PERFORMANCE COMPARISION OF QOS STABILITY METHODS IN WIMAX NETWORKS
Journal Title: International Journal of Computer Science and Information Technologies - Year 2010, Vol 1, Issue 3
Abstract
Recently IEEE 802.16 WiMAX has attracted a lot of attention in wireless networking research and applications. An attempt had been made to compare DropTail, RED, Proportional fairness and DRR protocol model of WiMAX Point to Multi-Point mode with the focus on entry process and scheduling. DropTail queue similar to a First in First out (FIFO) queue drops tailing-after packets when the queue is full. RED starts dropping packets early indicating the link is congested and that it should slow down. Proportional Fairness scheduling is based on priorities assigned to the packets. In DRR, we use round-robin servicing with a quantum of service assigned to each queue. It was found that the loss rate was stable for all the four models. In addition to this the throughput and average received bytes increased with change in time for all the models.
Authors and Affiliations
Prof. S. J. K. Jagadeesh Kumar , Dr. T. Purusothaman , PL. Rajarajeswari
Selection of Best Web Site by Applying COPRAS-G method
The presence of multiple websites offering similar services has changed the user outlook. The user now prefers to visit those sites, which are easy to use. Many different methods have been proposed to measure usage of a...
Effect of User-Unknown Email addresses in spammers' lists
Spam emails are an extra burden over the network and also another Issue for the security of the internet. Today lot of spam mail are coming from the different resources. Many approaches and method are there to filter th...
A Novel Approach for Data Security Enhancement Using Multi Level Encryption Scheme
In this Information era, where all the transactions and files are digitized, the need for secure channel is eminent for transactions and confidential files. Information security is vital for many systems like core bankin...
A WEB BASED TOMATO CROP EXPERT INFORMATION SYSTEM BASED ON ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING ALGORITHM
Tomato is now the most widely grown vegetable crop in World. It is grown throughout the world in farm gardens, small home-gardens, and by market gardeners for fresh consumption as well as for pr...
Operating System based Compliance Validation of Trusted Computing
The concept of trusted computing given was by Anderson [2]. Trust is an expectation that a device behaves in a particular manner. A trusted component, operation or process is one whose behavior is pr...