this shared data has the potential to facilitate the reconstruction of vehicle trajectories, thereby posing a potential risk to the privacy of the driver. Addressing the critical challenge of developing effective and scalable privacy-preserving protocols for communication in vehicle networks is of the highest priority. These protocols aim to reduce the transmission of confidential data while ensuring the required level of communication. This paper aims to propose an Advanced Privacy Vehicle Scheme (APV) that periodically changes pseudonyms to protect vehicle identities and improve privacy. The APV scheme utilizes a concept called the silent period, which involves changing the pseudonym of a vehicle periodically based on the tracking of neighboring vehicles. The pseudonym is a temporary identifier that vehicles use to communicate with each other in a VANET. By changing the pseudonym regularly, the APV scheme makes it difficult for unauthorized entities to link a vehicle's communications to its real-world identity. The proposed APV is compared to the SLOW, RSP, CAPS, and CPN techniques. The data indicates that the efficiency of APV is a better improvement in privacy metrics. It is evident that the AVP offers enhanced safety for vehicles during transportation in the smart city.
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
Malware is one of the threats to security of computer networks and information systems. Since malware instances are available sufficiently, there is increased interest among researchers on usage of Artificial Intelligence (AI). Of late AI-enabled methods such as machine learning (ML) and deep learning paved way for solving many real-world problems. As it is a learning-based approach, accumulated training samples help in improving thequality of training and thus leveraging malware detection accuracy. Existing deep learning methods are focusing on learning-based malware detection systems. However, there is need for improving the state of the art through ensemble approach. Towards this end, in this paper we proposed a framework known as Deep Ensemble Framework (DEF) for automatic malware detection. The framework obtains features from training samples. From given malware instance a grayscale image is generated. There is another process to extract the opcode sequences. Convolutional Neural Network (CNN) and Long Short Term Memory (LSTM) techniques are used to obtain grayscale image and opcode sequence respectively. Afterwards, a stacking ensemble is employed in order to achieve efficient malware detection and classification. Malware samples collected fromthe Internet sources and Microsoft are used for theempirical study. An algorithm known as Ensemble Learning for Automatic Malware Detection (EL-AML) is proposed to realize our framework. Another algorithm named Pre-Process is proposed to assist the EL-AML algorithm for obtaining intermediate features required by CNN and LSTM.Empirical study reveals that our framework outperforms many existing methods in terms of speed-up and accuracy.
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficIJCNCJournal
With the emergence of smart devices and the Internet of Things (IoT), millions of users connected to the network produce massive network traffic datasets. These vast datasets of network traffic, Big Data are challenging to store, deal with and analyse using a single computer. In this paper we developed parallel implementation using a High Performance Computer (HPC) for the Non-Negative Matrix Factorization technique as an engine for an Intrusion Detection System (HPC-NMF-IDS). The large IoT traffic datasets of order of millions samples are distributed evenly on all the computing cores for both storage and speedup purpose. The distribution of computing tasks involved in the Matrix Factorization takes into account the reduction of the communication cost between the computing cores. The experiments we conducted on the proposed HPC-IDS-NMF give better results than the traditional ML-based intrusion detection systems. We could train the HPC model with datasets of one million samples in only 31 seconds instead of the 40 minutes using one processor), that is a speed up of 87 times. Moreover, we have got an excellent detection accuracy rate of 98% for KDD dataset.
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
Cyber intrusion attacks increasingly target the Internet of Things (IoT) ecosystem, exploiting vulnerable devices and networks. Malicious activities must be identified early to minimize damage and mitigate threats. Using actual benign and attack traffic from the CICIoT2023 dataset, this WORK aims to evaluate and benchmark machine-learning techniques for IoT intrusion detection. There are four main phases to the system. First, the CICIoT2023 dataset is refined to remove irrelevant features and clean up missing and duplicate data. The second phase employs statistical models and artificial intelligence to discover novel features. The most significant features are then selected in the third phase based on cooperative game theory. Using the original CICIoT2023 dataset and a dataset containing only novel features, we train and evaluate a variety of machine learning classifiers. On the original dataset, Random Forest achieved the highest accuracy of 99%. Still, with novel features, Random Forest's performance dropped only slightly (96%) while other models achieved significantly lower accuracy. As a whole, the work contributes substantial contributions to tailored feature engineering, feature selection, and rigorous benchmarking of IoT intrusion detection techniques. IoT networks and devices face continuously evolving threats, making it necessary to develop robust intrusion detection systems.
