An Effective Approach to Contention Based Bandwidth Request Mechanism in WiMAX Networks
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2012, Vol 3, Issue 1
Abstract
In this paper the IEEE 802.16 standard based Mobile WiMAX (Worldwide Interoperability for Microwave Access) system is investigated for the purpose of Quality of Service provisioning. As a potential solution, scheduling algorithms have been taken into major concern. Within the pool of scheduling algorithms and for the purpose Contention based bandwidth request resolution, the Modified Contention Based BW Resolution algorithm (MCB-BWR-Scheme) is proposed. Supported by the fact that the standard does not emphasize a specific scheduling algorithm for contention period based services, therefore, the choice of the scheduling algorithm for the WiMAX systems is very important. There are several scheduling algorithms for WiMAX in the literature, however, studies show that an efficient, fair and robust scheduling algorithm for WiMAX systems is still an open research area and hence a well thought out algorithm will be of great contribution to the area under investigation. Results from the OPNET Modeler simulation program show that the adjusted algorithm works well with delay and throughput constraints. It is also in consistent with the quality of service demands of the video and voice traffic.
Authors and Affiliations
Sonia Panchal, Satinder Pal
Segmentation of Handwritten Text Document Written in Devanagri Script for Simple character, skewed character and broken character
OCR (optical character recognition) is a technology that is commonly used for recognizing patterns artificial intelligence & computer machine. With the help of OCR we can convert scanned document into editable docume...
Detecting the Sybil Attack in Wireless Sensor Network :Survey
Mobility is frequently a problem for providing security services in ad hoc networks. In this paper, we render that mobility can alsobe used to enhance security. Specifically, we render that nodes which are in  passive...
Web Client and Web Server approaches to Prevent XSS Attacks
Websites rely completely on complex web applications to deliver content to all users according to set preferences and specific needs. In this manner organizations provide better value to their customers and prospects. Dy...
Green computing – The New Era of Energy Efficient Computing
Green computing is the study and practice of using computing resources efficiently. It aims to reduce the use of hazardous materials, maximize energy efficiency during the product's lifetime, and promote recyclability or...
ON SOME DOUBLE INTEGRALS INVOLVING -FUNCTION OF TWO VARIABLES AND SPHEROIDAL FUNCTIONS
The present paper evaluates certain double integrals involving -function of two variables [21] and Spherodial functions [23]. These double integrals are of most general character known so far and can be suitably speciali...