SlideShare ist ein Scribd-Unternehmen logo
1 von 8
Downloaden Sie, um offline zu lesen
Innovative Systems Design and Engineering                                           www.iiste.org
ISSN 2222-1727 (Paper) ISSN 2222-2871 (Online)
Vol 2, No 5, 2011



 NCTUns Simulation model for IEEE 802.16j Mobile multi hop
            Relay (MMR) WIMAX networks
                              D.Satish Kumar (Corresponding author)
   Department of Computer science and Engineering, Anna University of Technology Coimbatore
                               Coimbatore-641402, Tamilnadu, India.
                     Tel: +919843723396, Email: satishcoimbatore@yahoo.co.in
                                          Dr.N.Nagarajan
     Department of Computer Science and Engineering, Coimbatore Institute of Engineering and
                                         Technology
                               Coimbatore-641109, Tamilnadu, India
                                   Email: swekalnag@gmail.com

Abstract
IEEE 802.16j Mobile multi hop relay (MMR) network was approved in the year 2009, by the IEEE
802.16 working committee. In IEEE 802.16j Relay station with same capacity as that of Base station is
used to extend the coverage area of base station or used to increase the Throughput capacity of base
station.
In this paper we have given a simulation model for IEEE 802.16j MMR networks using the NCTUns -
6.0 network simulator. The simulation model can be used for carry out IEEE 802.16j WiMAX
simulations. The NCTUns network simulator is an open source simulator, and it used real time data to
carry out the simulation. NCTUns uses a distributed architecture to support remote and concurrent
simulations. The NCTUns has 8 components such as GUI, simulation engine, dispatcher, coordinator,
kernel level modification, User level demean, parallel simulations for carry out IEEE 802.16j MMR
network simulation.
Key-Words: - Relay modes, IEEE 802.16j, NCTUns-6.0, transparent mode, non-transparent mode, etc
1. Introduction
IEEE802.16 standard was authorized in year 1999. An amendment 802.16-e (mobile WIMAX also
called m-WIMAX) operates both in licensed and unlicensed band and was designed mainly to point to
multipoint access. WIMAX (Worldwide interoperability for micro wave access technology) will be the
most significant technology to date in making wireless access ubiquitous, as free spectrum is opened
up. WIMAX is designed to support emerging applications such as voice over IP (VOIP), media
streaming, multicast, broad cast service, online gaming etc IEEE 802.16-e Mobile WIMAX air
interface adopts Orthogonal frequency division multiple access (OFDMA) for improved multi-path
performance in non Loss of sight(NLOS). An amendment to the 802.16-e standard namely 802.16-j
specifying relay station(RS) and multi-hop relay base station(MR-BS) approved in year 2006 supports
Mobile multi-hop Relay networks.(MMR). It provides coverage extension to isolated area and
throughput enhancement by specifying relay stations. This system enables mobile stations to
communicate with a base station through intermediate relay station. A new scheme called as tunneling
introduced in IEEE 802.16j networks, which is designed specially to leverage the inherent notion of
aggregation in relay links. The base station would use the standard medium access control layer (MAC)
–a common interface that makes the networks interoperable to nearly instantaneously allocate uplink
and downlink bandwidth to subscribers according to their needs.
In IEEE 802.16j relay project, the RS adds MAC protocol to support multi-hop communication
between RS and also BS must support multiple RS.




                                                 74
Figure 1: NLOS in 802.16j
The above figure 1 shows the NLOS (non Loss of sight) in IEEE 892.16 networks.
2.   IEEE 802.16j Standard
Multi hop wireless Networks such as adhoc networks, sensor networks wireless mesh networks and
relay based networks, have different characterizes, mobility rates power constrains scale form factor
etc. Relay based networks are subject of interest at present due to small form factor and low cost relays.
In this network relays are used to extend coverage of BS and increase the capacity of wireless systems.
IEEE 802.16j (WIMAX mobile relay network) is a multi hop relay based network, provides broad band
wireless IP to fixed and mobile terminal. Here relays are used to fill holes enhance coverage and data
rate and also it operates in AF or DF. We have referred several papers and web sites solve hand over
issues in IEEE 802.16j networks. To meet the paper length limitation, we listed below.
The IEEE 802.16 standard is Wireless Metropolitan area network (WMAN) technology. It supports
real time applications such as voice and video and non real time applications such as large file
transfer.In 802.16 four types of services are used
(1)Unsolicited grand service (2) Real time Polling service (3) non real time polling service(3) Best
effort service .
The IEEE 802.16j provides increased coverage and capacity enhancement by using multi hop
techniques and it address coverage hole problem. Traffic aggregation is done by multi hop path. It is
backward compatible with 802.16e base stations. As IEEE 802.16j operates in two modes, transparent
mode and non transparent mode and it is given in table 1.
IEEE 802.16j standard defines two types of relay station (RS) modes, transparent mode and non
transparent mode. The RS uses centralized or distributed scheduling based on particular mode.
In transparent mode, RS are used to facilitate capacity increase within the base station (BS). It is used
where Mobile station (MS) signal is affected by signal fading and interference level etc. when it moves
to non line of sight (NLOS). It operates only in centralized mode, as all the scheduling of nodes takes
place in BS. The number of hops is limited to 2 only as RS operated within the coverage area of base
station. Relays used here are of lower complexity when compared to non transparent mode. In this
mode relays do not transmit frame header information. In Non transparent mode, relays are used to
provide increase coverage area of BS. It operates in centralized or distributed mode. It uses topologies
larger than two hops, and uses different level of complexity.
3.   Relay Transmission schemes
Three types of transmission schemes are used (1) Amplify and forward (AF) (2) Selective decode and
forward (DCF) (3) demodulation and forward (DMF). In AF scheme the signal is processed and
undergoes amplification and is then passed over to the mobile station. This scheme has simple
operation and very short delay and also amplifies noise. No cyclic redundancy check (CRC) technique
is performed in this scheme, as it amplifies noise it is not used in practice. In DCF scheme decoding of
received signal and cyclic redundancy check (CRC) is performed to check for errors. This scheme has
long processing delay. In DMF scheme demodulation and modulation is performed on received signal
without decoding. This scheme is simple and processing delay is simple.
4.   Hand Over Process.
The hard hand over mechanism uses the principle of break before make. This is the MS will break the
connection with the original BS before making a new connection with another BS. Although it may
lower the handover quality.
                                               TABLE 1



                                                   75
S.   Transparent Mode        Non       Transparent
                           N                            Mode
                           o
                           1.   Centralized             Centralized           or
                                scheduling     - as     Distributed scheduling-
                                scheduling      done    as scheduling done in
                                only in BS              BS or RS
                           2.   Use CID based           Use Tunnel based or
                                forwarding scheme       CID based forwarding
                                                        scheme
                           3.   Use only 2 hops         Use 2 or more Hops
                           4.   Does not provide        Provides BS coverage
                                coverage extension      extension.
                           5.   Low Relay station       High Relay station cost.
                                cost.




                                Figure 2: The hard handover mechanism.


When the MS moves from BS1 to BS2, it has to disconnect the original connection with BS1 before it
can make a new connection with BS2.