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
IoT networking uses real items as stationary or mobile nodes. Mobile nodes complicate networking. Internet of Things (IoT) networks have a lot of control overhead messages because devices are mobile. These signals are generated by the constant flow of control data as such device identity, geographical positioning, node mobility, device configuration, and others. Network clustering is a popular overhead communication management method. Many cluster-based routing methods have been developed to address system restrictions. Node clustering based on the Internet of Things (IoT) protocol, may be used to cluster all network nodes according to predefined criteria. Each cluster will have a Smart Designated Node. SDN cluster management is efficient. Many intelligent nodes remain in the network. The network design spreads these signals. This paper presents an intelligent and responsive routing approach for clustered nodes in IoT networks. An existing method builds a new sub-area clustered topology. The Nodes Clustering Based on the Internet of Things (NCIoT) method improves message transmission between any two nodes. This will facilitate the secure and reliable interchange of healthcare data between professionals and patients. NCIoT is a system that organizes nodes in the Internet of Things (IoT) by grouping them together based on their proximity. It also picks SDN routes for these nodes. This approach involves selecting one option from a range of choices and preparing for likely outcomes problem addressing limitations on activities is a primary focus during the review process. Predictive inquiry employs the process of analyzing data to forecast and anticipate future events. This document provides an explanation of compact units. The Predictive Inquiry Small Packets (PISP) improved its backup system and partnered with SDN to establish a routing information table for each intelligent node, resulting in higher routing performance. Both principal and secondary roads are available for use. The simulation findings indicate that NCIoT algorithms outperform CBR protocols. Enhancements lead to a substantial 78% boost in network performance. In addition, the end-to-end latency dropped by 12.5%. The PISP methodology produces 5.9% more inquiry packets compared to alternative approaches. The algorithms are constructed and evaluated against academic ones.
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
Cyber intrusion attacks increasingly target the Internet of Things (IoT) ecosystem, exploiting vulnerable devices and networks. Malicious activities must be identified early to minimize damage and mitigate threats. Using actual benign and attack traffic from the CICIoT2023 dataset, this WORK aims to evaluate and benchmark machine-learning techniques for IoT intrusion detection. There are four main phases to the system. First, the CICIoT2023 dataset is refined to remove irrelevant features and clean up missing and duplicate data. The second phase employs statistical models and artificial intelligence to discover novel features. The most significant features are then selected in the third phase based on cooperative game theory. Using the original CICIoT2023 dataset and a dataset containing only novel features, we train and evaluate a variety of machine learning classifiers. On the original dataset, Random Forest achieved the highest accuracy of 99%. Still, with novel features, Random Forest's performance dropped only slightly (96%) while other models achieved significantly lower accuracy. As a whole, the work contributes substantial contributions to tailored feature engineering, feature selection, and rigorous benchmarking of IoT intrusion detection techniques. IoT networks and devices face continuously evolving threats, making it necessary to develop robust intrusion detection systems.
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...IJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
IoT networking uses real items as stationary or mobile nodes. Mobile nodes complicate networking. Internet of Things (IoT) networks have a lot of control overhead messages because devices are mobile. These signals are generated by the constant flow of control data as such device identity, geographical positioning, node mobility, device configuration, and others. Network clustering is a popular overhead communication management method. Many cluster-based routing methods have been developed to address system restrictions. Node clustering based on the Internet of Things (IoT) protocol, may be used to cluster all network nodes according to predefined criteria. Each cluster will have a Smart Designated Node. SDN cluster management is efficient. Many intelligent nodes remain in the network. The network design spreads these signals. This paper presents an intelligent and responsive routing approach for clustered nodes in IoT networks. An existing method builds a new sub-area clustered topology. The Nodes Clustering Based on the Internet of Things (NCIoT) method improves message transmission between any two nodes. This will facilitate the secure and reliable interchange of healthcare data between professionals and patients. NCIoT is a system that organizes nodes in the Internet of Things (IoT) by grouping them together based on their proximity. It also picks SDN routes for these nodes. This approach involves selecting one option from a range of choices and preparing for likely outcomes problem addressing limitations on activities is a primary focus during the review process. Predictive inquiry employs the process of analyzing data to forecast and anticipate future events. This document provides an explanation of compact units. The Predictive Inquiry Small Packets (PISP) improved its backup system and partnered with SDN to establish a routing information table for each intelligent node, resulting in higher routing performance. Both principal and secondary roads are available for use. The simulation findings indicate that NCIoT algorithms outperform CBR protocols. Enhancements lead to a substantial 78% boost in network performance. In addition, the end-to-end latency dropped by 12.5%. The PISP methodology produces 5.9% more inquiry packets compared to alternative approaches. The algorithms are constructed and evaluated against academic ones.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Accelerate your Kubernetes clusters with Varnish Caching
PERFORMANCE EVALUATION OF MOBILE WIMAX IEEE 802.16E FOR HARD HANDOVER
1. International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.5, September 2016
DOI: 10.5121/ijcnc.2016.8501 1
PERFORMANCE EVALUATION OF MOBILE
WIMAX IEEE 802.16E FOR HARD HANDOVER
Amira Youssef Fahoud and D.K. Lobiyal
School of Computer & Systems Sciences, Jawaharlal Nehru University, New Delhi, India
ABSTRACT
Seamless handover in wireless networks is to guarantee both service continuity and service quality. In
WiMAX, providing scalability and quality of service for multimedia services during handover is a main
challenge because of high latency and packet loss. In this paper, we created four scenarios using Qualnet
