By virtue of their robustness, cost-effectiveness, self-organizing and self-configuring nature, WMNs have emerged as a new network paradigm for a wide range of applications, such as public safety and emergency response communications, intelligent transportation systems, and community networks. It is anticipated that WMNs will not only resolve the limitations of wireless ad hoc networks, local area networks (WLANs), personal area networks (WPANs), and metropolitan area networks (WMANs) but also significantly improve such networks’ performance. One fundamental problem of WMNs with a limited number of radio interfaces and orthogonal channels is that the performance degrades significantly as the network size grows. This results from increased interference between nodes and diminished spatial reuse over the network. In this paper, it is proposed to evaluate the performance of two different channel assignment schemes namely common channel assignment (CCA) and centralized tabu-based search algorithm under WCETT routing protocols for varying traffic load in terms of packet delivery ratio, throughput, average end to end delay and routing overhead using NS2 network simulator. WCETT protocol uses the weighted sum of the cumulative expected transmission time and the maximal value of efficient channels among all channels.
EFFICIENT REAL-TIME VIDEO TRANSMISSION IN WIRELESS MESH NETWORK IJORCS
This document summarizes a research paper on efficient real-time video transmission in wireless mesh networks. It begins with an introduction to wireless mesh networks and their benefits. It then discusses some key challenges for real-time video transmission, including unpredictable delays, packet loss, and delay jitter due to the error-prone nature of wireless links. The paper proposes a model to provide high-capacity data transfer with reduced delay for real-time video. It simulates this model using OPNET and achieves higher throughput results. Node models for the video server, receiver, access point, and FTP client/server are also described.
Worldwide Interoperability for Microwave Access (WiMAX) is a new communication technology that
conduits the fissure between fixed and mobile access and offers the same Quality of Service (QoS) to both
types of users. Generally, WiMAX is more vulnerable to the inside and outside attacks due to the absence of
any clear line of defense. The Mobile Subscriber Stations (MSSs) selected to transfer the packets to the
Base Station (BS) are vulnerable to Denial of Service (DoS) attacks like flooding. Recent research has
discovered that DoS attacks can easily be launched by injecting malevolent management frames into the
WiMAX network based on the Privacy and Key Management- ReSPonse (PKM-RSP) and Automatic Repeat
ReQuest (ARQ)-Reset messages. In this paper, an algorithm is proposed to mitigate the flooding attacks
and enhance the security level in the network.
A survey on cost effective survivable network design in wireless access networkijcses
In today’s technology, the essential property for wireless communication network is to exhibit as a
dependable network. The dependability network incorporates the property like availability, reliability and
survivability. Although these factors are well taken care by protocol for wired network, still there exists
huge lack of efficacy for wireless network. Further, the wireless access network is more complicated with
difficulties like frequencies allocation, quality of services, user requests. Adding to it, the wireless access
network is severely vulnerable to link and node failures. Therefore, the survivability in wireless access
network is very important factor to be considered will performing wireless network designing. This paper
focuses on discussion of survivability in wireless access network. Capability of a wireless access network to
perform its dedicated accessibility services even in case of infrastructure failure is known as survivability.
Given available capacity, connectivity and reliability the survivable problem in hierarchical network is to
minimize the overall connection cost for multiple requests. The various failure scenario of wireless access
network as existing in literature is been explored. The existing survivability models for access network like
shared link, multi homing, overlay network, sonnet ring, and multimodal devices are discussed in detail
here. Further comparison between various existing survivability solutions is also tabulated.
LINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORKijwmn
Relay technology promises appreciable network throughput and coverage enhancement which is required
for high speed wireless cellular systems to function to their optimum. This paper is focused on analysing
the link performance of a relay-based WiMAX network under varying conditions. Comparison is made
between relay and direct link communication in terms of BER (Bit Error Rate), spectral efficiency and
capacity. Effect of multipath fading and user speed on performance are investigated as well. The entire
study involves a hypothetical view as well as MATLAB simulations to predict the benefit of relay
deployment. This is aimed at solving pertinent issues such as coverage holes and cell edge problems which
are associated with traditional non-relay based cellular networks.
IRJET- Reduction of Packet Data Loss in Wireless Mesh Network using Path Mech...IRJET Journal
This document summarizes a research paper that proposes a path mechanism approach to reduce packet data loss in wireless mesh networks. The paper emphasizes developing a path protocol where the minimum possible packet drop occurs. Wireless mesh networks are vulnerable to denial of service attacks that can cause packet dropping at the routing layer. Evaluating the performance of wireless mesh networks under various levels of packet dropping based on throughput and data packet loss is discussed. Developing an efficient path mechanism is proposed to minimize packet loss and improve network performance.
This document summarizes a research paper that proposes a quality of service (QoS) oriented vertical handoff scheme for interworking between wireless local area networks (WLAN) and worldwide interoperability for microwave access (WiMAX) networks.
The paper first provides background on WLAN and WiMAX network architectures. It then reviews existing vertical handoff approaches and identifies limitations such as considering too many decision parameters that increase handoff delay. The proposed scheme measures traffic and available bandwidth in both networks. It uses these metrics and a handoff policy to make handoff decisions via a handoff decision module, aiming to improve QoS in terms of throughput. Algorithms are also described to estimate available bandwidth in WLAN and Wi
Survey of Routing Scheme in MANET with Clustering TechniquesIJMER
This document provides an overview of routing schemes and clustering techniques in mobile ad hoc networks (MANETs). It discusses different routing protocols for MANETs including proactive, reactive, and hybrid protocols. Examples of proactive protocols mentioned are OLSR and DSDV, while reactive protocols include AODV and DSR. Hybrid protocols combine aspects of proactive and reactive routing, with examples being ZRP and CBRP. The document also surveys various clustering approaches for MANETs including location-based, neighbor-based, power-based, and mobility-based techniques. It analyzes the advantages and disadvantages of different routing protocols and clustering methods.
Security Enhancement in AODV Routing Protocol for MANETsidescitation
Adhoc networks are a new wireless networking paradigm for mobile hosts.
Mobile Ad-hoc Networks (MANETs) are wireless networks with absence of infrastructure
centralized support. Routing in MANETs is challenging task due to mobility of nodes.
Several routing protocols have been developed for Mobile Ad-hoc Networks. This paper
describes concept of security enhancement in AODV routing protocol by detection and
tolerance of attacks using secure message transmission (SMT) protocol. Present AODV
routing protocol is not secure by malicious nodes. One main challenge in design of these
networks is their vulnerability to security attacks. In this paper we study how to make node
malicious and at same we will detect malicious node in AODV protocol using Network
Simulator-2(NS-2) tool.
Analysis of Handoff techniques used for hybrid networks: cellular/WLAN IJORCS
Most real life networks are hybrid networks. A hybrid network combines the best features of two or more networks. In networking terminology, a hybrid network according to “Information Technology control and Audit” are reliable and versatile. They provide large numbers of connections and data transmission paths to users. These hybrid networks may be treated as network nodes for analysis purpose. The two radio access technologies (RATs) are considered with cellular/WLAN depending on whether it is voice/ data, video. For observing practical result, some setups are required in laboratory which includes interface from personal computer to mobile terminal and vice-versa. The network simulator (Ns-2) is used for analysis purpose. The results shows the parameters like energy good put, Bandwidth utilization, packet delivery ratio, energy good put and energy consumed are improved after using hybrid networks.
- Wireless ad-hoc networks are collections of wireless devices that can communicate directly with nearby devices or through intermediate devices to reach destinations further away without any centralized administration. They were first developed in the 1990s and have been widely researched.
- However, it is debated whether wireless ad-hoc networks are fundamentally flawed because they are rarely used in practice and wireless networks today typically connect to base stations or access points rather than communicating in a decentralized multi-hop fashion.
- This document will examine arguments for and against wireless ad-hoc networks being a flawed architecture, providing examples and analysis to support the position that technical limitations inherently make them unrealizable.
This document summarizes a seminar report on mobile ad hoc networks (MANETs) presented by Praveen Kumar P to fulfill degree requirements. The report discusses basics of MANETs including their characteristics such as dynamic topology and bandwidth constrained links. It also examines different types of routing protocols used in MANETs including table-driven protocols like Destination Sequenced Distance Vector routing and source-initiated on-demand protocols like AODV and DSR. Additionally, it covers vehicular ad hoc networks as a specific application of MANETs and concludes with potential applications of these self-configuring wireless networks.
A Cooperative Approach to Extend Cellular Coverage via D2D Architecture based...IJCNCJournal
The access part of all cellular network’s generation suffers from common concerns related to dead spots (zones that are not covered by the network) and hot spots (zones where the number of users is higher compared to network resources). During the last decade, lots of research proposals have tried to overcome cellular problems through multi-hop D2D architecture, which is a new paradigm allowing the direct communication between devices in cellular network to enhance network performances and improve user QoS. In this paper, we propose a multi-hop D2D architecture based on the OLSR protocol to extend cellular coverage. Cell-OLSR, which is the proposed adaptation of OLSR for our architecture, allows the exchange of cellular parameters between nodes to choose the best proxy device to forward data to the cellular base station (BS).
This document discusses integrating the internet with mobile ad-hoc networks using an extended version of the AODV routing protocol. It begins with an introduction to mobile ad-hoc networks and their applications. It then discusses challenges in routing for MANETs and existing routing protocols like AODV. It proposes extending the AODV protocol with additional "I-flag" to discover internet gateways. The extended RREQ and RREP messages are described. It then discusses using the Network Simulator 2 to simulate this extended AODV approach with different scenarios connecting wireless and wired networks via 1 or more hops. The goal is to provide internet connectivity for mobile nodes with high packet delivery and low delay.
