SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Downloaden Sie, um offline zu lesen
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 11 | Nov-2013, Available @ http://www.ijret.org 634
ANALYSIS OF DATA TRANSMISSION IN WIRELESS-LAN FOR 802.11
E2ET
Boddu Manikanta1
, Chuppana Sampath Kumar2
1
Student, 2
Associate Professor, Department of ECE, Chaitanya engineering college, Andhra Pradesh
maninani.ashok@gmail.com, amorous_sam@yahoo.co.in
Abstract
The aim of this paper is to investigate the transmission of data between client and server through different IEEE 802.11 wireless LAN
multi- HOP network. To improve this issue, the transmission opportunity (TXOP) mechanism is defined in the IEEE 802.11e standard,
with which a wireless node can transmit multiple frames consecutively for a maximum channel occupancy time, called TXOP limit.
This paper considers the performance of the TXOP mechanism for multi-hop wireless networks. Focusing on a three-node chain
topology, we model it as a tandem queuing network with two nodes. The E2ET is derived and the analysis is validated by simulation.
Numerical results show that the TXOP mechanism works well for multi-hop wireless networks. It is also shown that adjusting TXOP
limit is significantly important in order to increase the overall throughput. In terms of multi-hop wireless networks, there is little
analytical work with regard to the E2ET performance. One of the rationales for the analytical difficulty for multi-hop wireless
networks is that IEEE 802.11 MAC protocol is too complex to model the behavior of multi-hop frame transmissions.
Keywords: IEEE 802.11e, multi-hop wireless LAN, TXOP, E2ET
-----------------------------------------------------------------------***-----------------------------------------------------------------------
1. INTRODUCTION
IEEE 802.11-based multihop wireless net-works have
attracted much interest for next-generation networks [1]. The
distributed coordination function (DCF) is a fundamental
mechanism of the medium access control (MAC) protocol for
IEEE 802.11, employing Carrier Sense Multiple Access with
Collision Avoidance (CSMA/CA). The IEEE 802.11 DCF
specifies random back off algorithm, with which each wireless
node DCF transmits data in an autonomously distributed
manner. It can provide a high-speed wireless connection (e.g.
IEEE802.11g provides up to 54 Mb/s data rate), however, it is
well known that the effective end-to-end throughput (E2ET)
degrades due to the overhead caused by the random back off
and the four-way handshake mechanism based on the
exchange of Request-To-Send/Clear-To-Send (RTS/CTS)
frames. To improve this issue, the transmission opportunity
(TXOP) mechanism is defined in IEEE 802.11e, enabling a
wireless node to transmit multiple frames consecutively for a
maximum channel occupancy time called TXOP limit [2]. The
TXOP mechanism is expected to enhance significantly the
capacity in order to accommodate multimedia traffic such as
video streaming and Voice over Internet Protocol (VoIP).
It is well known that in multi-hop wireless backhaul net-works
with homogeneous frame flows, the E2ET of a frame flow
degrades significantly with the increase in the number of its
transmission hops. Since the TXOP mechanism was
developed for single-hop communication, it greatly improves
the throughput for single-hop communication. However, it is
not clear how the E2ET in multihop wireless networks is
improved by the TXOP mechanism. The aim of this paper is
to develop an analytical model with which the sensitivity of
the TXOP limit to the E2ET can be quantitatively
investigated.
In this, we consider how the TXOP mechanism improves the
E2ET in a backhaul-type wireless mesh network. Our analysis
consists of two steps. First, focusing on a three-node chain
topology, we model it as a tandem queuing network with two
nodes. With this model, we analyze the joint distribution of
the numbers of frames in the two nodes and the server state,
deriving the E2ET. Note that in the tandem queuing network
model, we simply assume that the time intervals caused by the
back off mechanism are exponentially distributed, depending
on which node completes the last frame transmission [11]. In
the second step, we analyze the back off-timer process
observed at the completion epoch of a frame transmission.
Using the analytical results of the second step, we can
determine the parameters of exponential distributions for time
intervals caused by the back off mechanism. We validate the
analysis with simulation.
2. LITERATURE OF MULTI-HOP
There is much literature on the performance of TXOP
mechanism for multihop wireless networks (see, e.g., [3]–[6]),
however, most of the previous studies are based on simulation,
and there is little analytical work taking into account the flow-
level behavior resulting from the IEEE 802.11 MAC protocol.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 11 | Nov-2013, Available @ http://www.ijret.org 635
In terms of single-hop wireless networks, [8] proposed an
analytical model for TXOP mechanism in WLANs under
various channel conditions. They modeled the transmission
queue of each node by a two-state continuous-time Markov
chain which captures the burst transmission mechanism and
the wireless channel errors. By using their analytical model,
they could obtain the performance metrics including the
throughput and buffer overflow probability. [9] also proposed
an analytical model to evaluate the performance of TXOP
mechanism for single-hop networks. They divided the
transmission duration into three different components,
successful transmit overhead, collision time overhead and data
transmission. They specified the values of these components
for two different access modes: basic access and RTS/CTS
access, showing how to calculate the total throughput achieved