5.2 Network Simulator to analyze the hard handover functionality of WiMAX under different conditions.
The scenarios such as Flag with 5 and 10 sec UCD and DCD interval values, Random mobility scenario
and DEM scenario using 6 WiMAX Cells have been considered. This study is performed over the real
urban area of JNU where we have used JNU map for scenarios 1, 2 and 3 but for scenario 4, the JNU
terrain data has been used. Further, each BS of 6 WiMAX cell is connected to four nodes. All nodes of each
scenario are fixed except Node 1. Node 1 is moving and performing the handover between the different BSs
while sending and receiving real time traffics. Flag mobility model is used in Scenario 1, 2 and 4 to model
the movement of the Node 1 while we use random mobility model in sceanrio3. 5 seconds time interval is
used for Scenarios 1, 3, and 4 while 10 seconds time interval is used for scenario 2 to study the effect of
management messages load on handover. Further, the statistical measures of handover performance of
WiMAX in terms of number of handover performed, throughput, end-to-end delay, jitter, and packets
dropped are observed and evaluated.
KEYWORDS
Wireless Broadband; WiMAX; Performance Evaluation; Qualnet; Handover
1. INTRODUCTION
Worldwide Interoperability for Microwave Access (WiMAX) brings broadband experience into
wireless context [1]. It is an emerged industry based standard technology to provide a cost
effective alternative solutions to the high cost wired broadband technologies available nowadays
like DSL, T1/E1, and cable modems [2]. WiMAX is based on IEEE802.8 family of standards for
providing wireless broadband connectivity over a metropolitan sized network and in two possible
developments [3]. They are fixed WiMAX which is based on IEEE802.16d 2004 and Mobile
WiMAX that is based on IEEE802.16e 2005 [4]. Broadband provides end users with certain
benefits for traditional services and new multimedia services as well. Broadband systems must
provide these benefits with a robust QoS in terms of throughput, jitter, End-to-End delay and
packet error rate [2]. Mobility on the other hand is the most advantage provided by Mobile
WiMAX to end users [5], but it brings main challenges like the need to address two important
issues for supporting mobility; they are roaming and handover as well [6]. Roaming and Handoff
are what we mobility management should take care of [7]. It should find means for supporting
roaming and making seamless handover as well. As for a seamless handover, how to maintain on-
going sessions without it being interrupted while on the move even with a vehicular speed is a
2. International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.5, September 2016
2
serious challenge [8]. This serious challenge rises on how and when to make the transition
process [9]. Algorithms which are responsible for taking the decision on when to make the
handover needs to assure the balance between handoff rate and the dropping probability [10]. So,
serving multimedia applications while on move and with a certain levels of QoS is more
challenging because of the time variability and channel unpredictability and the situation became
more critical when doing the handoff from one cell to another [10]. Handover in WiMAX is
classified into three types; they are hard handover (HHO), Macro Diversity Handover (MDHO)
and Fast Base Station Switching (FBSS) [10]. Hard handover is mandatory in WiMAX systems.
The other two types of handover are optional [10]. During hard handover, the MS communicates
with only just one BS each time. Connection with the old BS is broken before the new connection
is established with the new serving base station. In this paper we do a performance evaluation of
the basic handover of WiMAX in multi-cell environment with high mobility for Real Time
Traffic [11]. The contribution of this paper is to evaluate the performance of hard handover
functionality of WiMAX under different conditions and in terms of number of handover
performed, throughput, end-to-end delay, jitter, and packets dropped for real time applications.