Extricom white paper_enterprise wlan & the broadband mythExtricom
This whitepaper provides potential customers with an excellent overview of why microcell WLAN's suffer from co-channel interference in an enterprise environment, and as a result fall far short of their performance promises. The whitepaper then explains how in contrast, the Channel Blanket avoids co-channel interference and provides full performance in even the most congested enterprise environments.
The document presents an improved vertical handover decision algorithm for heterogeneous wireless networks consisting of UMTS and WLAN. The algorithm uses normalized signal strength and adaptive hysteresis margins. Simulation results show the proposed algorithm reduces handover rate and probability of outage compared to conventional algorithms. Key performance metrics like handover rate, probability of handover, and probability of outage are evaluated to demonstrate the improved performance of the adaptive vertical handover algorithm.
A PRACTICAL ROUTE RECONSTRUCTION METHOD FOR WI-FI MESH NETWORKS IN DISASTER S...ijwmn
Computer networks comprise essential infrastructure in modern society and must function even in a disaster situation. Therefore, fault-tolerant networks are being actively studied. Disaster information systems, however, suffer from two main issues: lack of their utilization in peacetime and the difficulty for a non-expert to manage them should a disaster strike. Therefore, we place special emphasis on the development of a reliable network infrastructure that can function during both normal and disaster times, using a Wi-Fi-based wireless mesh network. In a large-scale disaster situation, our goal is to identify a way to reconstruct the mesh network by adding the minimum number of spare access points (APs) to ensure the reachability of all mesh routers to the backbone network. Furthermore, we consider that only public workers without any experience with wireless communication technologies must decide upon the adequate locations for spare APs and install them. Both of simulation experiments and field trial prove the effectiveness of the proposed methods.
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
The document summarizes performance evaluation in wireless networks. It discusses how mobile ad hoc networks are self-configuring networks of wireless devices that can communicate directly or through intermediate nodes. It outlines some key characteristics of MANETs including dynamic topology, bandwidth constraints, and energy constraints. It also discusses different routing approaches for MANETs such as proactive (table-driven) and reactive (on-demand) protocols. Finally, it provides an overview of the operating principles of MANETs through an example network topology.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Wireless Mesh Networks Based on MBPSO Algorithm to Improvement Throughput IJECEIAES
1. The document discusses a study that aims to improve throughput in wireless mesh networks using a Modified Binary Particle Swarm Optimization (MBPSO) algorithm.
2. Wireless mesh networks rely on semi-static node configurations and paths that impact performance metrics like packet delivery ratio, end-to-end delay, and throughput. Previous heuristic algorithms were summarized to identify a suitable approach.
3. The study adapts an MBPSO approach to improve throughput. Results showed throughput increased by 5.79% compared to previous work.
The document discusses using a window-based smart antenna design to improve routing performance in mobile ad hoc networks (MANETs). It proposes arranging antenna elements in a window configuration to achieve a desired radiation pattern with a minimum number of elements. The design aims to address issues like resource constraints in MANET nodes and different antenna arrangement options. It analyzes how smart antennas can enhance the dynamic source routing protocol by reducing redundant broadcasts, handling route requests/replies more efficiently, and improving data packet delivery and route error messaging. However, smart antennas also increase node complexity and computational overhead.
This document summarizes an article from the International Journal of Computer Networks & Communications that focuses on energy efficiency approaches for wireless mesh networks. The article classifies existing energy saving approaches into three categories: network layer protocols, MAC layer protocols, and physical layer protocols. At the network layer, approaches like connected dominating set (CDS) and SPAN are discussed which identify certain nodes to remain active for routing while allowing others to sleep. The article provides an overview of these energy efficiency techniques across different layers of the protocol stack for wireless mesh networks.
The document discusses WiMAX technology and its use of OFDM to address bottleneck problems in high-speed networks. It describes how WiMAX uses OFDM to efficiently allocate bandwidth and share it between connecting nodes based on their data request sizes, in order to prevent data loss. It also provides background on WiMAX architecture and management, and how it can support high-speed point-to-point and point-to-multipoint connections with optimized handover and security features.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
A MANET is an autonomous group of mobile users that communicate over reasonably slow
wireless links. The network topology may vary rapidly and unpredictably over time, because the nodes
are mobile. The network is decentralized, where all network activity, including discovering the topology
and delivering messages must be executed by the nodes themselves. Hence routing functionality will
have to be incorporated into the mobile nodes. MANET is a kind of wireless ad-hoc network and it is a
self-configuring network of mobile routers (and associated hosts) connected by wireless links – the union
of which forms an arbitrary topology. Such a network may operate in a standalone fashion, or may be
connected to the larger Internet Problems in Ad Hoc Networks.
This document presents a comparative analysis of vertical handoff in IEEE 802.11 WLAN and CDMA networks. It discusses vertical handoff strategies and methods, and related work on handoff performance analysis in 802.11 networks. The paper then presents an existing vertical handoff algorithm between WLAN and CDMA networks, and defines variables used to determine handoff delay and throughput. Simulation results are shown comparing throughput and handoff delay for real-time and non-real-time services under different conditions in a network modeled based on WLAN and CDMA technologies.
This document discusses vertical handover decision algorithms for heterogeneous wireless networks. It analyzes existing vertical handover decision algorithms and proposes a new prediction-based approach. Specifically:
1. Existing algorithms do not consider mobility prediction methods to take proactive measures when deciding vertical handovers.
2. The proposed algorithm uses a Hidden Markov Model predictor to accurately estimate a user's next location based on current and historical movement data.
3. This allows the algorithm to make more informed vertical handover decisions by anticipating future movements and network conditions.
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
This document summarizes a research paper on statistical multipath signal detection in CDMA for ad hoc networks. The paper presents simulation results of transmitting a signal through 5 different Rayleigh fading channels and selecting the signal with the highest SNR. The selected signal is then transmitted over an ad hoc network using a shortest path routing algorithm. Key aspects covered include: Rayleigh fading modeling, CDMA, OFDM, theoretical and simulated BER comparisons of BPSK over Rayleigh and AWGN channels, implementation of signal transmission over 5 channels in MATLAB, and use of the highest quality signal for transmission in an ad hoc network.
A Secure QOS Distributed Routing Protocol for Hybrid Wireless Networksiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNsijsrd.com
One fundamental problem of WMNs with a limited number of radio interfaces and orthogonal channels is that the performance degrades significantly as the network size grows. This results from increased interference between nodes and diminished spatial reuse over the network. A WMN node needs to share a common channel with each of its neighbours in the communication range, requiring it to set up a virtual link. Moreover, to reduce network interference, a node should minimize the number of neighbours that it shares a common channel with. The objective of a channel assignment strategy is to ensure efficient utilization of the available channels (e.g., by minimizing interference) while maximizing connectivity in the network. However, since these two requirements are conflicting with each other, the goal is to achieve a balance between these two. The major constraints which need to be satisfied by a channel assignment scheme include fixed number of channels in the network, limited number of radios in mesh nodes, common channel between two communicating nodes, and limited channel capacity. Also, a channel assignment scheme should take the amount of traffic load supported by each mesh node into consideration.
This document discusses firewall security in computer networks. It begins by defining firewalls as hardware, software, or a combination used to prevent unauthorized access to private networks or computers. It then summarizes the differences between hardware and software firewalls. The document goes on to explain how software firewalls work by inspecting packets of data. The rest of the document discusses wireless mesh networks, including routing protocols, standards, network architecture, advantages, and disadvantages.
Analysis of Handoff techniques used for hybrid networks: cellular/WLAN IJORCS
Most real life networks are hybrid networks. A hybrid network combines the best features of two or more networks. In networking terminology, a hybrid network according to “Information Technology control and Audit” are reliable and versatile. They provide large numbers of connections and data transmission paths to users. These hybrid networks may be treated as network nodes for analysis purpose. The two radio access technologies (RATs) are considered with cellular/WLAN depending on whether it is voice/ data, video. For observing practical result, some setups are required in laboratory which includes interface from personal computer to mobile terminal and vice-versa. The network simulator (Ns-2) is used for analysis purpose. The results shows the parameters like energy good put, Bandwidth utilization, packet delivery ratio, energy good put and energy consumed are improved after using hybrid networks.
- Wireless ad-hoc networks are collections of wireless devices that can communicate directly with nearby devices or through intermediate devices to reach destinations further away without any centralized administration. They were first developed in the 1990s and have been widely researched.
- However, it is debated whether wireless ad-hoc networks are fundamentally flawed because they are rarely used in practice and wireless networks today typically connect to base stations or access points rather than communicating in a decentralized multi-hop fashion.
- This document will examine arguments for and against wireless ad-hoc networks being a flawed architecture, providing examples and analysis to support the position that technical limitations inherently make them unrealizable.
This document summarizes a seminar report on mobile ad hoc networks (MANETs) presented by Praveen Kumar P to fulfill degree requirements. The report discusses basics of MANETs including their characteristics such as dynamic topology and bandwidth constrained links. It also examines different types of routing protocols used in MANETs including table-driven protocols like Destination Sequenced Distance Vector routing and source-initiated on-demand protocols like AODV and DSR. Additionally, it covers vehicular ad hoc networks as a specific application of MANETs and concludes with potential applications of these self-configuring wireless networks.
A Cooperative Approach to Extend Cellular Coverage via D2D Architecture based...IJCNCJournal
The access part of all cellular network’s generation suffers from common concerns related to dead spots (zones that are not covered by the network) and hot spots (zones where the number of users is higher compared to network resources). During the last decade, lots of research proposals have tried to overcome cellular problems through multi-hop D2D architecture, which is a new paradigm allowing the direct communication between devices in cellular network to enhance network performances and improve user QoS. In this paper, we propose a multi-hop D2D architecture based on the OLSR protocol to extend cellular coverage. Cell-OLSR, which is the proposed adaptation of OLSR for our architecture, allows the exchange of cellular parameters between nodes to choose the best proxy device to forward data to the cellular base station (BS).