                                  Figure 3: MS communicate with BS
The above figure 3 shows the topology for the MS to communicate directly with BS.
The Hand over process is composed of several phases: network topology advertisement, Mobile station
scanning, cell Reselection, Hand over decision and initiation, network reentry (ranging, reselection re-
registration), and normal operation. The criteria for Hand over decision and initiation is , channel
quality indicators such as CINR(Carrier to interface and noise Ration) or the signal strength can be
exchanged and Qos is characterized by service level prediction of MS and BS. Other criteria such as
bit error rate (BER0, packet delay/jitter, service pricing, MS velocity, Ms location can also be used.
The Hand over stages are.
Stage1: The MS collects information about BSs in the neighborhood.
Stage2: While scanning MS seeks for suitable BS that is added in the diversity set.
Stage3: Two types of report are send by MS, event triggered report and periodic reporting.
In event triggered report Ms send reports after each measurement of Relative delay, round trip delay,
receive signal strength report and CINR, but in periodic reporting reports are send at periodic intervals.
Stage4: Cell Reselection



                                                   76
Stage 5; MS Hand over is initialized based on the comparison of signal level of the current BS and new
BS.
Stage 6; MS Network Re-entry consist of three stages: ranging (obtaining information about uplink
channel), Re-authorization and Re-registration.
Stage 7: MS Normal operation;
5.   Thresholds in MDHO and FBSS.
Two thresholds are defined in MDHO and FBSS hand over, add threshold and delete threshold. Add
Threshold defines absolute signal level for adding of the BS into the diversity set. Delete threshold for
deleting a BS from the diversity set. These threshold values are updated in the diversity set, and
updating process is same for MDHO and FBSS.
6.   IEEE 802.16j Frame structure.
 In 802.16j frame structure frame is divided in to two sub frames, downlink sub frame and uplink sub
frame. These sub frames are divided in two zones called as DL/UL access zone and DL transparent
zone /UL relay zone.[9],[10] These frames have two different structure, transparent mode frame
structure and non transparent mode frame structure.
7.   Mechanisms to update BS.
Updating of BS is done the two mechanisms, Hand over MAC management method and Fast BS
selection mechanism. The former method uses five messages and later uses fast feedback channel for
updating of BS.
8.   OFDMA.
WIMAX systems use OFDM for multipath and non line of sight conditions. 802.16j supports scalable
OFDMA which support terminal mobility and multiple accesses.
OFDMA parameters
1.   FFT size= 128,512,1024,2048
2.   Channel bandwidth(MHz)=1.25, 5,10,20
3.   Subcarrier frequency (kHz)spacing:10.94
4.   Useful symbol period:=91.4(micr0 sec)
5.   Grand time=1/32, 1/16, 1/8, 1/4.
The 802.16j standard builds on the principles of
OFDM by adopting a Scalable OFDMA-based PHY layer
(SOFDMA). SOFDMA supports a wide range of operating bandwidths to flexibly address the need for
various spectrum allocation and application requirements. When the operating bandwidth increases, the
FFT size is also increased to maintain a fixed subcarrier frequency spacing of 10.94 kHz.
9.   Tunneling and aggregation.
A tunnel connection is a unidirectional connection between the BS and RS established to aggregate
management and transport traffic. To identify the tunnel service flow identifier (SFID), tunnel
connection identifier (T-CID), management tunnel identifier (MT-CID) is used. Transport and
management tunneling mechanism is used in IEEE 802.16j networks.
Three different management tunnels is used, basic management tunnel, primary management tunnel,
secondary management tunnel[7]
Two different MPDU construction methods namely encapsulation mode and burst mode used in relay
system.
10. IEEE 802.16j MAC Layer.
The MAC layer uses two different forwarding schemes, tunnel based scheme and CID based scheme.
In tunnel based scheme the tunnel adds relay MAC header to a packet and it is removed at the RS.
Centralized or distributed scheduling modes are used in this scheme. The forwarding is done based on
the CID of the tunnel. In CID based scheme packets are forwarded based on the CID of the destination.
This scheme uses centralized or distributed scheduling. RS has the knowledge of qos requirements and



                                                   77
take their own seduling decisions in distributed scheduling[6],[7]. But in centralized scheduling the BS
informs to RS about relay link channel characterizes.
The tunnel based scheme provides support for tunnels characterized by the unique CID, two specific
end points and QoS parameters. The CID based scheme has no tunnels and does not support traffic
aggregation; it only supports legacy management and transport connections.
MAC layer provides routing and path management. As 802.16j network comprises multi hop paths
between the BS and MS., the standard defines two approaches for path management, embedded and
explicit path management. His layer also defines network entry.
The MAC layer handover of IEEE 802.16j includes the following phases: 1) network topology
acquisition before handover, which includes network topology advertisement, and MS scanning or
association of neighbor BSs. 2) handover execution phase, which mainly includes cell reselection,
handover initialization and handshake process, connection release, and target network reentry.
11.      Simulation Model
The transparent mode network consists of three types of nodes : the transparent Mobile relay base
station(TMR_BS), Transparent –Relay station(T_RS) and Trasparent –Mobile station(T-MS).. The T-
RS simply forwards the incoming packet. The basic siumulation parameters that are assumed while
performing the simulation is shown below. Here the frequencu used us 2300MHz, some of the other
parameters are.
Host channel parameters.
1.       Bandwidth= 50 Mbps
2.       Bit error rate=0
3.       Propagation delay=0.0 Micro seconds.
4.       IP address = 1.0.1.1
5.       Net mask=255.255.255.0
6.       ARP protocol.
802.16j Base station channel parameters.
1.       Fading variance=10
2.       Average building height=10m
3.       Average Building distance=80m
4.       Street width=30m
5.       Pass loss exponent=2.0
6.       Shadowing standard deviation=4.0
7.       Close in reference distance(m)=1.0
8.       System loss=1.0
9.       Antenna height=30m
10.      Ricean factor (k)=10.0 db
OFDMA parameters for BS
1.       Channel ID=5
2.       Frequency=2300 MHz
3.       Transmission power = 35 dbm
4.       Receive sensitivity=-99dbm
802.16j Mobile station channel parameters
1.       Frequency=2300 MHz
2.       Transmission power = 35 dbm
3.       Receive sensitivity=-99dbm
4.       Speed= 20 m/sec
An IEEE 802.16j mobile WIMAX relay network is constructed using network topology of NCTUns as
shown in the below figure. Here GUI tool nctunsclient is started to use the GUI platform for
performing simulations. Here coordinator and dispatcher programs are used to do emulation studies.
We have shown how to carry out transparent mode IEEE 802.16j network simulations. A single host is
connected with two 802.16j base stations through three bridges and three links as shown in the figure.
Each Link band width is set as 50 Mbps. The BS1 and MS form a subnet 1, BS2 form subnet 2. We

                                                  78
have simulated the transparent mode IEEE 802.16j network, here the channel mode parameters are set
and the respective model is chosen . We have used TWO ray ground channel model, other empirical
channel parameters can also be used to further examine the system.




                             Figure 4: Transparent mode simulation model




                       Figure 5: IEEE 802.16j Hard hand over simulation model
 A single mobile station is connected to the base station 1(BS1) through wireless subnet. The speed of
the MS is set as 20 m/sec[2], thus the MS will be moving along the horizontal path from point (x1y1)
to point (x2,Y2) as shown in the figure. Here point (x1, Y1) is within the base coverage region of
BS1, and point (x2.Y2) is in the base coverage region of BS2.
The 802.16j base station 1(BS1) is connected to the host and mobile station as shown above




                                   Figure 6: Base station 1 IP address
BS1 IP address for wired connection is set as 1.0.6.1 for wired connection to the link, and set as 1.0.7.1
for wireless connection to the MS. The node editor for 802.16j Base station is shown in the figure 8, it
consists of various modules like ARP , FIFO, Mac8023 OFDMA interface and physical layer modules,
the parameters of each module is set as shown above. The propagation channel mode can be set
ttheoretical by specifying the parameters for path loss or fading model. In empirical channel model it
defines 22 types of model. We have chosen empirical channel model.