The rest of this paper is organized as follow: section 2 defined the hard handover in WiMAX;
section 3 outlines some of the related work done in this area of research. The detailed simulation
setup has been described in section 4, whereas section 5 explains the results analysis. Finally this
study is summarized in section 6.
2. HARD HANDOVER
The default handover in mobile WiMAX (IEEE 802.16e) is hard handover and the entire process
of HHO is divided into two phases [10]. They are Network Topology Acquisition Phase (NTAP)
and the Actual Handover phase (AHOP) [10, 12]. The procedures of handover consists of cell
reselection through scanning, then taking the decision and initiation of handover, Finally network
entry including the synchronization and ranging with the target base station [11]. The hard
handover is depicted in the Figure.1. Selection is done by the MS and its serving base station with
the help of network backbone. They will collect the information about network topology and
Neighbour base stations. They identify the list of potential base stations around that could enter
the process oh handover later. Out of this list one base station will be chosen to be target base
station. The messages included in this phase are listed in the Table. 1[13, 12]
Figure 1: Hard Handover
3. International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.5, September 2016
3
Table 1. Handover Messages Description.
Message Description
MOB- NBR-ADV Mobile Neighbour Advertisement)
message, BS broadcasts information
about the state of the network base
stations periodically.
MOB -SCN-REQ Scanning request from MS
MOB -SCN-RSP Scanning response from BS
MOB- SCN-REP Scanning result Report
RNG- REQ Ranging Request from MS
RNG –RSP Ranging Response from BS
MOB ASC-REP Association Result Reports
MOB MSHO-REQ From the MS to the Serving Base station
listing the target base stations. This
message will be sent in case the decision
of handover is made by the MS
MOB BSHO-RSP BS reply back for the MOB MSHO-REQ
message.
MOB BSHO-REQ From the BS to the Serving Base station
listing the target base stations. This
message will be sent in case the decision
of handover is made by the BS
3. RELATED WORK
Handover is an important issue to be tackled when providing Multimedia applications over
wireless broadband networks. How to make the handover between WiMAX BSs was studied in
[10] to ensure providing seamless handover for multimedia applications, S. K. Ray et al.
presented the issues related to handover along with suggesting different solutions to face these
issues and challenges. In [14] Pero et al. discussed the effect of handover on the performance of
Mobile, WiMAX. They concluded that handover latency and dropping rate have a significant
influence over the performance. In [15] Zina et al. in their paper studied handover issues and its
effect on multimedia traffic, while presenting a MAC layer solution for optimizing handover for
video applications in WiMAX. Their solution reduced the scanning time pre handover through
the process of eliminating the number of scanned BSs according to different parameters like
required bandwidth support. In [16] Po-wen Chi et al. proposed a fast and controlled handover
scheme to decrease handover procedure and according to the results presented in the work the
proposed scheme outperforms the default one. G. Khishigjargal et al. in their paper [17] defined
the procedures of MBS handover. They evaluate the performance of WiMAX under conditions
related to MBS handover for mobile IPTV in Qualnet simulator. Performance metrics are
handover latency and data loss.
4. International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.5, September 2016
4
4. SIMULATION SETUP
We created Four WiMAX scenarios using Qualnet 5.2 Network Simulator to test the basic
handover functionality of IEEE 802.16e in multi_cell environment and, high mobility for real
time applications. The created scenarios are composed of six subnets; each has 4 nodes connected
with a BS. Nodes 4, 5, 10, 13, 17, and 21 in each scenario are the BSs of these six subnets, as it is
shown in the Table 2
Table 2: Subnets
Subnet Nodes attached Base Station
192.0.6.0 (1 to 4) 4
192.0.7.0 (5 to 8) 5
192.0.8.0 (9 to 12) 10
192.0.9.0 (13 to 16) 13
192.0.10.0 (17 to 20) 17
192.0.11.0 (21 to 24) 21