This document discusses integrating the internet with mobile ad-hoc networks using an extended version of the AODV routing protocol. It begins with an introduction to mobile ad-hoc networks and their applications. It then discusses challenges in routing for MANETs and existing routing protocols like AODV. It proposes extending the AODV protocol with additional "I-flag" to discover internet gateways. The extended RREQ and RREP messages are described. It then discusses using the Network Simulator 2 to simulate this extended AODV approach with different scenarios connecting wireless and wired networks via 1 or more hops. The goal is to provide internet connectivity for mobile nodes with high packet delivery and low delay.
Extricom white paper_enterprise wlan & the broadband mythExtricom
This whitepaper provides potential customers with an excellent overview of why microcell WLAN's suffer from co-channel interference in an enterprise environment, and as a result fall far short of their performance promises. The whitepaper then explains how in contrast, the Channel Blanket avoids co-channel interference and provides full performance in even the most congested enterprise environments.
The document presents an improved vertical handover decision algorithm for heterogeneous wireless networks consisting of UMTS and WLAN. The algorithm uses normalized signal strength and adaptive hysteresis margins. Simulation results show the proposed algorithm reduces handover rate and probability of outage compared to conventional algorithms. Key performance metrics like handover rate, probability of handover, and probability of outage are evaluated to demonstrate the improved performance of the adaptive vertical handover algorithm.
A PRACTICAL ROUTE RECONSTRUCTION METHOD FOR WI-FI MESH NETWORKS IN DISASTER S...ijwmn
Computer networks comprise essential infrastructure in modern society and must function even in a disaster situation. Therefore, fault-tolerant networks are being actively studied. Disaster information systems, however, suffer from two main issues: lack of their utilization in peacetime and the difficulty for a non-expert to manage them should a disaster strike. Therefore, we place special emphasis on the development of a reliable network infrastructure that can function during both normal and disaster times, using a Wi-Fi-based wireless mesh network. In a large-scale disaster situation, our goal is to identify a way to reconstruct the mesh network by adding the minimum number of spare access points (APs) to ensure the reachability of all mesh routers to the backbone network. Furthermore, we consider that only public workers without any experience with wireless communication technologies must decide upon the adequate locations for spare APs and install them. Both of simulation experiments and field trial prove the effectiveness of the proposed methods.
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
The document summarizes performance evaluation in wireless networks. It discusses how mobile ad hoc networks are self-configuring networks of wireless devices that can communicate directly or through intermediate nodes. It outlines some key characteristics of MANETs including dynamic topology, bandwidth constraints, and energy constraints. It also discusses different routing approaches for MANETs such as proactive (table-driven) and reactive (on-demand) protocols. Finally, it provides an overview of the operating principles of MANETs through an example network topology.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Wireless Mesh Networks Based on MBPSO Algorithm to Improvement Throughput IJECEIAES
1. The document discusses a study that aims to improve throughput in wireless mesh networks using a Modified Binary Particle Swarm Optimization (MBPSO) algorithm.
2. Wireless mesh networks rely on semi-static node configurations and paths that impact performance metrics like packet delivery ratio, end-to-end delay, and throughput. Previous heuristic algorithms were summarized to identify a suitable approach.
3. The study adapts an MBPSO approach to improve throughput. Results showed throughput increased by 5.79% compared to previous work.
The document discusses using a window-based smart antenna design to improve routing performance in mobile ad hoc networks (MANETs). It proposes arranging antenna elements in a window configuration to achieve a desired radiation pattern with a minimum number of elements. The design aims to address issues like resource constraints in MANET nodes and different antenna arrangement options. It analyzes how smart antennas can enhance the dynamic source routing protocol by reducing redundant broadcasts, handling route requests/replies more efficiently, and improving data packet delivery and route error messaging. However, smart antennas also increase node complexity and computational overhead.
This document summarizes an article from the International Journal of Computer Networks & Communications that focuses on energy efficiency approaches for wireless mesh networks. The article classifies existing energy saving approaches into three categories: network layer protocols, MAC layer protocols, and physical layer protocols. At the network layer, approaches like connected dominating set (CDS) and SPAN are discussed which identify certain nodes to remain active for routing while allowing others to sleep. The article provides an overview of these energy efficiency techniques across different layers of the protocol stack for wireless mesh networks.
The document discusses WiMAX technology and its use of OFDM to address bottleneck problems in high-speed networks. It describes how WiMAX uses OFDM to efficiently allocate bandwidth and share it between connecting nodes based on their data request sizes, in order to prevent data loss. It also provides background on WiMAX architecture and management, and how it can support high-speed point-to-point and point-to-multipoint connections with optimized handover and security features.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
A MANET is an autonomous group of mobile users that communicate over reasonably slow
wireless links. The network topology may vary rapidly and unpredictably over time, because the nodes
are mobile. The network is decentralized, where all network activity, including discovering the topology
and delivering messages must be executed by the nodes themselves. Hence routing functionality will
have to be incorporated into the mobile nodes. MANET is a kind of wireless ad-hoc network and it is a
self-configuring network of mobile routers (and associated hosts) connected by wireless links – the union
of which forms an arbitrary topology. Such a network may operate in a standalone fashion, or may be
connected to the larger Internet Problems in Ad Hoc Networks.
This document presents a comparative analysis of vertical handoff in IEEE 802.11 WLAN and CDMA networks. It discusses vertical handoff strategies and methods, and related work on handoff performance analysis in 802.11 networks. The paper then presents an existing vertical handoff algorithm between WLAN and CDMA networks, and defines variables used to determine handoff delay and throughput. Simulation results are shown comparing throughput and handoff delay for real-time and non-real-time services under different conditions in a network modeled based on WLAN and CDMA technologies.
This document discusses vertical handover decision algorithms for heterogeneous wireless networks. It analyzes existing vertical handover decision algorithms and proposes a new prediction-based approach. Specifically:
1. Existing algorithms do not consider mobility prediction methods to take proactive measures when deciding vertical handovers.
2. The proposed algorithm uses a Hidden Markov Model predictor to accurately estimate a user's next location based on current and historical movement data.
3. This allows the algorithm to make more informed vertical handover decisions by anticipating future movements and network conditions.
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
This document summarizes a research paper on statistical multipath signal detection in CDMA for ad hoc networks. The paper presents simulation results of transmitting a signal through 5 different Rayleigh fading channels and selecting the signal with the highest SNR. The selected signal is then transmitted over an ad hoc network using a shortest path routing algorithm. Key aspects covered include: Rayleigh fading modeling, CDMA, OFDM, theoretical and simulated BER comparisons of BPSK over Rayleigh and AWGN channels, implementation of signal transmission over 5 channels in MATLAB, and use of the highest quality signal for transmission in an ad hoc network.
A Secure QOS Distributed Routing Protocol for Hybrid Wireless Networksiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNsijsrd.com
One fundamental problem of WMNs with a limited number of radio interfaces and orthogonal channels is that the performance degrades significantly as the network size grows. This results from increased interference between nodes and diminished spatial reuse over the network. A WMN node needs to share a common channel with each of its neighbours in the communication range, requiring it to set up a virtual link. Moreover, to reduce network interference, a node should minimize the number of neighbours that it shares a common channel with. The objective of a channel assignment strategy is to ensure efficient utilization of the available channels (e.g., by minimizing interference) while maximizing connectivity in the network. However, since these two requirements are conflicting with each other, the goal is to achieve a balance between these two. The major constraints which need to be satisfied by a channel assignment scheme include fixed number of channels in the network, limited number of radios in mesh nodes, common channel between two communicating nodes, and limited channel capacity. Also, a channel assignment scheme should take the amount of traffic load supported by each mesh node into consideration.
This document discusses firewall security in computer networks. It begins by defining firewalls as hardware, software, or a combination used to prevent unauthorized access to private networks or computers. It then summarizes the differences between hardware and software firewalls. The document goes on to explain how software firewalls work by inspecting packets of data. The rest of the document discusses wireless mesh networks, including routing protocols, standards, network architecture, advantages, and disadvantages.
This document provides an overview of wireless mesh networks (WMNs). It discusses the types of nodes in WMNs including wireless mesh routers and mesh clients. It describes the different architectures of WMNs and characteristics such as low cost, integration capabilities, and applications like broadband networking. Key challenges are also addressed around developing high-capacity radio interfaces and resource management. The document serves as an introduction to WMNs covering topics from architecture and standards to research opportunities.
The document summarizes a seminar presentation on wireless mesh networks. It discusses the key characteristics of wireless mesh networks, including their self-organizing and self-configuring nature. It also covers different channel assignment schemes, routing protocols, standards, network architecture, advantages and disadvantages of wireless mesh networks. The presentation concludes that a multi-radio, multi-channel wireless mesh topology improves network performance by increasing throughput and decreasing delay.
DYNAMIC HYBRID CHANNEL (WMN) FOR BANDWIDTH GUARANTEES IN AD_HOC NETWORKSpharmaindexing
This document discusses bandwidth guarantees in wireless mesh networks. It proposes a new routing technique called dynamic hybrid channel, which uses both proactive and reactive routing protocols based on AOMDV. The goal is to provide bandwidth guarantees by selecting multiple paths and using the path with the highest available bandwidth for transmission. The performance of this approach is evaluated using the NS-2 network simulator. Several challenges of wireless mesh networks are also discussed, such as interference reduction and improving throughput across multiple hops.
This document summarizes research on congestion and fairness issues in wireless mesh networks. The researchers found that:
1) Wireless mesh networks using CSMA/CA MAC protocols can experience "starvation", where one-hop flows receive most bandwidth while competing multi-hop flows receive almost nothing.
2) Through experiments on an operational urban mesh network, they confirmed starvation occurs and isolated that only a one-hop TCP flow coupled with a two-hop TCP flow is needed to induce it.
