COORDINATED DISTRIBUTED SCHEDULING IN WIRELESS MESH NETWORK
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2012, Vol 3, Issue 3
Abstract
IEEE 802.16 based wireless mesh networks (WMNs) are a promising broadband access solution to support flexibility, cost effectiveness and fast deployment of the fourth generation infrastructure based wireless networks. Reducing the time for channel establishment is critical for low latency/interactive Applications. According to IEEE 802.16 MAC protocol, there are three scheduling algorithms for assigning TDMA slots to each network node: centralized and distributed the distributed is further divided into two operational modes coordinated distributed and uncoordinated distributed. In coordinated distributed scheduling algorithm, network nodes have to transmit scheduling message in order to inform other nodes about their transfer schedule. In this paper a new approach is proposed to improve coordinated distributed scheduling efficiency in IEEE 802.16 mesh mode, with respect to three parameter Throughput, Average end to end delay and Normalized Overhead. For evaluating the proposed networks efficiency, several extensive simulations are performed in various network configurations and the most important system parameters which affect the network performance are analyzed
Authors and Affiliations
Usha Kumari, Udai Shankar
Computer Aided Diagnosis of Melanoma Skin Cancer using Clinical Photographic Images
Melanoma is considered as one of the most malignant, metastatic and dangerous form of skin cancer that may cause death. The curability and survival of this type of skin cancer depends directly on the diagnosis and remova...
Study of Effect of Variations in slot dimensions on Fractal Patch antenna Performance
An antenna is a device that is made to efficiently radiate and receive radiated Electromagnetic waves. Microstrip antennas are attractive due to their light weight, conformability and low cost. These antennas can be inte...
IMPEMENTATION OF DATA WATCHER IN DATA LEAKAGE DETECTION SYSTEM
Now days, every company is facing data leakage. That is very serious problem faced by company. An owner of enterprise has given confidential data to its employee but most of the time employee leaks the data. That leak...
Mitigating the Distributed Denial of Service (DDoS) Attacks in Campus Local Area Network(CLAN)
The Campus Local Area Network (CLAN) of academic institutions interconnect computers ranging from one hundred to about twenty five hundred and these computers are located in academic building(s), hostel building(s), facu...
Theoretical and Computational Perspectives of Arabic Morphological Analyzers and Generators : Theoretical Survey
Morphology analysis is an essential part of most applications of natural language processing (NLP) which included different applications like Machine Translation (MT) and language rule based Information Retrieval (IR). M...