All the BSs connect to node 25 (ASN-Gateway) via wired point-to-point links. Each subnet
operates with different radio frequency. Node 1 is under the study. This node transmits and
receives real time traffic while it is moving across the six cells. We use two models for modelling
Node 1 mobility. The models are flag mobility model and Random mobility model. in Flag Node
1 moves from left to right, then from right to left. It is originally close to BS node 4. So it
registers with BS node 4. When it moves to right, it will perform handover to BS node 5, then
handover to BS node 10, then handover to BS node 21,then handover to BS node 17, then
handover to BS node 13, and finally handover to original BS node 4. While, in Random Mobility
model it moves with minimum speed of 0 Mps and maximum speed of 20kmps in random and
straight lines. Time for pause is 10 seconds. These two mobility models are considered when we
are dealing with Cartesian coordinate system but only flag mobility model is considered when we
are dealing with latitude-Longitude coordinate system. Two values are considered for UCD
(uplink channel descriptor) and DCD (downlink channel descriptor) management messages time
interval, 5 and 10 with flag mobility model. These channel descriptors indicate modulation-code
rate information of bursts for uplink and downlink respectively. 6 CBR flow are running to model
the real time traffic in each Scenario as follow:
• CBR 1 3 2000 1024 1S 10S 0S PRECEDENCE 3 (rtPS)
• CBR 1 7 2000 1024 1S 10S 0S PRECEDENCE 3 (rtPS)
• CBR 1 14 2000 1024 1S 10S 0S PRECEDENCE 3 (rtPS)
• CBR 18 1 2000 1024 1S 10S 0S PRECEDENCE 3 (rtPS)
• CBR 9 1 2000 1024 1S 10S 0S PRECEDENCE 3 (rtPS)
• CBR 22 1 2000 1024 1S 10S 0S PRECEDENCE 3 (rtPS)
So Node 1 is sending 3 CBR flows and Receive 3CBR Flows while it moves and performs
handovers. Totally six handovers should be performed. The general Simulation parameters are
listed in the Table.3:
5. International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.5, September 2016
5
Table 3: General Simulation parameters
Parameters Values
Length of simulation 4 mintues
Mobility Models Flag mobility (File based Mobility) used for
node 1
Frequency Band (GHZ) 2.4 GHz
Channel Bandwidth (MHZ) 20
Frame Duration (ms) 20
FFT Size 2048
BS Transmitted Power (dbm) 20
SS Transmitted Power (dbm) 20
Simulation Time (s) 240 seconds(4 M)
Traffic CBR
Antenna Type Omni-directional
Radio Type 802.16e
Packet size 1024
Base Station Antenna Height 32 m
MS Antenna Height 1.5 m
Neighbour BS Scanning RSS Trigger -76
Handover RSS Trigger(dBm) -78
Handover RSS Margin(dB) 3
Cyclic Prefix Factor 8
MAC frame Duration 20 milli-second
TDD Downlink Duration 10 milli-secod
DCD Broadcast Interval 5 seconds
UCD Broadcast Interval 5 seconds
Ranging Minimal Backoff Value 3 seconds
Ranging Maximal Backoff Value 15
Service Flow Timeout Interval 15 seconds
Transmit/Receive Transition Gap(TTG) 10 micro second
Receive/Transmit Transition Gap( RTG) 10 micro second
SS Transition Gap(SSTG) 4 micro second
Maximum Allowed Uplink Load Level 0.7
Maximum Allowed Downlink Load Level 0.7
Bandwidth Request Minimal Backoff Value 3
Bandwidth Request Maximal Backoff Value 15
No of Packets sent for each application 50,100,1000,10000
UCD and DCD time intervals 5,10
5. NETWORK MODEL
5.1. Scenario 1: is shown in Figure.2 we have placed six BS over 2000 x 3000 area considered
to be the area of JNU, Jawaharlal Nehru University. Node 1 is moving according to flag mobility
model. The scenario specific parameters are listed in the Table.4. Results of scenario 1 is
compared with results of scenarios 2, 3, 4 for studying the effect of load of management
messages, Mobility model, terrain on the number of performed handover, respectively.
6. International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.5, September 2016
6
Figure 2: Scenario 1
Table 4: scenario 1 parameters
Parameter Values
Coordinate system CARTESIAN
Coordinate Dimension 2000*3000
Terrain-Data-Type Cartesian terrain data type
Mobility Model Flag Mobility Model
UCD and DCD time interval 5
5.2. Scenario 2: is shown in Figure.3 we have placed six BS over 2000 x 3000 area considered
to be the area of JNU, Jawaharlal Nehru University. Node 1 is moving according to Flag mobility
model. The scenario specific parameters are listed in the Table 5.