                                                   79
Figure 7: IEEE 802.16j non transparent mode network




                                  Figure 8: IEEE 802.16j BS node editor
Then the simulation is executed using as shown in below figure, all the related files of simulation is
placed in the directory /usr/local/nctuns/bin/ as shown below, and all the log files are also placed in the
same directory .
11. Conclusions and Future Works
 As IEEE 802.16j network uses centralized or distributed scheduling, an efficient scheduling algorithm
that maximizes the network throughput and minimizes overhead must be designed for IEEE 802.16j
standard. We have shown how to conduct simulation using NCTUns an open source network simulator,
which supports IEEE 802.16j multihop relay WIMAX networks, as no other simulator is available in
the market to carry out simulations of IEEE 802.16j. NCTUns supports both transparent mode and non
transparent mode simulation. No other simulator is available in the market to carry out IEEE 802.16j
WIMAX simulations as OPNET and QUALNET supports only IEEE 802.16e WIMAX. This is the
only simulator available to carry out simulations in IEEE 802.16j WIMAX networks
12. References
“IEEE Standard for Local and Metropolitan Area Networks: Part 16: Air Interface for Broadband
Wireless Access Systems, IEEE Std 802.16- 2009”, May 2009, 2094 pp.
C. So-In, R. Jain, and A. Al-Tamimi, “Scheduling in IEEE 802.16e WiMAX Networks: Key
issues and a survey,” IEEE J. Select. Areas Commun., vol. 27, no. 2, pp. 156–171, Feb. 2009.
C. So-In, R. Jain, and A. Al-Tamimi, “Capacity evaluation for IEEE 802.16e MobileWiMAX,” J.
Comput. Syst., Networks, and Commun., vol. 2010, Apr. 2010.
K.Wongthavarawat and A. Ganz, “IEEE 802.16 based last mile broadband wireless military
networks with quality of service support,” in Proc. Military Communications Conf., 2003, vol. 2,
pp. 779–784.
A. Sayenko, O. Alanen, and T. Hamalainen, “Scheduling solution for the IEEE 802.16 base
station,” Int. J. Comp. and Telecommun. Netw., vol. 52, pp. 96–115, Jan. 2008.
R. Jain, C. So-In, and A. Al-Tamimi, “System level modeling of IEEE 802.16e Mobile WiMAX
networks: Key issues,” IEEE Wireless Comm. Mag., vol. 15, no. 5, pp. 73–79, Oct. 2008.


                                                   80
A. Ghosh et al., “Broadband Wireless Access with WiMAX /802.16: Current Performance
Benchmarks and Future Potential,” IEEE Commun. Mag., vol. 43, Feb. 2005, pp. 129–36.
IEEE 802.16-2004, “Local and Metropolitan Networks — Part 16: Air Interface for Fixed
Broadband Wireless Access Systems,” 2004.
IEEE 802.16e-2005, “Local and Metropolitan Networks — Part 16: Air Interface for Fixed and
Mobile Broadband Wireless Access Systems, Amendment 2: Physical and Medium Access
Control Layers for Combined Fixed and Mobile Operation in Licensed Bands and Corrigendum
1,” 2006.
Q. Liu, X. Wang and G. B. Giannakis, “A Cross-Layer Scheduling Algorithm with QoS Support
in Wireless Networks,” IEEE Trans. Vehic. Tech., vol. 55, no. 3, May 2006, pp. 839–46.
 J. He, K. Guild, K. Yang, and H. Chen, “Modeling contention based bandwidth request scheme
for IEEE 802.16 networks,” IEEE Commun. Lett., vol. 11, no. 8, pp. 698–700, Aug. 2007.
H. L. Vu, S. Chan, and L. L. H. Andrew, “Performance analysis of best-effort service in saturated
IEEE 802.16 networks,” IEEE Trans. Veh. Technol., vol. 59, no. 1, pp. 460–472, Jan. 2010.
Y. P. Fallah, F. Agharebparast, M. R. Minhas, H. M. Alnuweiri, and C. M. Leung, “Analytical
modeling of contention-based bandwidth request mechanism in IEEE 802.16 wireless networks,”
IEEE Trans. Veh. Technol., vol. 57, no. 5, pp. 3094–3107, Sep. 2008.
C. Cicconetti, A. Erta, L. Lenzini, and E. Mingozzi, “Performance evaluation of the IEEE
802.16MAC for QoS support,” IEEE Trans. Mobile Comput., vol. 6, no. 1, pp. 26–38, Jan. 2007.
Q. Ni et al., “Investigation of bandwidth request mechanisms under point-to-multipoint mode of
WiMAX networks,” IEEE Commun. Mag., vol. 45, no. 5, pp. 132–138, May 2007.
C. Mohanram, S. Bhashyam, “Joint subcarrier and power allocation in channel-aware queue-
aware scheduling for multiuser ofdm”, IEEE Transactions on Wireless Communications 6 (9)
(2007) 3208– 3213.
G. Kulkarni, S. Adlakha, M. Srivastava, “Subcarrier allocation and bit loading algorithms for
OFDMA based wireless networks”, IEEE Transactions on Mobile Computing 4 (6) (2005) 652–
662.
 K.D. Lee, V.C.M. Leung, “Fair allocation of subcarrier and power in an OFDMA wireless mesh
network”, IEEE Journal on Selected Areas in Communications 24 (11) (2006) 2051–2060.
P. Thulasiraman, X. Shen, “Interference aware subcarrier assignment for throughput maximization
in OFDMA wireless relay mesh networks”, in: Proceedings of IEEE ICC, 2009, pp. 1–6.
P. Li, M. Rong, Y. Xue, E. Schulz, “Reuse one frequency planning for two-hop cellular system
with fixed relay nodes”, in: Proc. IEEE WCNC’07, Hong Kong, China, March 2007.
IEEE 802.16j-06/015, “Harmonized contribution on 802.16j (mobile multihop relay) usage
models”, 2006.
Sik Choi, Gyung-Ho Hwang, Taesoo Kwon, Ae-Ri Lim, andDong-Ho Cho, “Fast Handover
Scheme for Real-Time DownlinkServices in IEEE 802.16e BWA System”, Vehicular Technology
Conference (2005 IEEE 61st), June 2005, Volume 3, pp. 2028-2032.
I. Akyildz, J. Xie, and S. Mohanty, “A Survey of Mobility Management in Next Generation All IP
Based Wireless Systems,” IEEE Wireless Commun., vol. 11, no. 4, 2004,pp. 16–27.
R. Pabst et al., “Relay-based deployment concepts for wireless and mobile broadband radio”,
IEEE Commun. Mag. 42 (9) (2004) 80–89.
 J. Cai, X. Shen, J.W. Mark, A.S. Alfa, “Semi-distributed user relaying algorithm for amplify-and-
forward wireless relay networks”, IEEE Trans. Wireless Commun. 7 (4) (2008) 1348–1357.
Genc V., Murphy S., Yu Y. and Murphy J., “IEEE 802.16J relay-based wireless access networks:
an overview [recent advances and evolution of WLAN and WMAN standards],” IEEE Wireless
Communications, Vol. 15, Issue 5, pp. 56 – 63, Oct. 2008.
C. Cicconetti, L. Lenzini, E. Mingozzi and C. Eklund, “Quality of service support in IEEE 802.16
networks,” IEEE Network, Vol. 20, pp. 50 – 55, Mar. 2006.