3) They developed an analytical model to understand the causes of starvation as the interaction of MAC-layer biases, congestion control loops, and penalties of switching between network states.
4) Their model suggests a "
An Overview Of Channel Assignment Methods For Multi-Radio Multi-Channel Wirel...Darian Pruitt
This document provides an overview of channel assignment methods for multi-radio multi-channel wireless mesh networks. It begins with an introduction to wireless mesh networks and explains why the multi-radio multi-channel architecture has been adopted. It then identifies two key design issues for channel assignment approaches: interference and connectivity. Finally, it proposes a classification of channel assignment approaches and outlines the rest of the document which will examine individual approaches, provide comparisons, and discuss future research directions.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
A study on qos aware routing in wireless mesh networkeSAT Journals
Abstract Wireless Mesh Networks (WMN) mainly consists of mesh clients and mesh routers. It is mainly effective as an economically successful and a promising technology for providing wireless broadband services. Mesh routers basically form the backbone of the network (WMN) and hence has the minimum mobility. They interconnect the mesh clients and the wireline backbone network. In order to approach the wireline level or same or near QoS, the Wireless Mesh Networks must be QoS aware. In this paper we have worked on the effect of variable transmission power to achieve the desired SNR and to maximize the number of active links at the same time for each links in the network and analyze different approaches to maintain the QoS routing of a wireless mesh network. Index Terms:AODV; AQOR; DSDV; MANET; OPNET; QOS; WMN
International Journal of Research in Engineering and Science is an open access peer-reviewed international forum for scientists involved in research to publish quality and refereed papers. Papers reporting original research or experimentally proved review work are welcome. Papers for publication are selected through peer review to ensure originality, relevance, and readability.
The document discusses the evolution of wireless mesh networking technologies. It describes how early ad hoc networks led to developments in wireless sensor networks and wireless mesh networks (WMNs). WMNs provide wireless infrastructure by replacing wired networks with self-configuring, flexible wireless links. This allows for easier deployment in areas where wired infrastructure is not feasible or too expensive. The document outlines ongoing research into heterogeneous mesh networking using multiple wireless technologies to create high-capacity access networks for future applications.
WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF ijwmn
Wireless mesh network has recently received a great deal of attention as a promising technology to provideubiquitous high bandwidth access for a large number of users. Such network may face a significant broadcast traffic that may consequently degrade the network reliability.
In this paper, we have focused interest to wireless mesh network based IEEE 802.11s and we have designed
a self-pruning method to control and reduce the broadcast traffic forwarding. Our scheme, namely Control of Broadcast Forwarding (CBF), defines two behaviours to manage the broadcasting operation. Routing
packets are managed differently from data broadcast messages to avoid afflicting the routing process.
The simulations results show that CBF ameliorates the network capacity by reducing considerably the
number of redundant packets, improving the end to end delay and providing high reachability and packet
delivery ration.
Wireless mesh networks are self-organizing networks that can connect entire cities using existing wireless technology in an economical way. They are comprised of mesh routers that form the infrastructure and connect to the internet, and mesh clients that can access the network through the routers or directly connect with other clients. The hybrid mesh architecture combines infrastructure and client meshing to provide improved connectivity inside the network. Wireless mesh networks offer benefits like lower setup costs, larger network size, and self-configuration, but also face challenges regarding scalability, compatibility, and security. Potential applications of wireless mesh networks include health systems, security, building automation, transportation, and broadband home networking.
An optimized link state routing protocol based on a cross layer design for wi...IOSR Journals
This document discusses an optimized link state routing protocol based on a cross-layer design for wireless mesh networks. It proposes monitoring link quality at the MAC layer and notifying the network layer of changes, allowing routes to be automatically updated without a refresh phase. This provides seamless connectivity under varying load and mobility. Traditional routing protocols either have fast but vulnerable proactive routes or add overhead with reactive routes. The proposed cross-layer design monitors links continuously and performs vertical handovers to better links to avoid these issues.
Intro to Firetide Wireless Mesh NetworkingPaul Richards
This document provides an introduction to wireless mesh networking. It discusses how wireless mesh networks eliminate the need for expensive wiring by using wireless connections between nodes. This allows networks to be built and expanded quickly and flexibly. Wireless mesh networks are also self-configuring, self-healing, self-monitoring and self-tuning, making them simple to deploy and manage. By removing the constraints of wiring, wireless mesh networking provides a cost-effective alternative for implementing robust and scalable networks.
Achieving Transmission Fairness in Distributed Medium Access Wireless Mesh Ne...ijwmn
Wireless mesh networking gained an international interest over the years as a result to high recognition in
the wireless industry as a cost effective, scalable, wider coverage and capacity capable wireless technology.
The contention based distributed medium access in wireless networks has advanced not only in supporting
the quality of multimedia but also achieving high throughput and to minimize packet delay overheads in
legacy systems. Unfortunately, the impact of such enhancement has not been fully justified with mesh
network environments yet. The medium access frames are required to be contended over multi-hops to
overcome the challenges of improving overall system performance through concurrent transmissions. The
goal of this paper is to discuss the issues and challenges of transmission fairness and the effect of
concurrent transmission on system performance. To mitigate transmission fairness issues, we review
existing open literature on mesh networking and provide guidelines for better system design and
deployment. Finally, we conclude the paper with future research directions. This study may help network
designer and planner to overcome the remaining challenging issues in the design and deployment of WMNs
worldwide.
Active Path Updation For Layered Routing (Apular) In Wireless Mesh Networkschetan1nonly
1) The document proposes an Active Path Updation procedure (APULAR) for layered routing in wireless mesh networks to quickly update broken paths and reduce packet loss.
2) In APULAR, the destination node takes responsibility for local repair restoration instead of the source node initiating a new path discovery when a link breaks, as is typically done.
3) The procedure is simulated and shown to outperform AODV and IWMRA routing protocols, achieving better packet delivery ratio, lower control overhead, higher throughput, and lower end-to-end delay.
Active path updation for layered routing (apular) in wirelessAlexander Decker
1) The document proposes an Active Path Updation procedure (APULAR) for layered routing in wireless mesh networks to quickly update broken paths and reduce packet loss.
2) In APULAR, the destination node takes responsibility for local repair restoration instead of the source node initiating a new path discovery when a link breaks, as is typically done.
3) The procedure is simulated and shown to outperform AODV and IWMRA routing protocols, achieving better packet delivery ratio, lower control overhead, higher throughput, and lower end-to-end delay.
Due to availability of internet and evolution of embedded devices, Internet of things can be useful to contribute in energy domain. The Internet of Things (IoT) will deliver a smarter grid to enable more information and connectivity throughout the infrastructure and to homes. Through the IoT, consumers, manufacturers and utility providers will come across new ways to manage devices and ultimately conserve resources and save money by using smart meters, home gateways, smart plugs and connected appliances. The future smart home, various devices will be able to measure and share their energy consumption, and actively participate in house-wide or building wide energy management systems. This paper discusses the different approaches being taken worldwide to connect the smart grid. Full system solutions can be developed by combining hardware and software to address some of the challenges in building a smarter and more connected smart grid.
A Survey Report on : Security & Challenges in Internet of Thingsijsrd.com
In the era of computing technology, Internet of Things (IoT) devices are now popular in each and every domains like e-governance, e-Health, e-Home, e-Commerce, and e-Trafficking etc. Iot is spreading from small to large applications in all fields like Smart Cities, Smart Grids, Smart Transportation. As on one side IoT provide facilities and services for the society. On the other hand, IoT security is also a crucial issues.IoT security is an area which totally concerned for giving security to connected devices and networks in the IoT .As, IoT is vast area with usability, performance, security, and reliability as a major challenges in it. The growth of the IoT is exponentially increases as driven by market pressures, which proportionally increases the security threats involved in IoT The relationship between the security and billions of devices connecting to the Internet cannot be described with existing mathematical methods. In this paper, we explore the opportunities possible in the IoT with security threats and challenges associated with it.
In today’s emerging world of Internet, each and every thing is supposed to be in connected mode with the help of billions of smart devices. By connecting all the devises used in our day to day life, make our life trouble less and easy. We are incorporated in a world where we are used to have smart phones, smart cars, smart gadgets, smart homes and smart cities. Different institutes and researchers are working for creating a smart world for us but real question which we need to emphasis on is how to make dumb devises talk with uncommon hardware and communication technology. For the same what kind of mechanism to use with various protocols and less human interaction. The purpose is to provide the key area for application of IoT and a platform on which various devices having different mechanism and protocols can communicate with an integrated architecture.
Study on Issues in Managing and Protecting Data of IOTijsrd.com
This paper discusses variety of issues for preserving and managing data produced by IoT. Every second large amount of data are added or updated in the IoT databases across the heterogeneous environment. While managing the data each phase of data processing for IoT data is exigent like storing data, querying, indexing, transaction management and failure handling. We also refer to the problem of data integration and protection as data requires to be fit in single layout and travel securely as they arrive in the pool from diversified sources in different structure. Finally, we confer a standardized pathway to manage and to defend data in consistent manner.
Interactive Technologies for Improving Quality of Education to Build Collabor...ijsrd.com
Today with advancement in Information Communication Technology (ICT) the way the education is being delivered is seeing a paradigm shift from boring classroom lectures to interactive applications such as 2-D and 3-D learning content, animations, live videos, response systems, interactive panels, education games, virtual laboratories and collaborative research (data gathering and analysis) etc. Engineering is emerging with more innovative solutions in the field of education and bringing out their innovative products to improve education delivery. The academic institutes which were once hesitant to use such technology are now looking forward to such innovations. They are adopting the new ways as they are realizing the vast benefits of using such methods and technology. The benefits are better comprehensibility, improved learning efficiency of students, and access to vast knowledge resources, geographical reach, quick feedback, accountability and quality research. This paper focuses on how engineering can leverage the latest technology and build a collaborative learning environment which can then be integrated with the national e-learning grid.