Figure 3: Scenario 2
7. International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.5, September 2016
7
Table 5: scenario 2 Parameters
Parameter Values
Coordinate system CARTESIAN
Coordinate Dimension 2000*3000
Terrain-Data-Type Cartesian terrain data type
Mobility Model Flag Mobility Model
UCD and DCD time interval 10
5.3. Scenario 3: is shown in Figure.4 we have placed six BS over 2000 x 3000 area considered
to be the area of JNU, Jawaharlal Nehru University, as the first Scenario but here Node 1 is
moving according to the Random Mobility Models. The specific scenario parameters is listed in
Table.6
Figure 4: Scenario 3
Table 6: scenario 3 Parameters
Parameter Values
Coordinate system CARTESIAN
Coordinate Dimension 2000*3000
Terrain-Data-Type Cartesian terrain data type
Mobility Model Random Mobility Model
UCD and DCD time interval 5
8. International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.5, September 2016
8
5.4. Scenario 4: is shown in Figure.5 we have placed six BS over the area of JNU. Using JNU
DEM data for terrain. The specific scenario parameters are listed in the Table 7
Figure 5: Scenario 4
Table 7: scenario 4 Parameters
Parameter Values
Coordinate system LATLONALT
Terrain-south-west-corner (28.5251, 77.1526)
Terrain-North-East-corner (28.5536, 77.1796)
Terrain-Data-Format USGS DEM (Digital
Elevation Model data type
produced by USGS. It is 1
degree file with elevation
points in a grid at
approximately 100 meters
spacing)
Number of DEM Files 1
DEM Terrain File Jnu-DEM.dem
Urban-Terrain-Format None
UCD and DCD time interval 5 seconds
Mobility Model Flag Mobility Model
9. International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.5, September 2016
9
6. RESULTS AND DISCUSSION
We discuss simulation results, number of handover performed; throughput, end-to-end
delay, and jitters as follow.
6.1. Number of Handover
Total number of successful handovers occurred during the simulation time =
NHO_success
Total number of failed handover during the simulation time = NHO_fail
Total number of handover attempts during the simulation time = Nattempt , where
Nattempt = NHO_success +NHO_fail
Table 8: Scenario 1- Cartesian-Flag Mobility Model-UCD and DCD-5
Scenario 1: Cartesian-Flag Mobility Model-UCD and DCD-5
No. of
Packets
100 500 1000 1500 2000 2500 30
00
NHO_success 3 5 5 5 5 5 5
NHO_fail 1 1 1 1 1 1 1
Nattempt 6 6 6 6 6 6 6
Table 9: Scenario 2 - Cartesian-Flag Mobility Model-UCD and DCD-10
Scenario 2 : Cartesian-Flag Mobility Model-UCD and DCD-10
No. of
Packets
100 500 1000 1500 2000 2500 30
00
NHO_success 3 5 5 5 5 5 5
NHO_fail 1 1 1 1 1 1 2
Nattempt 6 6 6 6 6 6 6
Table 10: Scenario 3- Cartesian-Random Mobility Model-UCD and DCD-5
Scenario 3: Cartesian-Random Mobility Model-UCD and DCD-5
No. of
Packets
100 500 1000 1500 2000 2500 3000
NHO_success 3 3 3 3 3 3 3
NHO_fail 3 3 3 3 3 3 3
Nattempt 6 6 6 6 6 6
10. International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.5, September 2016
10
Table 11: Scenario 4-DEM-Flag Mobility Model-UCD and DCD-5
Scenario 4: DEM-Flag Mobility Model-UCD and DCD-5
No. of
Packets
100 500 1000 1500 2000 2500 3000
NHO_success 2 2 3 3 3 3 3
NHO_fail 4 4 4 3 3 3 3
Nattempt 6 6 6 6 6 6 6
In the first two scenarios (Table.8, Table.9) changing the interval time of receiving UCD and
DCD is not affecting the number of handover performed. We start by sending 100 packets for
each running application; we keep Node 1 busy in transmission and receiving till the end of
simulation by changing the interval time between the generated packets. Since the interval for 100
is long, the node will have longer time of pausing before retransmitting, therefore the number of
handover is less. By increasing the number of packets into 500 the number of handover
performed is increased in the first two cases and remains constant while increasing the number of
packets in the multiple of 500, i.e. 1000, 1500, 2000, 2500, and 3000. In case of Scenario
3(Table.10), where the random mobility model is used, the number of handover performed is
fixed for the varying number of sent Packets. It is due to the random movement of Node 1 and the
position of node from the base station is affecting the possibility of executing handover. In
scenario 4(Table.11), the number of handover is same for the first two cases where the number of
packets sent was 100 and 500, and then it increased with increasing the number of packets sent
and remained constant.
6.2. Throughput
Throughput refers to the rate of information arriving at or passing a particular point in the
network. It is the total amount of data at that point divided by the time it takes to get the last
packet. It is measured in bits per second [8] (bit/s or bps).