                                               81

Weitere ähnliche Inhalte

Was ist angesagt? (18)

Gsm protl
Gsm protlGsm protl
Gsm protl
 
Gsm signaling
Gsm signalingGsm signaling
Gsm signaling
 
16 6 feb17 13473 27587-1-rvfinal(edit)
16 6 feb17 13473 27587-1-rvfinal(edit)16 6 feb17 13473 27587-1-rvfinal(edit)
16 6 feb17 13473 27587-1-rvfinal(edit)
 
SS7 Network Technology
SS7 Network TechnologySS7 Network Technology
SS7 Network Technology
 
Multiplexing,LAN Cabling,Routers,Core and Distribution Networks
Multiplexing,LAN Cabling,Routers,Core and Distribution NetworksMultiplexing,LAN Cabling,Routers,Core and Distribution Networks
Multiplexing,LAN Cabling,Routers,Core and Distribution Networks
 
Wireless Networks
Wireless NetworksWireless Networks
Wireless Networks
 
Cellular Networks
Cellular NetworksCellular Networks
Cellular Networks
 
SS7
SS7SS7
SS7
 
Computer Communication Networks-Wireless LAN
Computer Communication Networks-Wireless LANComputer Communication Networks-Wireless LAN
Computer Communication Networks-Wireless LAN
 
GSM Air Interface
GSM Air Interface GSM Air Interface
GSM Air Interface
 
Gsm signaling protocol
Gsm signaling protocolGsm signaling protocol
Gsm signaling protocol
 
It2402 mobile communication unit2
It2402 mobile communication unit2It2402 mobile communication unit2
It2402 mobile communication unit2
 
Presentation of the IEEE 802.11a MAC Layer
Presentation of the IEEE 802.11a MAC LayerPresentation of the IEEE 802.11a MAC Layer
Presentation of the IEEE 802.11a MAC Layer
 
CS8601 MOBILE COMPUTING
CS8601	MOBILE COMPUTING CS8601	MOBILE COMPUTING
CS8601 MOBILE COMPUTING
 
Wireless Networks
Wireless NetworksWireless Networks
Wireless Networks
 
Ew31992997
Ew31992997Ew31992997
Ew31992997
 
Lecture 7n
Lecture 7nLecture 7n
Lecture 7n
 
Wc nots final unit new 7
Wc nots final unit new  7Wc nots final unit new  7
Wc nots final unit new 7
 

Andere mochten auch

QC of CT using Catphan 600
QC of CT using Catphan 600QC of CT using Catphan 600
QC of CT using Catphan 600Asim Gilani
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaAlexander Decker
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifhamAlexander Decker
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceAlexander Decker
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dAlexander Decker
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksAlexander Decker
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesAlexander Decker
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inAlexander Decker
 
Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Alexander Decker
 

Andere mochten auch (9)

QC of CT using Catphan 600
QC of CT using Catphan 600QC of CT using Catphan 600
QC of CT using Catphan 600
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibia
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifham
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistance
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized d
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banks
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websites
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale in
 
Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...
 

Ähnlich wie 7.satish kumar 74-81

Handover Behaviour of Transparent Relay in WiMAX Networks
Handover Behaviour of Transparent Relay in WiMAX NetworksHandover Behaviour of Transparent Relay in WiMAX Networks
Handover Behaviour of Transparent Relay in WiMAX NetworksIDES Editor
 
10 satishkumar final_paper--105--113
10 satishkumar final_paper--105--11310 satishkumar final_paper--105--113
10 satishkumar final_paper--105--113Alexander Decker
 
Performance Improvement of IEEE 802.22 WRAN Physical Layer
Performance Improvement of IEEE 802.22 WRAN Physical LayerPerformance Improvement of IEEE 802.22 WRAN Physical Layer
Performance Improvement of IEEE 802.22 WRAN Physical LayerIOSR Journals
 
Performance Improvement of IEEE 802.22 WRAN Physical Layer
Performance Improvement of IEEE 802.22 WRAN Physical LayerPerformance Improvement of IEEE 802.22 WRAN Physical Layer
Performance Improvement of IEEE 802.22 WRAN Physical LayerIOSR Journals
 
Migrating from dynamic multipoint vpn phase 2 to phase 3
Migrating from dynamic multipoint vpn phase 2 to phase 3Migrating from dynamic multipoint vpn phase 2 to phase 3
Migrating from dynamic multipoint vpn phase 2 to phase 3vijayd2015
 
Analysis of WiMAX Physical Layer Using Spatial Multiplexing Under Different F...
Analysis of WiMAX Physical Layer Using Spatial Multiplexing Under Different F...Analysis of WiMAX Physical Layer Using Spatial Multiplexing Under Different F...
Analysis of WiMAX Physical Layer Using Spatial Multiplexing Under Different F...CSCJournals
 
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...acijjournal
 
ZigBee Technology for WPAN
ZigBee Technology for WPANZigBee Technology for WPAN
ZigBee Technology for WPANtheijes
 
Wireless Mesh Network
Wireless Mesh NetworkWireless Mesh Network
Wireless Mesh Networksheenammiddha
 
Iaetsd ber performance of cdma, wcdma, ieee802.11g in awgn
Iaetsd ber performance of cdma, wcdma, ieee802.11g in awgnIaetsd ber performance of cdma, wcdma, ieee802.11g in awgn
Iaetsd ber performance of cdma, wcdma, ieee802.11g in awgnIaetsd Iaetsd
 
Performance Analysis of WiMAX Networks with Relay Station
Performance Analysis of WiMAX Networks with Relay StationPerformance Analysis of WiMAX Networks with Relay Station
Performance Analysis of WiMAX Networks with Relay Stationidescitation
 
Direct_studies_report13
Direct_studies_report13Direct_studies_report13
Direct_studies_report13Farhad Gholami
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
IRJET - Analytical Study of Hierarchical Routing Protocols for Virtual Wi...
IRJET -  	  Analytical Study of Hierarchical Routing Protocols for Virtual Wi...IRJET -  	  Analytical Study of Hierarchical Routing Protocols for Virtual Wi...
IRJET - Analytical Study of Hierarchical Routing Protocols for Virtual Wi...IRJET Journal
 
Wireless LANs(IEEE802.11) Architecture
Wireless LANs(IEEE802.11) Architecture Wireless LANs(IEEE802.11) Architecture
Wireless LANs(IEEE802.11) Architecture Raj vardhan
 
Experimental Analysis of an Energy-Efficient WSN
Experimental Analysis of an Energy-Efficient WSNExperimental Analysis of an Energy-Efficient WSN
Experimental Analysis of an Energy-Efficient WSNidescitation
 
Coverage of WCDMA Network Using Different Modulation Techniques with Soft and...
Coverage of WCDMA Network Using Different Modulation Techniques with Soft and...Coverage of WCDMA Network Using Different Modulation Techniques with Soft and...
Coverage of WCDMA Network Using Different Modulation Techniques with Soft and...ijcnac
 

Ähnlich wie 7.satish kumar 74-81 (20)