under each access mode. Lee et al. [10] introduced a three
dimensional Markov chain model to evaluate the throughput
for IEEE 802.11e under saturation condition. Their model
captured IEEE 802.11e parameters, and a numerical approach
was proposed to obtain the set of parameters to meet the
performance requirements.
In terms of multihop wireless networks, there is little
analytical work with regard to the E2ET performance. One of
the rationales for the analytical difficulty for multihop wireless
networks is that IEEE 802.11 MAC protocol is too complex to
model the behavior of multihop frame transmissions.[11]
derived the maximum E2ET of multi-hop networks, taking
location-dependant neighboring interference into
consideration. A strong point of their approach is that the
maximum E2ET of any pair of nodes in a multi-hop network
can be calculated. However, the impact of parameters such as
the offered load and buffer size of a wireless node on the
E2ET cannot be investigated. In our three-node tandem
network model, on the other hand, location-dependant
neighboring interference is not taken into consideration.
However, the three-node tandem network model enables us to
investigate the sensitivity of the parameters including TXOP
limit to the E2ET.
Fig. 1 Transmission opportunity (TXOP) mechanism
3. TRANSMISSION OPPORTUNITY (TXOP)
MECHANISM
IEEE 802.11e standard has been issued to introduce quality of
service (QoS) support for wireless LANs. The Enhanced
Distributed Channel Access (EDCA) is used as the
fundamental access mechanism for the MAC layer in IEEE
802.11e. In the EDCA, relative priority service is supported in
order to improve the multimedia transmission such as VoIP,
and the TXOP is a principal mechanism of the EDCA to
guarantee QoS required by real-time applications. To reduce
the overhead of the contention time, the TXOP allows
multiple consecutive frame exchanges without back off.
Fig. 1 shows the frame-transmission diagram of three data
frames by using the TXOP mechanism. In the TXOP trans-
mission, a sender node can transmit multiple frames within a
pre specified time interval called TXOP limit. After a frame
transmission, the next frame is transmitted immediately after a
successful ACK reception and the Short Inter Frame Space
(SIFS). If the sender node cannot receive the ACK frame, it
terminates the TXOP transmission and sends frames again
after another back off interval. When the TXO Limit is over,
the node goes into back off phase.
Fig. 2 Queuing model
Using TXOP mechanism, data transfer efficiency is im-proved
since the frames included in the same burst share the overhead
per transmission opportunity. Hence, the TXOP mechanism
provides high throughput performance and low delay for
congested networks.
4. DATA TRANSMISSION BETWEEN CLIENT
AND SREVER
We consider a wireless network with three-node chain
topology, which consists of Nodes 1 and 2 and the gateway
(GW). Node 1 and GW are out of the transmission range but
within the sensing range of each other, while each pair of
neighboring nodes among the three nodes is within the
transmission range. We assume that a single frequency
channel is used for frame transmission, which implies that any
two nodes cannot use the channel simultaneously. In the
wireless network, Flows 1 and 2 are transmitted. Flow 1 is
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 11 | Nov-2013, Available @ http://www.ijret.org 636
transmitted from Node 1 to GW via Node 2, and Flow 2 is
from Node 2 to GW. Nodes 1 and 2 use burst transmission
mechanism, and a node having the transmission right sends
frames continuously during TXOP limit.
We model the wireless network as a tandem queuing network
with two nodes. (See Fig. 2.) We assume that frames arrive at
Node 1 (resp. 2) according to a Poisson process with rate 1
(resp. 2). The system capacity of each node is equal to
(frames). After the transmission right is assigned to Node 1
(resp. 2), Node 1 (resp. 2) sends at most 1 (resp. 2) frames
during the TXOP limit. Frames transmitted by Node 1 join the
queue of Node 2, while those transmitted by Node 2 leave the
network. Either one but not both of the two nodes can transmit
a frame when it gets ready for transmission. When the frame
transmission of Node 1 (resp. 2) completes, Node 1 or 2 gets
ready for frame transmission after a time interval consisting of
DIFS and the back off time. Such interval of Node 1 (resp. 2).
The data transmission takes place with server and client
between nodes analysis. The last assumption (called the
inactive-period assumption hereafter) implies that when one of
the two nodes completes a frame transmission, each node is
forced to be inactive for an exponential time interval. Note
that a node in inactive state cannot transmit a frame even when
it has the frame in the buffer. If the inactive period of the node
is over and the node has no frames to transmit, then the idle
period of the node starts. Further when the node is in idle state
and a new frame arrives at the node, the node immediately
starts the frame transmission.
5. THROUGHPUT ANALYSIS
The value of the TXOP limit affects the throughput
performance. Fig. 6 represents E2ETs of Flows 1 and 2
against TXOP limit 1 and 2. In this figure, the offered loads of
both flows are the same and equal to 8 Mb/s and 12 Mb/s.
From the fact, we can improve the throughput performance for
multihop wireless networks to use TXOP mechanism.
However, for 1, 2 > 20, all the E2ETs in the figure remain
almost constant. Using TXOP mechanism for multihop
wireless networks has both positive and negative effects. The
positive effect is the reduction of the overhead caused by the
back off algorithm and by the exchange of control frames.
This enables wireless nodes to send data frames efficiently.
On the other hand, the negative effect is that the node having
the transmission right is likely to use the network channel