Throughput = (total bytes received * 8) / (time last packet received - time first packet received)
Figure 6: Throughput
11. International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.5, September 2016
11
In case of Scenario 1 and 2 where the used value for UCD and DCD intervals are 5 and 10
seconds, the number of performed handover is same in varying number of packet sent shown in
tables 7 and 8. The only difference in both the scenarios was in throughput where throughput of
scenario1 is higher than throughput of scenario 2, due to the number of packets dropped in 10sec
is more compared to 5sec depicted in Figure 6.
The throughput for scenario-3 where random mobility model is used to model the movement of
Node1, is less than throughput in Scenario 1 with flag mobility model, shown in figure 6, because
the node 1 in Scenario-3 is getting away from the base stations and failing to make handover ,
therefore the larger number of packets are dropped.
In case of Scenario-4 where DEM data is considered, its throughput is higher than the throughput
in Scenario 1 where the elevation of node is not taking into consideration.
6.3. Average Unicast Jitter
Jitter can seriously affect the quality of services. “It is the variation in delay of different data
packets that reach the destination. For varying number of packets the jitter is more when the
number of packet sent is less. From the Figure.7 the value of jitter in all scenarios is very high
when 100 packets are sent, then it goes down when 500 packets are sent, and it becomes almost
constant with increasing the number of packets, i.e. 1000, 1500, 2000, 2500, and 3000. In case of
sending 100 and 500 packets the interval between the packets sent is large which causes the
interval between the variations in delay of the received packets to be larger than the other cases of
number of packets sent where the interval between packets sent is smaller.
In scenario-1 the jitter in case of 100 packets is less than jitter in Scenarios 2, 3 and 4 then it goes
higher than scenario 2 and 3 in case of 500 packets sent, but for 1000 packets, jitter becomes less
than both scenarios 2, and 3. Then it remains constant for varying number of packets.
Figure 7: Jitter
12. International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.5, September 2016
12
Jitter in scenario 2 is higher than jitter in scenario 1 only for 100 packets, and then it goes down
for the varying number of packets.
In scenario-3 the number of handover performed is not changing at all along with changing the
number of packets sent, but the jitter is higher in case of 100 and 500 packets sent. Whereas,
scenario-4, has always higher jitter compare to the other scenarios, because of the variation in the
terrain and then the variation in the delay of received data. Similar to other scenarios, scenario 4
also remains constant for the varying number of packets after 500 packets sent.
6.4. End-To-End Delay
End-to-end delay indicates how long or how much time units it takes for a packet to travel from
the source to the destination. “It is the average data delay an application experiences while
transmitting data given by [8].
The average end-to-end delay is calculated as follows:
Delay= (Total of packet delays for all packets) / (Total packets received)
Packet delay = (time when packet is received at the server - time when the packet is
transmitted at the client)
Figure 8: End-to-End Delay
Initially end-to-end delay (Figure.8) of scenario 1 is low compare to other scenarios in 100
number of packets sent, but it goes very high when the number of packets increase to 500. Later it
fluctuates for the remaining varying number of packets, therefore, there is no pattern performed
by scenario 1. Similarly in the case of scenario 2, 3 and 4, end-to-end delay fluctuate with the
varying number of packets, thus it is difficult to conclude the significance of mobility mode, UCD
and DCD interval values and terrain on the network performance in terms of delay. In all
scenarios the values of delay is higher to support rtPS data.
13. International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.5, September 2016
13
6.5. Packet Dropped
Packet loss is another important performance metric for handover, in scenario-1, the packets
dropped is less than the other scenarios in all the cases, whereas, scenario 3 has the highest
packets dropped (Figure.9).
Figure 9: Packets Dropped
Scearnio-3 is the only scenario, whose number of packets dropped increased with the varying
number of packets till 1500, after that it fluctuate. The number of dropped packets in scenarios 1,
2 and 4 is increasing with the varying number of packets.
7. CONCLUSIONS
In this study, the real urban area that is our university, JNU is considered for the WiMAX
handover performance. Four scenarios such as Flag with 5 and 10 sec UCD and DCD interval
values, Random mobility scenario and DEM scenario have been created using Qualnet Simulator.
Further, the statistical measures of handover performance of WiMAX in terms of number of
handover performed, throughput, end-to-end delay, jitter, and packets dropped are observed and
evaluated. The obtained results indicate that the performance of handover in terms of number of
handover performed and packets dropped is affected by the load of management messages,
mobility model of the moving nodes and the variation of terrain data. Depending on this analysis
we see that handover is affected by the mobility pattern and terrain variation more the load of
management messages. The delay, jitter and packets dropped are high to support real-time
application.