Handover Behaviour of Transparent Relay in WiMAX Networks
Handover Behaviour of Transparent Relay in WiMAX NetworksHandover Behaviour of Transparent Relay in WiMAX Networks
Handover Behaviour of Transparent Relay in WiMAX Networks
 
10 satishkumar final_paper--105--113
10 satishkumar final_paper--105--11310 satishkumar final_paper--105--113
10 satishkumar final_paper--105--113
 
Performance Improvement of IEEE 802.22 WRAN Physical Layer
Performance Improvement of IEEE 802.22 WRAN Physical LayerPerformance Improvement of IEEE 802.22 WRAN Physical Layer
Performance Improvement of IEEE 802.22 WRAN Physical Layer
 
Performance Improvement of IEEE 802.22 WRAN Physical Layer
Performance Improvement of IEEE 802.22 WRAN Physical LayerPerformance Improvement of IEEE 802.22 WRAN Physical Layer
Performance Improvement of IEEE 802.22 WRAN Physical Layer
 
Migrating from dynamic multipoint vpn phase 2 to phase 3
Migrating from dynamic multipoint vpn phase 2 to phase 3Migrating from dynamic multipoint vpn phase 2 to phase 3
Migrating from dynamic multipoint vpn phase 2 to phase 3
 
Analysis of WiMAX Physical Layer Using Spatial Multiplexing Under Different F...
Analysis of WiMAX Physical Layer Using Spatial Multiplexing Under Different F...Analysis of WiMAX Physical Layer Using Spatial Multiplexing Under Different F...
Analysis of WiMAX Physical Layer Using Spatial Multiplexing Under Different F...
 
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
 
ZigBee Technology for WPAN
ZigBee Technology for WPANZigBee Technology for WPAN
ZigBee Technology for WPAN
 
Wireless Mesh Network
Wireless Mesh NetworkWireless Mesh Network
Wireless Mesh Network
 
Iaetsd ber performance of cdma, wcdma, ieee802.11g in awgn
Iaetsd ber performance of cdma, wcdma, ieee802.11g in awgnIaetsd ber performance of cdma, wcdma, ieee802.11g in awgn
Iaetsd ber performance of cdma, wcdma, ieee802.11g in awgn
 
Performance Analysis of WiMAX Networks with Relay Station
Performance Analysis of WiMAX Networks with Relay StationPerformance Analysis of WiMAX Networks with Relay Station
Performance Analysis of WiMAX Networks with Relay Station
 
Ijebea14 238
Ijebea14 238Ijebea14 238
Ijebea14 238
 
Direct_studies_report13
Direct_studies_report13Direct_studies_report13
Direct_studies_report13
 
Final PPT.pptx
Final PPT.pptxFinal PPT.pptx
Final PPT.pptx
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
IRJET - Analytical Study of Hierarchical Routing Protocols for Virtual Wi...
IRJET -  	  Analytical Study of Hierarchical Routing Protocols for Virtual Wi...IRJET -  	  Analytical Study of Hierarchical Routing Protocols for Virtual Wi...
IRJET - Analytical Study of Hierarchical Routing Protocols for Virtual Wi...
 
Wireless LANs(IEEE802.11) Architecture
Wireless LANs(IEEE802.11) Architecture Wireless LANs(IEEE802.11) Architecture
Wireless LANs(IEEE802.11) Architecture
 
Experimental Analysis of an Energy-Efficient WSN
Experimental Analysis of an Energy-Efficient WSNExperimental Analysis of an Energy-Efficient WSN
Experimental Analysis of an Energy-Efficient WSN
 
Coverage of WCDMA Network Using Different Modulation Techniques with Soft and...
Coverage of WCDMA Network Using Different Modulation Techniques with Soft and...Coverage of WCDMA Network Using Different Modulation Techniques with Soft and...
Coverage of WCDMA Network Using Different Modulation Techniques with Soft and...
 
Ft2510561062
Ft2510561062Ft2510561062
Ft2510561062
 

Mehr von Alexander Decker

A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenAlexander Decker
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksAlexander Decker
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget forAlexander Decker
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabAlexander Decker
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...Alexander Decker
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalAlexander Decker
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesAlexander Decker
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbAlexander Decker
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloudAlexander Decker
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveragedAlexander Decker
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenyaAlexander Decker
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health ofAlexander Decker
 
A study to evaluate the attitude of faculty members of public universities of...
A study to evaluate the attitude of faculty members of public universities of...A study to evaluate the attitude of faculty members of public universities of...
A study to evaluate the attitude of faculty members of public universities of...Alexander Decker
 
A study to assess the knowledge regarding prevention of pneumonia among middl...
A study to assess the knowledge regarding prevention of pneumonia among middl...A study to assess the knowledge regarding prevention of pneumonia among middl...
A study to assess the knowledge regarding prevention of pneumonia among middl...Alexander Decker
 
A study regarding analyzing recessionary impact on fundamental determinants o...
A study regarding analyzing recessionary impact on fundamental determinants o...A study regarding analyzing recessionary impact on fundamental determinants o...
A study regarding analyzing recessionary impact on fundamental determinants o...Alexander Decker
 
A study on would be urban-migrants’ needs and necessities in rural bangladesh...
A study on would be urban-migrants’ needs and necessities in rural bangladesh...A study on would be urban-migrants’ needs and necessities in rural bangladesh...
A study on would be urban-migrants’ needs and necessities in rural bangladesh...Alexander Decker
 
A study on the evaluation of scientific creativity among science
A study on the evaluation of scientific creativity among scienceA study on the evaluation of scientific creativity among science
A study on the evaluation of scientific creativity among scienceAlexander Decker
 
A study on the antioxidant defense system in breast cancer patients.
A study on the antioxidant defense system in breast cancer patients.A study on the antioxidant defense system in breast cancer patients.
A study on the antioxidant defense system in breast cancer patients.Alexander Decker
 
A study on the dimensions of
A study on the dimensions ofA study on the dimensions of
A study on the dimensions ofAlexander Decker
 
A study on knowledge and practice of post menopausal women
A study on knowledge and practice of post menopausal womenA study on knowledge and practice of post menopausal women
A study on knowledge and practice of post menopausal womenAlexander Decker
 

Mehr von Alexander Decker (20)

A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school children
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banks
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget for
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjab
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incremental
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniques
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo db
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloud
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveraged
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenya
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health of
 
A study to evaluate the attitude of faculty members of public universities of...
A study to evaluate the attitude of faculty members of public universities of...A study to evaluate the attitude of faculty members of public universities of...
A study to evaluate the attitude of faculty members of public universities of...
 
A study to assess the knowledge regarding prevention of pneumonia among middl...
A study to assess the knowledge regarding prevention of pneumonia among middl...A study to assess the knowledge regarding prevention of pneumonia among middl...
A study to assess the knowledge regarding prevention of pneumonia among middl...
 
A study regarding analyzing recessionary impact on fundamental determinants o...
A study regarding analyzing recessionary impact on fundamental determinants o...A study regarding analyzing recessionary impact on fundamental determinants o...
A study regarding analyzing recessionary impact on fundamental determinants o...
 
A study on would be urban-migrants’ needs and necessities in rural bangladesh...
A study on would be urban-migrants’ needs and necessities in rural bangladesh...A study on would be urban-migrants’ needs and necessities in rural bangladesh...
A study on would be urban-migrants’ needs and necessities in rural bangladesh...
 