Internet of Things - Paradigm Shift of Future Internet Application for Specia...ijsrd.com
In the world more than 15% people are living with disability that also include children below age of 10 years. Due to lack of independent support services specially abled (handicap) people overly rely on other people for their basic needs, that excludes them from being financially and socially active. The Internet of Things (IoT) can give support system and a better quality of life as well as participation in routine and day to day life. For this purpose, the future solutions for current problems has been introduced in this paper. Daunting challenges have been considered as future research and glimpse of the IoT for specially abled person is given in the paper.
A Study of the Adverse Effects of IoT on Student's Lifeijsrd.com
Internet of things (IoT) is the most powerful invention and if used in the positive direction, internet can prove to be very productive. But, now a days, due to the social networking sites such as Face book, WhatsApp, twitter, hike etc. internet is producing adverse effects on the student life, especially those students studying at college Level. As it is rightly said, something which has some positive effects also has some of the negative effects on the other hand. In this article, we are discussing some adverse effects of IoT on student’s life.
Pedagogy for Effective use of ICT in English Language Learningijsrd.com
The use of information and communications technology (ICT) in education is a relatively new phenomenon and it has been the educational researchers' focus of attention for more than two decades. Educators and researchers examine the challenges of using ICT and think of new ways to integrate ICT into the curriculum. However, there are some barriers for the teachers that prevent them to use ICT in the classroom and develop supporting materials through ICT. The purpose of this study is to examine the high school English teachers’ perceptions of the factors discouraging teachers to use ICT in the classroom.
In recent years usage of private vehicles create urban traffic more and more crowded. As result traffic becomes one of the important problems in big cities in all over the world. Some of the traffic concerns are traffic jam and accidents which have caused a huge waste of time, more fuel consumption and more pollution. Time is very important parameter in routine life. The main problem faced by the people is real time routing. Our solution Virtual Eye will provide the current updates as in the real time scenario of the specific route. This research paper presents smart traffic navigation system, based on Internet of Things, which is featured by low cost, high compatibility, easy to upgrade, to replace traditional traffic management system and the proposed system can improve road traffic tremendously.
Ontological Model of Educational Programs in Computer Science (Bachelor and M...ijsrd.com
In this work there is illustrated an ontological model of educational programs in computer science for bachelor and master degrees in Computer science and for master educational program “Computer science as second competence†by Tempus project PROMIS.
Understanding IoT Management for Smart Refrigeratorijsrd.com
1) The document discusses a proposed design for an intelligent refrigerator that leverages sensor technology and wireless communication to identify food items and order more through an internet connection when supplies are low.
2) Key aspects of the proposal include using RFID to uniquely identify each food item, storing item and usage data in an XML database, monitoring usage patterns to determine reordering needs, and executing orders through an online retailer using stored payment details.
3) Security and privacy concerns with such an internet-connected refrigerator are discussed, such as potential hacking of personal information or unauthorized device control. The proposal aims to minimize human interaction for household management.
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...ijsrd.com
Double wishbone designs allow the engineer to carefully control the motion of the wheel throughout suspension travel. 3-D model of the Lower Wishbone Arm is prepared by using CAD software for modal and stress analysis. The forces and moments are used as the boundary conditions for finite element model of the wishbone arm. By using these boundary conditions static analysis is carried out. Then making the load as a function of time; quasi-static analysis of the wishbone arm is carried out. A finite element based optimization is used to optimize the design of lower wishbone arm. Topology optimization and material optimization techniques are used to optimize lower wishbone arm design.
A Review: Microwave Energy for materials processingijsrd.com
Microwave energy is a latest largest growing technique for material processing. This paper presents a review of microwave technologies used for material processing and its use for industrial applications. Advantages in using microwave energy for processing material include rapid heating, high heating efficiency, heating uniformity and clean energy. The microwave heating has various characteristics and due to which it has been become popular for heating low temperature applications to high temperature applications. In recent years this novel technique has been successfully utilized for the processing of metallic materials. Many researchers have reported microwave energy for sintering, joining and cladding of metallic materials. The aim of this paper is to show the use of microwave energy not only for non-metallic materials but also the metallic materials. The ability to process metals with microwave could assist in the manufacturing of high performance metal parts desired in many industries, for example in automotive and aeronautical industries.
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logsijsrd.com
With an expontial growth of World Wide Web, there are so many information overloaded and it became hard to find out data according to need. Web usage mining is a part of web mining, which deal with automatic discovery of user navigation pattern from web log. This paper presents an overview of web mining and also provide navigation pattern from classification and clustering algorithm for web usage mining. Web usage mining contain three important task namely data preprocessing, pattern discovery and pattern analysis based on discovered pattern. And also contain the comparative study of web mining techniques.
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMijsrd.com
Application of FACTS controller called Static Synchronous Compensator STATCOM to improve the performance of power grid with Wind Farms is investigated .The essential feature of the STATCOM is that it has the ability to absorb or inject fastly the reactive power with power grid . Therefore the voltage regulation of the power grid with STATCOM FACTS device is achieved. Moreover restoring the stability of the power system having wind farm after occurring severe disturbance such as faults or wind farm mechanical power variation is obtained with STATCOM controller . The dynamic model of the power system having wind farm controlled by proposed STATCOM is developed . To validate the powerful of the STATCOM FACTS controller, the studied power system is simulated and subjected to different severe disturbances. The results prove the effectiveness of the proposed STATCOM controller in terms of fast damping the power system oscillations and restoring the power system stability.
Making model of dual axis solar tracking with Maximum Power Point Trackingijsrd.com
Now a days solar harvesting is more popular. As the popularity become higher the material quality and solar tracking methods are more improved. There are several factors affecting the solar system. Major influence on solar cell, intensity of source radiation and storage techniques The materials used in solar cell manufacturing limit the efficiency of solar cell. This makes it particularly difficult to make considerable improvements in the performance of the cell, and hence restricts the efficiency of the overall collection process. Therefore, the most attainable maximum power point tracking method of improving the performance of solar power collection is to increase the mean intensity of radiation received from the source used. The purposed of tracking system controls elevation and orientation angles of solar panels such that the panels always maintain perpendicular to the sunlight. The measured variables of our automatic system were compared with those of a fixed angle PV system. As a result of the experiment, the voltage generated by the proposed tracking system has an overall of about 28.11% more than the fixed angle PV system. There are three major approaches for maximizing power extraction in medium and large scale systems. They are sun tracking, maximum power point (MPP) tracking or both.
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...ijsrd.com
This document summarizes a review paper on performance and emission testing of a 4-stroke diesel engine using ethanol-diesel blends at different pressures. The paper reviews several previous studies that tested blends of 5-30% ethanol mixed with diesel fuel. The studies found that a 10-20% ethanol blend can improve brake thermal efficiency compared to pure diesel, while also reducing emissions like NOx and smoke. Higher ethanol blends required advancing the injection timing to allow the engine to run. Ethanol-diesel blends were found to have lower density, viscosity, pour point and higher flash point compared to pure diesel. Overall, ethanol shows potential as a renewable fuel to improve engine performance and reduce emissions when blended with diesel
Study and Review on Various Current Comparatorsijsrd.com
This paper presents study and review on various current comparators. It also describes low voltage current comparator using flipped voltage follower (FVF) to obtain the single supply voltage. This circuit has short propagation delay and occupies a small chip area as compare to other current comparators. The results of this circuit has obtained using PSpice simulator for 0.18 μm CMOS technology and a comparison has been performed with its non FVF counterpart to contrast its effectiveness, simplicity, compactness and low power consumption.
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...ijsrd.com
Power dissipation is a challenging problem for today's system-on-chip design and test. This paper presents a novel architecture which generates the test patterns with reduced switching activities; it has the advantage of low test power and low hardware overhead. The proposed LP-TPG (test pattern generator) structure consists of modified low power linear feedback shift register (LP-LFSR), m-bit counter, gray counter, NOR-gate structure and XOR-array. The seed generated from LP-LFSR is EXCLUSIVE-OR ed with the data generated from gray code generator. The XOR result of the sequence is single input changing (SIC) sequence, in turn reduces the switching activity and so power dissipation will be very less. The proposed architecture is simulated using Modelsim and synthesized using Xilinx ISE9.2.The Xilinx chip scope tool will be used to test the logic running on FPGA.
Defending Reactive Jammers in WSN using a Trigger Identification Service.ijsrd.com
In the last decade, the greatest threat to the wireless sensor network has been Reactive Jamming Attack because it is difficult to be disclosed and defend as well as due to its mass destruction to legitimate sensor communications. As discussed above about the Reactive Jammers Nodes, a new scheme to deactivate them efficiently is by identifying all trigger nodes, where transmissions invoke the jammer nodes, which has been proposed and developed. Due to this identification mechanism, many existing reactive jamming defending schemes can be benefited. This Trigger Identification can also work as an application layer .In this paper, on one side we provide the several optimization problems to provide complete trigger identification service framework for unreliable wireless sensor networks and on the other side we also provide an improved algorithm with regard to two sophisticated jamming models, in order to enhance its robustness for various network scenarios.
How to create and manage blogs in odoo 18Celine George
A blog serves as a space for sharing articles and information.
In Odoo 18, users can easily create and publish blogs through
the blog menu. This guide offers step-by-step instructions on
setting up and managing a blog on an Odoo 18 website.
This study describe how to write the Research Paper and its related issues. It also presents the major sections of Research Paper and various tools & techniques used for Polishing Research Paper
before final submission.
Finding a Right Journal and Publication Ethics are explain in brief.
How to Configure Credit Card in Odoo 18 AccountingCeline George
Odoo 18 allows businesses to manage credit card payments efficiently within the Accounting module. Here’s how you can configure a credit card as a payment method.