during a large period of time. Occasionally, this channel
occupation leads to deteriorate the performance in multihop
wireless networks. In our model, if Node 1 occupies the
network channel for a long term and sends lots of frames at a
time, the Node 2’s queue is overflowed, degrading the
throughput performance significantly. End-to-end throughput
(E2EPT) transmission takes place with overload of data
transmission.
6. SIMULATION RESULTS
The simulation result explains about the nodes design from
client to server.
Fig- 3 Client to server Nodes design
The result explains about the message information transfer
from client to server from the nodes.
Fig-4 Path design from client to server
The plot explains about the acknowledgment received from
the message transfer from client to server.
Fig- 5 Path verification from channel created in nodes
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 11 | Nov-2013, Available @ http://www.ijret.org 637
The plot explains about the path created from the design and
gives an acknowledgement received from the server.
Fig- 6 Acknowledgement received from client
The plot explains about the overall through put with load and
obtains the best transmission.
Fig- 7 Overall throughput with data load transmission
The plot explains the status updating of the nodes for the
transmission of data.
Fig- 8 Status of nodes for data transmission
The plot explains about the traffic checking with any
interruption with data transmission in output.
Fig- 9 Traffic checking in data transmission
The plot explains about the data reception from server to
client.
Fig- 10 Data reception from server to client
CONCLUSIONS
In this paper, we have considered the performance of the
TXOP mechanism for multihop wireless networks. We have
derived the E2ET and validated the analysis with simulation.
From numerical results, we have confirmed that the analytical
results agree well with the simulation. Numerical results also
showed that a large TXOP limit causes the degradation of the
E2ET, and that under a homogeneous offered load condition,
setting the TXOP limits of nodes to the same value is effective
to achieve high throughput fairness. Note that the analytical
model in the paper consists of two parts: a three-node network
model and a back off-timer process model. Here, the frame-
level queuing behavior is characterized without considering
the detailed behavior of the back off timer. This analytical
approach was originally developed by Bianchi [7]. From the
modeling point of view, our study verified the effectiveness of
the analytical framework developed by [7]. This suggests that
two-model based approach is significantly useful for
performance analysis of IEEE 802.11-based network systems
in which frame-level behavior is mainly concerned.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 11 | Nov-2013, Available @ http://www.ijret.org 638
REFERENCES
[1] I. F. Akyildiz, X. Wang, and W. Wang, “Wireless mesh
networks: a survey," Comput. Netw., vol. 47, no. 4, pp.
445-487, 2005.
[2] IEEE Standard 802.11: Wireless LAN medium access
control (MAC) and physical layer (PHY)
specifications: medium access control (MAC) quality
of service (QoS) enhancements, IEEE 802.11e/D13.0,
2005.
[3] S. Choi, J. Prado, S. Mangold, and S. Shankar, “IEEE
802.11e contention-based channel access (EDCF)
performance evaluation," in Proc. IEEE ICC, 2003, pp.
1151-1156.
[4] A. Grilo and M. Nunes, “Performance evaluation of
IEEE 802.11e," in Proc. IEEE PIMRC, Sep. 2002, pp.
511-517.
[5] F. Keceli, I. Inan, and E. Ayanoglu, “Fair access
provisioning through contention parameter adaptation
in the IEEE 802.11e infrastructure basic service set,"
Arxiv preprint, arXiv:0806.1093, 2008.
[6] T. Suzuki, A. Noguchi, and S. Tasaka, “Effect of
TXOP-bursting and transmission error on application-
level and user-level QoS in audio-video transmission
with IEEE 802.11e EDCA," in Proc. IEEE PIMRC,
Sep. 2006, pp. 1-7.
[7] G. Bianchi, “Performance analysis of the IEEE 802.11
distributed coordination function," IEEE J. Sel. Areas
Commun., vol. 18, no. 3, 535-48, 2000.
[8] G. Min, J. Hu, W. Jia and M. E. Woodward,
“Performance analysis of the TXOP scheme in IEEE
802.11e WLANs with bursty error channels," in Proc.
IEEE WCNC, 2009, pp. 1185-1190.
[9] F. Peng, H. M. Alnuweiri, and V. C. M. Leung,
“Analysis of burst transmission in IEEE 802.11e
wireless LANs," in Proc. IEEE ICC, June 2006, vol. 2,
pp. 535-539.
[10] Y. Lee, K. S. Lee, and J. M. Jang, “Saturation
throughput analysis of IEEE 802.11e EDCA," Lecture
Notes Comput. Science, no. 4682,
pp. 1223-1232, 2007.
[11] Y. Gao, D. M. Chiu, and J. C. S. Lui, “Determining the
end-to-end throughput capacity in multi-hop networks:
methodology and appli-cations," in Proc. Joint
International Conf. Measurement Modeling Comput.
Syst., June 2006, pp. 39-50.
[12] T. Tainaka, H. Masuyama, S, Kasahara, Y. Takahashi,
“A Markovian approach to per-flow throughput
unfairness in IEEE 802.11 multihop wireless
networks," J. Industrial Management Optimization, vol.
5, no. 3, pp. 493-510, 2009.
[13] R. W. Wolf, “Poisson arrivals see time averages,"
Operations Research, vol. 30, pp. 223-231, 1982.
[14] D. Vardalis, “On the efficiency and fairness of TCP
over wired/wireless networks," Master Thesis, State
University of New York at Stony Brook, 2001.
[15] P. T. Giang and K. Nakagawa, “Improvement of
fairness by PCRQ scheduling in multihop wireless
adHoc networks," in Proc. Asia-Pacific Symp.
Queueing Theory Netw. Appl., 2007, pp. 339-348.
BIOGRAPHIES
B.Manikanta pursuing M.Tech in specialization of
Digital Electronics and communication systems at
Chaitanya Engineering college in Department of
Electronics and Communication Engineering
Ch.Sampath Kumar working as an Associate
Professor in Chaitanya Engineering college in
Department of Electronics and communication
Engineering.