A study on the evaluation of scientific creativity among science
A study on the evaluation of scientific creativity among scienceA study on the evaluation of scientific creativity among science
A study on the evaluation of scientific creativity among science
 
A study on the antioxidant defense system in breast cancer patients.
A study on the antioxidant defense system in breast cancer patients.A study on the antioxidant defense system in breast cancer patients.
A study on the antioxidant defense system in breast cancer patients.
 
A study on the dimensions of
A study on the dimensions ofA study on the dimensions of
A study on the dimensions of
 
A study on knowledge and practice of post menopausal women
A study on knowledge and practice of post menopausal womenA study on knowledge and practice of post menopausal women
A study on knowledge and practice of post menopausal women
 

Kürzlich hochgeladen

Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 

Kürzlich hochgeladen (20)

Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 

7.satish kumar 74-81

  • 1. Innovative Systems Design and Engineering www.iiste.org ISSN 2222-1727 (Paper) ISSN 2222-2871 (Online) Vol 2, No 5, 2011 NCTUns Simulation model for IEEE 802.16j Mobile multi hop Relay (MMR) WIMAX networks D.Satish Kumar (Corresponding author) Department of Computer science and Engineering, Anna University of Technology Coimbatore Coimbatore-641402, Tamilnadu, India. Tel: +919843723396, Email: satishcoimbatore@yahoo.co.in Dr.N.Nagarajan Department of Computer Science and Engineering, Coimbatore Institute of Engineering and Technology Coimbatore-641109, Tamilnadu, India Email: swekalnag@gmail.com Abstract IEEE 802.16j Mobile multi hop relay (MMR) network was approved in the year 2009, by the IEEE 802.16 working committee. In IEEE 802.16j Relay station with same capacity as that of Base station is used to extend the coverage area of base station or used to increase the Throughput capacity of base station. In this paper we have given a simulation model for IEEE 802.16j MMR networks using the NCTUns - 6.0 network simulator. The simulation model can be used for carry out IEEE 802.16j WiMAX simulations. The NCTUns network simulator is an open source simulator, and it used real time data to carry out the simulation. NCTUns uses a distributed architecture to support remote and concurrent simulations. The NCTUns has 8 components such as GUI, simulation engine, dispatcher, coordinator, kernel level modification, User level demean, parallel simulations for carry out IEEE 802.16j MMR network simulation. Key-Words: - Relay modes, IEEE 802.16j, NCTUns-6.0, transparent mode, non-transparent mode, etc 1. Introduction IEEE802.16 standard was authorized in year 1999. An amendment 802.16-e (mobile WIMAX also called m-WIMAX) operates both in licensed and unlicensed band and was designed mainly to point to multipoint access. WIMAX (Worldwide interoperability for micro wave access technology) will be the most significant technology to date in making wireless access ubiquitous, as free spectrum is opened up. WIMAX is designed to support emerging applications such as voice over IP (VOIP), media streaming, multicast, broad cast service, online gaming etc IEEE 802.16-e Mobile WIMAX air interface adopts Orthogonal frequency division multiple access (OFDMA) for improved multi-path performance in non Loss of sight(NLOS). An amendment to the 802.16-e standard namely 802.16-j specifying relay station(RS) and multi-hop relay base station(MR-BS) approved in year 2006 supports Mobile multi-hop Relay networks.(MMR). It provides coverage extension to isolated area and throughput enhancement by specifying relay stations. This system enables mobile stations to communicate with a base station through intermediate relay station. A new scheme called as tunneling introduced in IEEE 802.16j networks, which is designed specially to leverage the inherent notion of aggregation in relay links. The base station would use the standard medium access control layer (MAC) –a common interface that makes the networks interoperable to nearly instantaneously allocate uplink and downlink bandwidth to subscribers according to their needs. In IEEE 802.16j relay project, the RS adds MAC protocol to support multi-hop communication between RS and also BS must support multiple RS. 74
  • 2. Figure 1: NLOS in 802.16j The above figure 1 shows the NLOS (non Loss of sight) in IEEE 892.16 networks. 2. IEEE 802.16j Standard Multi hop wireless Networks such as adhoc networks, sensor networks wireless mesh networks and relay based networks, have different characterizes, mobility rates power constrains scale form factor etc. Relay based networks are subject of interest at present due to small form factor and low cost relays. In this network relays are used to extend coverage of BS and increase the capacity of wireless systems. IEEE 802.16j (WIMAX mobile relay network) is a multi hop relay based network, provides broad band wireless IP to fixed and mobile terminal. Here relays are used to fill holes enhance coverage and data rate and also it operates in AF or DF. We have referred several papers and web sites solve hand over issues in IEEE 802.16j networks. To meet the paper length limitation, we listed below. The IEEE 802.16 standard is Wireless Metropolitan area network (WMAN) technology. It supports real time applications such as voice and video and non real time applications such as large file transfer.In 802.16 four types of services are used (1)Unsolicited grand service (2) Real time Polling service (3) non real time polling service(3) Best effort service . The IEEE 802.16j provides increased coverage and capacity enhancement by using multi hop techniques and it address coverage hole problem. Traffic aggregation is done by multi hop path. It is backward compatible with 802.16e base stations. As IEEE 802.16j operates in two modes, transparent mode and non transparent mode and it is given in table 1. IEEE 802.16j standard defines two types of relay station (RS) modes, transparent mode and non transparent mode. The RS uses centralized or distributed scheduling based on particular mode. In transparent mode, RS are used to facilitate capacity increase within the base station (BS). It is used where Mobile station (MS) signal is affected by signal fading and interference level etc. when it moves to non line of sight (NLOS). It operates only in centralized mode, as all the scheduling of nodes takes place in BS. The number of hops is limited to 2 only as RS operated within the coverage area of base station. Relays used here are of lower complexity when compared to non transparent mode. In this mode relays do not transmit frame header information. In Non transparent mode, relays are used to provide increase coverage area of BS. It operates in centralized or distributed mode. It uses topologies larger than two hops, and uses different level of complexity. 3. Relay Transmission schemes Three types of transmission schemes are used (1) Amplify and forward (AF) (2) Selective decode and forward (DCF) (3) demodulation and forward (DMF). In AF scheme the signal is processed and undergoes amplification and is then passed over to the mobile station. This scheme has simple operation and very short delay and also amplifies noise. No cyclic redundancy check (CRC) technique is performed in this scheme, as it amplifies noise it is not used in practice. In DCF scheme decoding of received signal and cyclic redundancy check (CRC) is performed to check for errors. This scheme has long processing delay. In DMF scheme demodulation and modulation is performed on received signal without decoding. This scheme is simple and processing delay is simple. 4. Hand Over Process. The hard hand over mechanism uses the principle of break before make. This is the MS will break the connection with the original BS before making a new connection with another BS. Although it may lower the handover quality. TABLE 1 75