Principal Satbir Singh writes “Kaba and Kitab i.e. Building Harmandir Sahib and Compilation of Granth Sahib gave Sikhs a central place of worship and a Holy book is the single most important reason for Sikhism to flourish as a new religion which gave them a identity which was separate from Hindu’s and Muslim’s.
How to Configure Subcontracting in Odoo 18 ManufacturingCeline George
Subcontracting in manufacturing involves outsourcing specific production tasks to external vendors or subcontractors. These tasks may include manufacturing certain components, handling assembly processes, or even producing entire product lines.
How to Use Owl Slots in Odoo 17 - Odoo SlidesCeline George
In this slide, we will explore Owl Slots, a powerful feature of the Odoo 17 web framework that allows us to create reusable and customizable user interfaces. We will learn how to define slots in parent components, use them in child components, and leverage their capabilities to build dynamic and flexible UIs.
Understanding-the-Weather.pdf/7th class/social/ 2nd chapter/Samyans Academy n...Sandeep Swamy
Weather shapes our world and daily lives. This presentation explores how we measure weather conditions and use predictions to prepare for various weather events. "A change in the weather is sufficient to create the world and oneself anew." - Marcel Proust, French novelist by sandeep swamy
"Orthoptera: Grasshoppers, Crickets, and Katydids pptxArshad Shaikh
Orthoptera is an order of insects that includes grasshoppers, crickets, and katydids. Characterized by their powerful hind legs, Orthoptera are known for their impressive jumping ability. With diverse species, they inhabit various environments, playing important roles in ecosystems as herbivores and prey. Their sounds, often produced through stridulation, are distinctive features of many species.
What are the Features & Functions of Odoo 18 SMS MarketingCeline George
A key approach to promoting a business's events, products, services, and special offers is through SMS marketing. With Odoo 18's SMS Marketing module, users can notify customers about flash sales, discounts, and limited-time offers.
Odoo 18 Point of Sale PWA - Odoo SlidesCeline George
Progressive Web Apps (PWA) are web applications that deliver an app-like experience using modern web technologies, offering features like offline functionality, installability, and responsiveness across devices.
Quantative Analysis and Evaluation of Topology Control Schemes for Utilizing Multiradio Multichannel in Wireless Mesh Network
1. IJSRD - International Journal for Scientific Research & Development| Vol. 2, Issue 07, 2014 | ISSN (online): 2321-0613
All rights reserved by www.ijsrd.com 633
Quantative Analysis and Evaluation of Topology Control Schemes for
Utilizing Multiradio Multichannel in Wireless Mesh Networks
Preeti1
Pardeep Kumar2
Shanu Malhotra3
1,2
Department of Electronics and Communication Engineering 3
Department of Computer Science &
Engineering
1,2
SSGI, Yamuna Nagar, India 3
ISTK, Yamuna Nagar, India
Abstract— By virtue of their robustness, cost-effectiveness,
self-organizing and self-configuring nature, WMNs have
emerged as a new network paradigm for a wide range of
applications, such as public safety and emergency response
communications, intelligent transportation systems, and
community networks. It is anticipated that WMNs will not
only resolve the limitations of wireless ad hoc networks,
local area networks (WLANs), personal area networks
(WPANs), and metropolitan area networks (WMANs) but
also significantly improve such networks’ performance. One
fundamental problem of WMNs with a limited number of
radio interfaces and orthogonal channels is that the
performance degrades significantly as the network size
grows. This results from increased interference between
nodes and diminished spatial reuse over the network. In this
paper, it is proposed to evaluate the performance of two
different channel assignment schemes namely common
channel assignment (CCA) and centralized tabu-based
search algorithm under WCETT routing protocols for
varying traffic load in terms of packet delivery ratio,
throughput, average end to end delay and routing overhead
using NS2 network simulator. WCETT protocol uses the
weighted sum of the cumulative expected transmission time
and the maximal value of efficient channels among all
channels.
Key words: WMN, CCA, WCETT, NS2
I. WIRELESS NETWORKS
Wireless Communication is an application of science and
technology that has come to be vital for modern existence.
Wireless networking is an emerging technology that allows
users to access information and services electronically,
regardless of their geographic position. From the early radio
and telephone to current devices such as mobile phones and
laptops, accessing the global network has become the most
essential and indispensable part of our lifestyle. Wireless
communication is an ever-developing field, and the future
holds many possibilities in this area. Now users are able to
move freely and still have seamless, reliable and high-speed
network connectivity. Portable computers and hand-held
devices will do for data communication what cellular
phones are now doing for voice communication. Traditional
network mobility focused on roaming, which is
characterized by hosts connecting to the fixed infrastructure
internet at locations other than their well known home
network address. Hosts can connect directly to the fixed
infrastructure on a visited subnet through a wireless link or a
dial-up line, these so called traditional (or fixed-
infrastructure mobile) networks raise issues such as address
management, but do not require significant, changes to core
network functions such as routing.
A. Differences between Ad Hoc Wireless Networks and
Wireless Mesh Networks
If we consider mobility, many ad hoc wireless
networks are high mobile networks and their
network topologies change dynamically. On the
other hand, WMNs have relatively static mobility
where relay nodes are mostly fixed, so its network
mobility is low compared to ad-hoc wireless
networks.
One bigger constraint in ad-hoc wireless network is
energy because nodes in these networks may not
have a constant power source, while WMNs nodes
have better energy storage and power source due to
the static topology, formed by fixed relay nodes.
Deployment may be easy in ad-hoc networks,
while in WMNs we may require planning.
For the application scenario, most ad-hoc wireless
networks are temporary, and WMNs are mostly
semi-permanent or permanent. In addition, WMNs
can be used for both military and civilian
applications; an example is the provision of low
cost Internet services in public places.
B. Wireless Mesh Networks
Wireless Mesh Network (WMN) [1] is a highly promising
technology and it plays an important role in the next
generation wireless mobile network. WMNs have emerged
as important architectures for the future wireless
communications. A wireless mesh network (WMN) is
a communications network made up of radio nodes
organized in a mesh topology. Wireless mesh networks
often consist of mesh clients, mesh routers and gateways. A
mesh network is reliable and offers redundancy. When
one node can no longer operate, the rest of the nodes can
still communicate with each other, directly or through one or
more intermediate nodes. The animation below illustrates
how wireless mesh networks can self-form and self-heal.
Wireless mesh networks can be implemented with various
wireless technology including 802.11, 802.15, 802.16,
cellular technologies or combinations of more than one type.
Wireless mesh architecture is a first step towards providing
cost effective and dynamic high-bandwidth networks over a
specific coverage area. Wireless mesh architectures
infrastructure is, in effect, a router network minus the
cabling between nodes. It's built of peer radio devices that
don't have to be cabled to a wired port like traditional
WLAN access points (AP) do. Mesh architecture sustains
signal strength by breaking long distances into a series of
shorter hops. Intermediate nodes not only boost the signal,
but cooperatively make forwarding decisions based on their
knowledge of the network, i.e. perform routing. This type of
infrastructure can be decentralized (with no central server)
or centrally managed (with a central server), both are
2. Quantative Analysis and Evaluation of Topology Control Schemes for Utilizing Multiradio Multichannel in Wireless Mesh Networks
(IJSRD/Vol. 2/Issue 07/2014/144)
All rights reserved by www.ijsrd.com 634
relatively inexpensive, and very reliable and resilient, as
each node needs only transmit as far as the next node. Nodes
act as routers to transmit data from nearby nodes
to peers that are too far away to reach in a single hop,
resulting in a network that can span larger distances.
Fig. 1: Wireless Mesh Network
The topology of a mesh network is also reliable, as
each node is connected to several other nodes. If one node
drops out of the network, due to hardware failure or any
other reason, its neighbors can quickly find another route
using a routing protocol.
C. Wireless Mesh Network Architecture
WMNs consist of two types of nodes: Mesh Routers and
Mesh Clients.
Wireless mesh router [1] contains additional
routing functions to support mesh networking. To
further improve the flexibility of mesh networking,
a mesh router is usually equipped with multiple
wireless interfaces built on either the same or
different wireless access technologies .Compared
with a conventional wireless router, a wireless
mesh router can achieve the same coverage with
much lower transmission power through multi-hop
communications.In spite of all these differences,
Moreover, the gateway/bridge functionalities in
mesh routers enable the integration of WMNs with
various existing wireless networks such as cellular,
wireless sensor, wireless-fidelity (Wi-Fi)
worldwide inter-operability for microwave access
(WiMAX)[5] .
Mesh Clients are the Conventional nodes (e.g.,
desktops, laptops, PDAs, Pocket PCs, phones,
etc.) equipped with wireless network interface
cards (NICs), and can connect directly to wireless
mesh routers .
The architecture of WMNs can be classified into three
main groups based on the functionality of the nodes:
D. Infrastructure/Backbone Wireless Mesh Networks
This type of WMNs includes mesh routers forming an
infrastructure for clients that connect to them. The WMN
infrastructure backbone can be built using various types of
radio technologies, in addition to the mostly used IEEE
801.11 technologies. The mesh routers form a mesh of self-
configuring, self-healing links among themselves. With
gateway functionality, mesh routers can be connected to the
Internet. This approach, also referred to as infrastructure
meshing, provides backbone for conventional clients and
enables integration of WMNs with existing wireless
networks, through gateway/bridge functionalities in mesh
routers. Conventional clients with Ethernet interface can be
connected to mesh routers via Ethernet links. The
architecture is shown in Fig 1 [1], where dash and solid lines
indicate wireless and wired links, respectively.
Fig. 1: Infrastructure/backbone WMN
E. Client Wireless Mesh Networks
In this type of Client WMN, nodes constitute peer-to-peer
network, and perform routing and configuration
functionalities as well as provide end-user applications to
customers, mesh routers are not required. They support
Multi-hop routing. Client nodes have to perform additional
functions such as routing and self-configuration. The basic
architecture is shown in Fig 2 [1].