REFERENCES
[1] Rao, GSV Radha K., and G. Radhamani. WiMAX: a wireless technology revolution. CRC Press,
2007.
[2] Andrews, Jeffrey G., Arunabha Ghosh, and Rias Muhamed. Fundamentals of WiMAX: understanding
broadband wireless networking. Pearson Education, 2007.
14. International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.5, September 2016
14
[3] Etemad, Kamran. "Overview of mobile WiMAX technology and evolution." IEEE Communications
Magazine 46.10 (2008): 31-40.
[4] Eklund, Carl, et al. "IEEE standard 802.16: a technical overview of the WirelessMAN™ air interface
for broadband wireless access." IEEE communications magazine 40.6 (2002): 98-107.
[5] Ahmadi, Sassan. "An overview of next-generation mobile WiMAX technology." IEEE
Communications.
[6] Li, Bo, et al. "A survey on mobile WiMAX [wireless broadband access]."IEEE Communications
magazine 45.12 (2007): 70-75.
[7] WiMAX-Part, Mobile. "I: A technical overview and performance evaluation."WiMAX Forum (2006):
9-24
[8] Jain, Raj. "WiMAX system evaluation methodology v2. 1." WiMAX Forum. 2008.
[9] Jiao, Wenhua, Pin Jiang, and Yuanyuan Ma. "Fast handover scheme for real-time applications in
mobile WiMAX." 2007 IEEE International Conference on Communications. IEEE, 2007: 6038-6042
[10] Ray, Sayan Kumar, Krzysztof Pawlikowski, and Harsha Sirisena. "Handover in mobile WiMAX
networks: the state of art and research issues." IEEE Communications Surveys & Tutorials 12.3
(2010): 376-399.
[11] Ben-Mubarak, Mohammed A., et al. "Movement direction-based handover scanning for mobile
WiMAX." The 17th Asia Pacific Conference on Communications. IEEE, 2011.: 737-742
[12] Chen, Jenhui, Chih-Chieh Wang, and Jiann-Der Lee. "Pre-coordination mechanism for fast handover
in WiMAX networks." The 2nd International Conference on Wireless Broadband and Ultra Wideband
Communications (AusWireless 2007). IEEE, 2007.:15
[13] Chen, Ling, et al. "A cross-layer fast handover scheme for mobile WiMAX."2007 IEEE 66th
Vehicular Technology Conference. IEEE, 2007.: 1578-1582
[14] Latkoski, Pero, and Borislav Popovski. "Evaluation of Mobile WiMAX handover
procedure." Melecon 2010-2010 15th IEEE Mediterranean Electrotechnical Conference. IEEE( 2010):
476-481
[15] Jerjees, Zina, and Hamed Al-Raweshidy. "Handover Optimization for Video Applications in
WiMAX." 2009 Third International Conference on Next Generation Mobile Applications, Services
and Technologies. IEEE(2009): 189–196
[16] Lin, Yu-Hsiang, et al. "Fast Uncontrolled Handover scheme for WiMAX: infrastructure
networks." International Journal of Autonomous and Adaptive Communications Systems 4.3 (2011):
237-251.
[17] Gonchigsumlaa, Khishigjargal, Young-il Kim, and Enkhzul Doopalam. "Performance analysis of
MBS handover for mobile WiMAX." Advanced Communication Technology (ICACT), 2012 14th
International Conference on. IEEE, 2012.29-32
AUTHORS
Amira is pursuing Ph.D in Computer Science and Technology from School of
Computer and Systems Sciences, Jawaharlal Nehru University (JNU), New Delhi,
India. She pursued her M.Tech (Computer Science and Technology) from JNU, in
2011, Information Engineering from Tishreen University, Lattakia, Syria in 2007 .Her
area of interest includes Computer Networks, Wireless Networks, and broadband
Networks.
Daya K. Lobiyal received his Ph.D. and M.Tech. (Computer science) from School of
Computer and Systems Sciences, Jawaharlal Nehru University, New Delhi, India in
1996 and 1991, respectively. B.Tech. (Computer Science and Engineering) was
pursued from Lucknow University, India, 1988. Presently, he is an Associate Professor
in the School of Computer and Systems Sciences, Jawaharlal Nehru University, New
Delhi, India. His research interest includes Mobile Ad hoc Networks, Vehicular Ad
Hoc Networks, Wireless Sensor Network, Video on Demand and Natural Language
Processing