  • 3. S. Transparent Mode Non Transparent N Mode o 1. Centralized Centralized or scheduling - as Distributed scheduling- scheduling done as scheduling done in only in BS BS or RS 2. Use CID based Use Tunnel based or forwarding scheme CID based forwarding scheme 3. Use only 2 hops Use 2 or more Hops 4. Does not provide Provides BS coverage coverage extension extension. 5. Low Relay station High Relay station cost. cost. Figure 2: The hard handover mechanism. When the MS moves from BS1 to BS2, it has to disconnect the original connection with BS1 before it can make a new connection with BS2. Figure 3: MS communicate with BS The above figure 3 shows the topology for the MS to communicate directly with BS. The Hand over process is composed of several phases: network topology advertisement, Mobile station scanning, cell Reselection, Hand over decision and initiation, network reentry (ranging, reselection re- registration), and normal operation. The criteria for Hand over decision and initiation is , channel quality indicators such as CINR(Carrier to interface and noise Ration) or the signal strength can be exchanged and Qos is characterized by service level prediction of MS and BS. Other criteria such as bit error rate (BER0, packet delay/jitter, service pricing, MS velocity, Ms location can also be used. The Hand over stages are. Stage1: The MS collects information about BSs in the neighborhood. Stage2: While scanning MS seeks for suitable BS that is added in the diversity set. Stage3: Two types of report are send by MS, event triggered report and periodic reporting. In event triggered report Ms send reports after each measurement of Relative delay, round trip delay, receive signal strength report and CINR, but in periodic reporting reports are send at periodic intervals. Stage4: Cell Reselection 76
  • 4. Stage 5; MS Hand over is initialized based on the comparison of signal level of the current BS and new BS. Stage 6; MS Network Re-entry consist of three stages: ranging (obtaining information about uplink channel), Re-authorization and Re-registration. Stage 7: MS Normal operation; 5. Thresholds in MDHO and FBSS. Two thresholds are defined in MDHO and FBSS hand over, add threshold and delete threshold. Add Threshold defines absolute signal level for adding of the BS into the diversity set. Delete threshold for deleting a BS from the diversity set. These threshold values are updated in the diversity set, and updating process is same for MDHO and FBSS. 6. IEEE 802.16j Frame structure. In 802.16j frame structure frame is divided in to two sub frames, downlink sub frame and uplink sub frame. These sub frames are divided in two zones called as DL/UL access zone and DL transparent zone /UL relay zone.[9],[10] These frames have two different structure, transparent mode frame structure and non transparent mode frame structure. 7. Mechanisms to update BS. Updating of BS is done the two mechanisms, Hand over MAC management method and Fast BS selection mechanism. The former method uses five messages and later uses fast feedback channel for updating of BS. 8. OFDMA. WIMAX systems use OFDM for multipath and non line of sight conditions. 802.16j supports scalable OFDMA which support terminal mobility and multiple accesses. OFDMA parameters 1. FFT size= 128,512,1024,2048 2. Channel bandwidth(MHz)=1.25, 5,10,20 3. Subcarrier frequency (kHz)spacing:10.94 4. Useful symbol period:=91.4(micr0 sec) 5. Grand time=1/32, 1/16, 1/8, 1/4. The 802.16j standard builds on the principles of OFDM by adopting a Scalable OFDMA-based PHY layer (SOFDMA). SOFDMA supports a wide range of operating bandwidths to flexibly address the need for various spectrum allocation and application requirements. When the operating bandwidth increases, the FFT size is also increased to maintain a fixed subcarrier frequency spacing of 10.94 kHz. 9. Tunneling and aggregation. A tunnel connection is a unidirectional connection between the BS and RS established to aggregate management and transport traffic. To identify the tunnel service flow identifier (SFID), tunnel connection identifier (T-CID), management tunnel identifier (MT-CID) is used. Transport and management tunneling mechanism is used in IEEE 802.16j networks. Three different management tunnels is used, basic management tunnel, primary management tunnel, secondary management tunnel[7] Two different MPDU construction methods namely encapsulation mode and burst mode used in relay system. 10. IEEE 802.16j MAC Layer. The MAC layer uses two different forwarding schemes, tunnel based scheme and CID based scheme. In tunnel based scheme the tunnel adds relay MAC header to a packet and it is removed at the RS. Centralized or distributed scheduling modes are used in this scheme. The forwarding is done based on the CID of the tunnel. In CID based scheme packets are forwarded based on the CID of the destination. This scheme uses centralized or distributed scheduling. RS has the knowledge of qos requirements and 77
  • 5. take their own seduling decisions in distributed scheduling[6],[7]. But in centralized scheduling the BS informs to RS about relay link channel characterizes. The tunnel based scheme provides support for tunnels characterized by the unique CID, two specific end points and QoS parameters. The CID based scheme has no tunnels and does not support traffic aggregation; it only supports legacy management and transport connections. MAC layer provides routing and path management. As 802.16j network comprises multi hop paths between the BS and MS., the standard defines two approaches for path management, embedded and explicit path management. His layer also defines network entry. The MAC layer handover of IEEE 802.16j includes the following phases: 1) network topology acquisition before handover, which includes network topology advertisement, and MS scanning or association of neighbor BSs. 2) handover execution phase, which mainly includes cell reselection, handover initialization and handshake process, connection release, and target network reentry. 11. Simulation Model The transparent mode network consists of three types of nodes : the transparent Mobile relay base station(TMR_BS), Transparent –Relay station(T_RS) and Trasparent –Mobile station(T-MS).. The T- RS simply forwards the incoming packet. The basic siumulation parameters that are assumed while performing the simulation is shown below. Here the frequencu used us 2300MHz, some of the other parameters are. Host channel parameters. 1. Bandwidth= 50 Mbps 2. Bit error rate=0 3. Propagation delay=0.0 Micro seconds. 4. IP address = 1.0.1.1 5. Net mask=255.255.255.0 6. ARP protocol. 802.16j Base station channel parameters. 1. Fading variance=10 2. Average building height=10m 3. Average Building distance=80m 4. Street width=30m 5. Pass loss exponent=2.0 6. Shadowing standard deviation=4.0 7. Close in reference distance(m)=1.0 8. System loss=1.0 9. Antenna height=30m 10. Ricean factor (k)=10.0 db OFDMA parameters for BS 1. Channel ID=5 2. Frequency=2300 MHz 3. Transmission power = 35 dbm 4. Receive sensitivity=-99dbm 802.16j Mobile station channel parameters 1. Frequency=2300 MHz 2. Transmission power = 35 dbm 3. Receive sensitivity=-99dbm 4. Speed= 20 m/sec An IEEE 802.16j mobile WIMAX relay network is constructed using network topology of NCTUns as shown in the below figure. Here GUI tool nctunsclient is started to use the GUI platform for performing simulations. Here coordinator and dispatcher programs are used to do emulation studies. We have shown how to carry out transparent mode IEEE 802.16j network simulations. A single host is connected with two 802.16j base stations through three bridges and three links as shown in the figure. Each Link band width is set as 50 Mbps. The BS1 and MS form a subnet 1, BS2 form subnet 2. We 78