Fig. 2: Client WMNs
F. Hybrid Wireless Mesh Networks
This architecture shown in Fig. 3 [1] is the combination of
infrastructure and client meshing. Mesh clients can access
the network through mesh routers as well as directly
meshing with other mesh clients. While the infrastructure
provides connectivity to other networks such as the Internet,
Wi-Fi, WiMAX, cellular, and sensor networks and the
routing capabilities of clients provide improved connectivity
and coverage inside the WMN.
3. Quantative Analysis and Evaluation of Topology Control Schemes for Utilizing Multiradio Multichannel in Wireless Mesh Networks
(IJSRD/Vol. 2/Issue 07/2014/144)
All rights reserved by www.ijsrd.com 635
Fig. 3: Hybrid WMNs
G. Routing and Channel Assignment protocols
Unlike ad hoc wireless networks, most of the nodes in
WMNs are stationary and thus dynamic topology changes
are less of a concern. Also, wireless nodes in WMNs are
mostly access points and Internet gateways and thus are not
subject to energy constraints. As a result, the focus is shifted
from maintaining network connectivity in an energy
efficient manner to finding high-throughput routes between
nodes, so as to provide users with the maximal end-to-end
throughput. In particular, because multiple flows initiated by
multiple nodes may engage in transmission at the same time,
how to locate routes that give the minimal possible
interference is a major issue. The issue of locating
interference free routes can roughly divided into two
complimentary approaches.
Fig. 4: A taxonomy of routing and channel assignment protocols for WMNs
H. Expected Transmission Count (ETX)
This metric calculates the expected number of transmissions
(including retransmissions) needed to send a frame over a
link, by measuring the forward and reverse delivery ratios
between a pair of neighboring nodes [9]. To measure the
delivery ratios, each node periodically broadcasts a
dedicated link probe packet of a fixed size. The probe packet
contains the number of probes received from each
neighboring node during the last period. Based on these
probes, a node can calculate the delivery ratio of probes on
the link to and from each of its neighbours. The expected
number of transmissions is then calculated as
ETX = 1/df × dr
where df and dr are the forward and reverse
delivery ratio, respectively. With ETX as the route metric,
the routing protocol can locate routes with the least expected
number of transmissions. Note that the effects of link loss
ratios and their asymmetry in the two directions of each link
on a path are explicitly considered in the EXT measure.
Measurements on wireless testbeds [9,10] show that, for the
source-destination pairs that are with two or more hops, use
of ETX as the route metric renders routes with throughput
significantly higher than use of the minimum hop count.
I. Expected Transmission Time (ETT)
One major drawback of ETX is that it may not be able to
identify high-throughput routes, in the case of multi-radio,
4. Quantative Analysis and Evaluation of Topology Control Schemes for Utilizing Multiradio Multichannel in Wireless Mesh Networks
(IJSRD/Vol. 2/Issue 07/2014/144)
All rights reserved by www.ijsrd.com 636
multi-rate wireless networks. This is because ETX only
considers the packet loss rate on a link but not its
bandwidth. ETT has thus been proposed to improve the
performance of ETX in multi-radio wireless networks that
support different data rates. Specifically, ETT includes the
bandwidth of a link in its computation [9],
ETT = ETX × S/B
where S and B denote the size of the packet and the
bandwidth of the link, respectively. ETT considers the
actual time incurred in using the channel. In order to
measure the bandwidth B of each link, a node sends two
probe packets of different sizes to each of its neighbours
every minute. The receiver node measures the difference
between the instants of receiving the packets, and forwards
the information to the sender. The bandwidth is then
estimated by the sender node by dividing the larger packet
size by the minimum of 10 consecutive measurements.
1) Weighted Cumulative ETT (WCETT)
What ETX and ETT have not explicitly considered is the
intra-flow interference. WCETT was proposed [9] to reduce
the number of nodes on the path of a flow that transmit on
the same channel. Specifically, let Xc be defined as the
number of times channel c is used along a path. Then
WCETT for a path is defined as the weighted sum of the
cumulative expected transmission time and the maximal
value of among all channels, i.e.,
WCETT= ∑ ∑
where β (0 <β<1) is a tunable parameter. Moreover,
the two terms also represent a trade-off between achieving
low delay and high throughput. Reducing the first term
reduces the delay, while reducing the second term increases
the achievable link throughput. The tunable parameter β is
used to adjust the relative importance of the two objectives.
Modified Expected Number of Transmissions (mETX) and
Effective Number of Transmissions (ENT) Another issue
which ETX does not consider is the effect of short-term
channel variation, i.e., ETX takes only the average channel
behavior into account for the route decision. In order to
capture the time-varying property of a wireless channel, the
metrics mETX and ENT were proposed in [11] which took
into account both the average and the standard deviation of
the observed channel loss rates. Specifically, mETX is
expressed as
mETX =exp (µ∑ +1/2 ∑)
where µ∑ and ∑are the average and variability of
the channel bit error probability. In some sense, mETX
incorporates the impact of physical layer variability in the
design of routing metrics. On the other hand, when the
problem of maximizing aggregate throughput with the
packet loss rate constraint is considered, mETX may not be
sufficient since the links which mETX selects may achieve
the maximum link-layer throughput but incur high loss rates
at the same time. The ENT metric is devised to meet both
objectives.
II. RELATED WORK
According to [1], In MAC layer, depending on which
network node take responsibility of the coordination of
medium access, MAC can be categorized into two major
types: centralized MAC and distributed MAC. In WMNs,
due to its distributed nature, distributed MAC is preferred.
The MAC protocols for WMNs can be classified into two
types: single-channel and multi-channel MAC protocols .
According to [2], To select a routing path in
WMNs, the routing algorithm requires to consider network
topology, and the routing path selection is to twist with
resource allocation, interference reduction and rate
adaptation in multiple hops. An MR-MC routing protocol
not only require to select a path between different nodes ,
but it also require to select the most effective channel or
radio node on the path.
According to [3], TC is considered as an additional
protocol layer between the routing and MAC layer in the
protocol stack . The routing layer is required for finding and
maintaining the paths between source/destination pairs in
the network, and for routing packets toward the destination
at the intermediate nodes on the route. Two-way interactions
may occur between the routing protocol and TC protocol.
The TC protocol, which create and maintains the list of the
all immediate neighboring nodes, can send a route update in
case it detects that the neigh borers list is considerably
changed, and hence leading to a faster response time to
topology changes and to decrease packet-lost rate.
According to [4], the authors work on TC in
WMNs generally can be categorized to centralized and
distributed approaches. The centralized TC approach have a
central server that is responsible for periodically information
collection and adaptation. However, the scalability of such
kind of approach may be an issue to be addressed. Due to
Given large number of nodes (e.g., hundreds of nodes), in
conjunction with only a reasonable set of interfaces per
node and limited number of channels available in the
network, the information of the whole network to be
transferred is astronomical. On the other hand, distributed
TC algorithms have not based on central server, in which
every node controls the topology by using its local
information.
According to [5], the authors identifies the problem
of TC has been studied deeply for wireless ad hoc
networks and power control is the main issue to construct
interference optimal topologies through careful tuning of the
node transmitting power.
According to [6], In MR-MC WMN, along with
power control (PC), TC is linked with channel assignment
(CA) in many ways. In handling the connectivity issue in
MR-MC WMNs, the CA decision can actually modifies the
network topology, which is a main difference between the
SR-MC networks. The problem of TC in MR-MC WMNs
has automatically been handled in conjunction with CA .
According to [7], some collective TC and routing
protocols have been proposed recently . The result of them
show that the collective optimization measures increases the
performance of the whole network significantly. So, how to
jointly optimize TC, CA, and routing is also a main task that
must be deal with.
According to [8], Directional antennas is another
main technology proposed as one of the viable means to
increase the performance of WMNs including enhance
capacity, and range of communications, reduce the
interference, conserve the energy and resolving collisions .
According to [9], the difference between Topology
Control(TC) and Power Control (PC) is defined: TC may
5. Quantative Analysis and Evaluation of Topology Control Schemes for Utilizing Multiradio Multichannel in Wireless Mesh Networks
(IJSRD/Vol. 2/Issue 07/2014/144)
All rights reserved by www.ijsrd.com 637
affect layers upper than PC, by choosing not to make some
node adjacencies visible to the network layer (e.g., by
filtering at the MAC layer). On the other hand, PC almost in
every results has some effect on the topology. Moreover, the
goal of PC may not be same as TC but for power
conservation etc.
According to [10], There are two centralized
optimal procedures for creating connected and bi-connected
static networks with aiming of minimizing the maximum
transmitting power level for every node.
According to [11], There are two main methods to
measure interference. The first is based on topology
characteristics, for example by counting number of
neighboring nodes using the same channel The second is
based on measuring traffic load carried in neighborhood
rather than only the number of neighboring nodes using the
same channel .
According to [12], the authors proposed a joint
topology control and routing (JTCR) protocol for MR-MC
networks to make use of both channel diversity and spatial
reusability, which addressed collective topology control and
routing problem in an IEEE 802.11-based MR-MC wireless
mesh networks. An Equivalent Channel Air Time Metric
(ECA TM) was developed to quantify the difference of
various adjustment candidates.
According to [13], thw authors examined
interference-aware TC and QoS routing in multi-channel
wireless mesh networks based on IEEE 802.11 with
dynamic traffic. They described a original definition of co-
channel interference to accurately capture the influence of
the interference.
According to [14], the authors developed three-step
solution starts by constructing a set of routing trees and seek
to balance the traffic among tree links. In the second step, it
performs interface allocation for each node in the tree with
the objective of balancing traffic load among the links
served by every node. Finally, it performs channel allocation
and antenna orientation to minimal interference while
covering all the intended neighbors of the node.
