QOS ORIENTED VERTICAL HANDOFF FOR WIMAX/WLAN IN ADHOC WIRELESS NETWORK
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 4
Abstract
Vertical Handoff (VHO) scheme is designed based on the interworking architecture of WLAN/WIMAX which aims to provide always the best Quality of Service (Qos) for users. The performance of applications and network conditions are considered in the handoff process. The handoff procedures are normally initiated when the stations move across the border of WLANs. As a result, both the fixed station and the mobile stations within overlapped areas cannot benefit from VHOs. VHO could be initiated by two factors: mobility when a station moves out of the coverage of its connected WLAN and QoS when the connected network cannot satisfy the requirements. The whole handoff process is achieved by Vertical Handoff Manager (VHOM), which works on the Medium Access Control (MAC) layers of WiMAX and WLAN. VHOM uses the VHO decision algorithm to control smooth handoff between the WIMAX and WLAN. Moreover, evaluation algorithms to estimate the conditions of both WIMAX and WLAN networks in terms of available bandwidth and throughput. A simulation has demonstrated that schemes can keep stations always being connected.
Authors and Affiliations
Ramya M, U Poornima
AIDA : Minimizing Communication Overhead And Enhance Privacy of Shared Data
An algorithm for anonymous sharing of private data among parties is developed. Top-down refinement masks a given table to satisfy broad range of anonymity requirements without sacrificing significantly the usefulness...
Secure Data transfer in Cloud Storage Systems using Dynamic Tokens
Cloud computing is the delivery of computing as a service rather than a product. It provides shared resources, software, and information to computers and other devices over a network. The increasing network bandwidth...
Classification Methods in Data Mining:A Detailed Survey
Classification is a data mining (machine learning) technique and a model finding process that is used for assigning the data into different classes according to specific constrains. In other words we can say that clas...
A Framework for Administration Assault Recognition in Multivariate Connection Exploration
Denial of-Service (DoS) attacks are a basic danger to the Internet. It is extremely arduous to follow back the assailants for the reason that of memory less element of the web directing components. Subsequently, ther...
Technique to the Data Alignment for Accomplishing Accurate Annotation In Web Databases
Databases turn out to be web reachable all the way through HTML form-based search interfaces. The data units revisit from the essential database typically programmed into the result pages vigorously for human browsin...