  • 6. have simulated the transparent mode IEEE 802.16j network, here the channel mode parameters are set and the respective model is chosen . We have used TWO ray ground channel model, other empirical channel parameters can also be used to further examine the system. Figure 4: Transparent mode simulation model Figure 5: IEEE 802.16j Hard hand over simulation model A single mobile station is connected to the base station 1(BS1) through wireless subnet. The speed of the MS is set as 20 m/sec[2], thus the MS will be moving along the horizontal path from point (x1y1) to point (x2,Y2) as shown in the figure. Here point (x1, Y1) is within the base coverage region of BS1, and point (x2.Y2) is in the base coverage region of BS2. The 802.16j base station 1(BS1) is connected to the host and mobile station as shown above Figure 6: Base station 1 IP address BS1 IP address for wired connection is set as 1.0.6.1 for wired connection to the link, and set as 1.0.7.1 for wireless connection to the MS. The node editor for 802.16j Base station is shown in the figure 8, it consists of various modules like ARP , FIFO, Mac8023 OFDMA interface and physical layer modules, the parameters of each module is set as shown above. The propagation channel mode can be set ttheoretical by specifying the parameters for path loss or fading model. In empirical channel model it defines 22 types of model. We have chosen empirical channel model. 79
  • 7. Figure 7: IEEE 802.16j non transparent mode network Figure 8: IEEE 802.16j BS node editor Then the simulation is executed using as shown in below figure, all the related files of simulation is placed in the directory /usr/local/nctuns/bin/ as shown below, and all the log files are also placed in the same directory . 11. Conclusions and Future Works As IEEE 802.16j network uses centralized or distributed scheduling, an efficient scheduling algorithm that maximizes the network throughput and minimizes overhead must be designed for IEEE 802.16j standard. We have shown how to conduct simulation using NCTUns an open source network simulator, which supports IEEE 802.16j multihop relay WIMAX networks, as no other simulator is available in the market to carry out simulations of IEEE 802.16j. NCTUns supports both transparent mode and non transparent mode simulation. No other simulator is available in the market to carry out IEEE 802.16j WIMAX simulations as OPNET and QUALNET supports only IEEE 802.16e WIMAX. This is the only simulator available to carry out simulations in IEEE 802.16j WIMAX networks 12. References “IEEE Standard for Local and Metropolitan Area Networks: Part 16: Air Interface for Broadband Wireless Access Systems, IEEE Std 802.16- 2009”, May 2009, 2094 pp. C. So-In, R. Jain, and A. Al-Tamimi, “Scheduling in IEEE 802.16e WiMAX Networks: Key issues and a survey,” IEEE J. Select. Areas Commun., vol. 27, no. 2, pp. 156–171, Feb. 2009. C. So-In, R. Jain, and A. Al-Tamimi, “Capacity evaluation for IEEE 802.16e MobileWiMAX,” J. Comput. Syst., Networks, and Commun., vol. 2010, Apr. 2010. K.Wongthavarawat and A. Ganz, “IEEE 802.16 based last mile broadband wireless military networks with quality of service support,” in Proc. Military Communications Conf., 2003, vol. 2, pp. 779–784. A. Sayenko, O. Alanen, and T. Hamalainen, “Scheduling solution for the IEEE 802.16 base station,” Int. J. Comp. and Telecommun. Netw., vol. 52, pp. 96–115, Jan. 2008. R. Jain, C. So-In, and A. Al-Tamimi, “System level modeling of IEEE 802.16e Mobile WiMAX networks: Key issues,” IEEE Wireless Comm. Mag., vol. 15, no. 5, pp. 73–79, Oct. 2008. 80
  • 8. A. Ghosh et al., “Broadband Wireless Access with WiMAX /802.16: Current Performance Benchmarks and Future Potential,” IEEE Commun. Mag., vol. 43, Feb. 2005, pp. 129–36. IEEE 802.16-2004, “Local and Metropolitan Networks — Part 16: Air Interface for Fixed Broadband Wireless Access Systems,” 2004. IEEE 802.16e-2005, “Local and Metropolitan Networks — Part 16: Air Interface for Fixed and Mobile Broadband Wireless Access Systems, Amendment 2: Physical and Medium Access Control Layers for Combined Fixed and Mobile Operation in Licensed Bands and Corrigendum 1,” 2006. Q. Liu, X. Wang and G. B. Giannakis, “A Cross-Layer Scheduling Algorithm with QoS Support in Wireless Networks,” IEEE Trans. Vehic. Tech., vol. 55, no. 3, May 2006, pp. 839–46. J. He, K. Guild, K. Yang, and H. Chen, “Modeling contention based bandwidth request scheme for IEEE 802.16 networks,” IEEE Commun. Lett., vol. 11, no. 8, pp. 698–700, Aug. 2007. H. L. Vu, S. Chan, and L. L. H. Andrew, “Performance analysis of best-effort service in saturated IEEE 802.16 networks,” IEEE Trans. Veh. Technol., vol. 59, no. 1, pp. 460–472, Jan. 2010. Y. P. Fallah, F. Agharebparast, M. R. Minhas, H. M. Alnuweiri, and C. M. Leung, “Analytical modeling of contention-based bandwidth request mechanism in IEEE 802.16 wireless networks,” IEEE Trans. Veh. Technol., vol. 57, no. 5, pp. 3094–3107, Sep. 2008. C. Cicconetti, A. Erta, L. Lenzini, and E. Mingozzi, “Performance evaluation of the IEEE 802.16MAC for QoS support,” IEEE Trans. Mobile Comput., vol. 6, no. 1, pp. 26–38, Jan. 2007. Q. Ni et al., “Investigation of bandwidth request mechanisms under point-to-multipoint mode of WiMAX networks,” IEEE Commun. Mag., vol. 45, no. 5, pp. 132–138, May 2007. C. Mohanram, S. Bhashyam, “Joint subcarrier and power allocation in channel-aware queue- aware scheduling for multiuser ofdm”, IEEE Transactions on Wireless Communications 6 (9) (2007) 3208– 3213. G. Kulkarni, S. Adlakha, M. Srivastava, “Subcarrier allocation and bit loading algorithms for OFDMA based wireless networks”, IEEE Transactions on Mobile Computing 4 (6) (2005) 652– 662. K.D. Lee, V.C.M. Leung, “Fair allocation of subcarrier and power in an OFDMA wireless mesh network”, IEEE Journal on Selected Areas in Communications 24 (11) (2006) 2051–2060. P. Thulasiraman, X. Shen, “Interference aware subcarrier assignment for throughput maximization in OFDMA wireless relay mesh networks”, in: Proceedings of IEEE ICC, 2009, pp. 1–6. P. Li, M. Rong, Y. Xue, E. Schulz, “Reuse one frequency planning for two-hop cellular system with fixed relay nodes”, in: Proc. IEEE WCNC’07, Hong Kong, China, March 2007. IEEE 802.16j-06/015, “Harmonized contribution on 802.16j (mobile multihop relay) usage models”, 2006. Sik Choi, Gyung-Ho Hwang, Taesoo Kwon, Ae-Ri Lim, andDong-Ho Cho, “Fast Handover Scheme for Real-Time DownlinkServices in IEEE 802.16e BWA System”, Vehicular Technology Conference (2005 IEEE 61st), June 2005, Volume 3, pp. 2028-2032. I. Akyildz, J. Xie, and S. Mohanty, “A Survey of Mobility Management in Next Generation All IP Based Wireless Systems,” IEEE Wireless Commun., vol. 11, no. 4, 2004,pp. 16–27. R. Pabst et al., “Relay-based deployment concepts for wireless and mobile broadband radio”, IEEE Commun. Mag. 42 (9) (2004) 80–89. J. Cai, X. Shen, J.W. Mark, A.S. Alfa, “Semi-distributed user relaying algorithm for amplify-and- forward wireless relay networks”, IEEE Trans. Wireless Commun. 7 (4) (2008) 1348–1357. Genc V., Murphy S., Yu Y. and Murphy J., “IEEE 802.16J relay-based wireless access networks: an overview [recent advances and evolution of WLAN and WMAN standards],” IEEE Wireless Communications, Vol. 15, Issue 5, pp. 56 – 63, Oct. 2008. C. Cicconetti, L. Lenzini, E. Mingozzi and C. Eklund, “Quality of service support in IEEE 802.16 networks,” IEEE Network, Vol. 20, pp. 50 – 55, Mar. 2006. 81