III. PROPOSED METHODOLGY
Multiradio Multichannel Wireless Mesh Network uses
multiple network interfaces per node allows simultaneous
transmission and reception on different interfaces tuned to
different channels, which can substantially improve
multihop throughput. A key issue to be addressed in a multi-
radio mesh network architecture is the Channel assignment
problem that involves assigning (mapping) channels to radio
interfaces to achieve efficient utilization of available
channels. A simple approach to address this issue is
common channel assignment (CCA) assumed in , where
radio interfaces at each node are assigned to the same set of
channels. Clearly, CCA leads to inefficient channel
utilization in the typical case where number of interfaces per
node is fewer relative to the number of channels. Generally,
the “goodness” of a channel assignment rests on two factors:
connectivity and interference (dependent on load). With
multiple radio interfaces operating on different channels,
two nodes can communicate only if each of them has an
interface assigned to a common channel. Assigning many
interfaces to a few channels can provide richer connectivity,
but has the undesirable effect of increasing interference
among transmissions on those channels. Thus, the channel
assignment has to balance between minimizing interference
(on any given channel) and maintaining sufficient
connectivity. In this sense, the channel assignment in a
multihop wireless network can be viewed as a Topology
control problem.
A. Simulation Methodoly
In this paper, we experimentally analyze the impact of
Common Channel Assignment (CCA) and centralized tabu
search algorithm against WCETT routing protocol over
varying offered load scenarios over multiradio multichannel
wireless mesh networks using network simulator such as
ns2. A detail simulation model based on NS-2 has been used
in the evaluation, and in order to perfectly evaluate the
effect of channel assignment schemes while WCETT
routing protocol is used under different traffic offered load
scenarios over MRMC WMN. For traffic source and
application, File Transport Protocol (FTP) is used above the
agent TCP. The channel assignment strategies that have
been used throughout the simulations were CCA and
Centralized tabu search algorithm respectively. The data
generator is FTP. 1040 byte data packets are used from
sender to receiver and 40 byte acknowledgments are used
from receiver to sender. Mobility models were created for
the simulations using 30 nodes, and this model was set in
such a way that first all the 30 nodes were provided with
initial location in the given rectangular topography field.
The field configuration used is: 1500 m x 1500 m field.
Different traffic offered load scenarios are used across the
CCA and Centralized Tabu search algorithm under WCETT
protocol to collect fair results. Table 1 shows the important
simulation parameters used in the simulation process
Parameter Value
Simulation area 1500m x 1500m
No. of nodes 30
No. of interfaces/ node 2
No. of channels/ node 5
Traffic FTP
Routing protocol WCETT
Transport Layer TCP
Channel Assignment
Strategies
CCA, Centralized Tabu search
algorithm.
Table 5.1: Important Simulation Parameters
B. Effect of CCA and Centralized Tabu search algorithm
on Throughput
Figure 5 shows the impact of constant and variable channel
assignment schemes on the throughput when the offered
load is varied over MRMC MWN. Simulation results shows
WCETT routing protocol that is specifically designed for
WMN, gives better performance for centralized tabu based
search algorithm (MICA). Simulation graph shows that as
traffic load increase the performance metric throughput
increases but variable channel assignment strategy (
centralized tabu based search scheme) better performs than
commonly used constant channel assignment scheme (
CCA) under WCETT routing protocol that increases the
achievable link throughput over MRMC WMN.
6. Quantative Analysis and Evaluation of Topology Control Schemes for Utilizing Multiradio Multichannel in Wireless Mesh Networks
(IJSRD/Vol. 2/Issue 07/2014/144)
All rights reserved by www.ijsrd.com 638
Fig. 5: Throughput vs. offered load
C. Effect of CCA and Centralized Tabu search algorithm
on PDR
Figure 6 shows the packet delivery ratio for two different
channel assignment strategies uner WCETT routing protocol
when the taffic load is varied. Simulation results shows that
for higer traffic load, WCETT routing protocol gives better
performace for centralized tabu based channel assignment
strategy.
Fig. 6: PDF vs. offered load
D. Effect of CCA and Centralized Tabu search algorithm
on Average End to End Delay
Average End to End delay is the average time taken by a
data packet to reach from source node to destination node. It
is ratio of total delay to the number of packets received.
Figure 7 shows the Average delay for two different channel
assignment strategies uner WCETT routing protocol when
the taffic load is varied. Simulation results shows that
centralized tabu-based serach scheme takes longer time than
common channel assignment scheme for MRMC wireless
mesh network.
Fig. 7: Average delay vs. offered load.
E. Effect of CCA and Centralized Tabu search algorithm
on Routing Overhead
Figure 8 shows the routing overhead for two different
channel assignment strategies uner WCETT routing protocol
when the taffic load is varied. Simulation results shows that
for higer traffic load, WCETT routing protocol gives better
performace for centralized tabu based channel assignment
strategy. Simulation results shows that centralized tabu-
based serach scheme has higher routing overhead time than
common channel assignment scheme for MRMC wireless
mesh network.
Fig. 8: Routing overhead vs. offered load
IV. CONCLUSION
In this paper, the effect of offered load is examined on to
evaluate the performance Weighted Cumulative ETT
(WCETT) routing protocol under common channel
assignment (CCA) and centralized tabu-based channel
assignment over multiradio multichannel wireless mesh
network. we have identified the key challenges associated
with assigning channels to radio interfaces in a multi-radio
wireless mesh network. In a realistic WMN. The working of
centralized tabu-based algorithm is divided into two phases.
In the first phase, each node sends packets with the preferred
strategy reception channel. If channel is available, then
selected as the preferred channel reception. If there is no
available channel, channel actions are performed with the
node that is further away from it. In the second phase, the
node uses the channel selected in the first phase to send and
receive data. The channel selection algorithms that are used
are built on simple rules that avoid the collision. From the
simulations results, it is observed that as the traffic load
increases, the throughput in the case of centralized tabu-
based algorithm decreases. The packet delivery ratio of
centralized tabu-based search is almost similar to common
channel assignment. The average end-to-end delay of
centralized tabu-based search protocol is less as compared to
CCA algorithm for higher traffic load. Thus, we can
conclude that assumed variable channel assignment scheme
is better than common channel assignment scheme over
MRMC WMN.
REFERENCES
[1] F Theoleyre, B Darties, A Duda (2009) “Assignment
of roles and channels for a multichannel mac in
wireless mesh networks” 18th International
Conference on Computer Communications and
Networks, pp. pp. 1–6.
[2] S Khan, KK Loo, ZU Din (2009) “Cross layer design
for routing and security in multi-hop wireless
networks” J. Inf. Assu. Secur 4, 170–173.
[3] P Santi (2005) “Topology Control in Wireless Ad
Hoc and Sensor Networks” John Wiley & Sons, Ltd,
New York.
0
500
1000
5 10 15 20 25
Throughput(Kbps)
offered load
WCETT
Centralized
Tabu-based
CCA
73.00%
74.00%
75.00%
76.00%
5 10 15 20 25
PDF(%)
offered load
WCETT
Centralized
Tabu-based
Common
Channel
0
0.01
0.02
5 10 15 20 25
AverageDelay(sec)
offered load
WCETT
Centralized
Tabu-based
CCA
0
5
10
5 10 15 20 25
RoutingOverhead
offered load
WCETT
Centralized
Tabu-based
CCA
7. Quantative Analysis and Evaluation of Topology Control Schemes for Utilizing Multiradio Multichannel in Wireless Mesh Networks
(IJSRD/Vol. 2/Issue 07/2014/144)
All rights reserved by www.ijsrd.com 639
[4] M Labrador, P Wightman (2009) “Topology Control
in Wireless Sensor Networks: with a companion
simulation tool for teaching and research” Springer,
Berlin.
[5] T Johansson, L Carr-Motyckova (2005) “Reducing
interference in ad hoc networks through topology
control” DIALM-POMC’05 , pp. 17–23.
[6] KN Ramachandran, EM Belding, KC Almeroth, MM
Buddhikot (2006) “Interference aware channel
assignment in multi-radio wireless mesh networks”
in Proc, ed. by . of INFOCOM’06 (Barcelona, Spain),
pp. 1–12.
[7] L Li, C Zhang, “Joint channel width adaptation,
topology control, and routing for multi-radio multi-
channel wireless mesh networks” IEEE, CCNC.
[8] JA Stine (2006) “Exploiting smart antennas in
wireless mesh networks using contention access”
IEEE J. Wirel. Commun 13(2), pp. 38–49.
[9] PH Pathak, R Dutta (2011) “A survey of network
design problems and joint design approaches in
wireless mesh networks” IEEE Commun. Surv.
Tutor 13(3), pp. 396–428.
[10]R Ramanathan, R Rosales-Hain (2000) “Topology
control of multihop wireless networks using transmit
power” in Proc, ed. by . of INFOCOM’00, vol. 2, pp.
pp. 404–413.
[11]H Skalli, S Ghosh, SK Das, L Lenzini, M Conti
(2007) “Channel assignment strategies for multiradio
wireless mesh networks: issues and solutions” IEEE
Commun. Mag 45(11),pp. 86–93.
[12]L Chen, Q Zhang, M Li, W Jia (2007) “Joint
topology control and routing in IEEE 802.11 based
multiradio multichannel mesh networks” IEEE Trans.
Veh. Technol 56, pp. 3123–3136.
[13]J Tang, G Xue, C Chandler, W Zhang (2006) “Link
scheduling with power control for throughput
enhancement in multihop wireless networks” IEEE
Trans. Veh.Technol 55(3), pp. 733–742.
[14]Q Liu, X Jia, Y Zhou (2011) “Topology control for
multi-radio multi-channel wireless mesh networks
using directional antennas” Springer J. Wirel.
Netws 17(1), pp. 41–51.