Weitere ähnliche Inhalte

Was ist angesagt?

Comparative Study for Performance Analysis of Routing Protocols in Mobility a...
Comparative Study for Performance Analysis of Routing Protocols in Mobility a...Comparative Study for Performance Analysis of Routing Protocols in Mobility a...
Comparative Study for Performance Analysis of Routing Protocols in Mobility a...eeiej
 
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MOBILITY A...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MOBILITY A...COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MOBILITY A...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MOBILITY A...eeiej_journal
 
EBCD: A ROUTING ALGORITHM BASED ON BEE COLONY FOR ENERGY CONSUMPTION REDUCTIO...
EBCD: A ROUTING ALGORITHM BASED ON BEE COLONY FOR ENERGY CONSUMPTION REDUCTIO...EBCD: A ROUTING ALGORITHM BASED ON BEE COLONY FOR ENERGY CONSUMPTION REDUCTIO...
EBCD: A ROUTING ALGORITHM BASED ON BEE COLONY FOR ENERGY CONSUMPTION REDUCTIO...ijasuc
 
Qo s parameters for obs network
Qo s parameters for obs networkQo s parameters for obs network
Qo s parameters for obs networkeSAT Journals
 
A CLUSTER BASED STABLE ROUTING PROTOCOL USING BINARY PARTICLE SWARM OPTIMIZAT...
A CLUSTER BASED STABLE ROUTING PROTOCOL USING BINARY PARTICLE SWARM OPTIMIZAT...A CLUSTER BASED STABLE ROUTING PROTOCOL USING BINARY PARTICLE SWARM OPTIMIZAT...
A CLUSTER BASED STABLE ROUTING PROTOCOL USING BINARY PARTICLE SWARM OPTIMIZAT...ijmnct
 
Analysis of Latency and Throughput of 2D Torus Topology using Modified XY Rou...
Analysis of Latency and Throughput of 2D Torus Topology using Modified XY Rou...Analysis of Latency and Throughput of 2D Torus Topology using Modified XY Rou...
Analysis of Latency and Throughput of 2D Torus Topology using Modified XY Rou...IDES Editor
 
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless NetworkQuadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless NetworkIJCI JOURNAL
 
Effective Path Identification Protocol for Wireless Mesh Networks
Effective Path Identification Protocol for Wireless Mesh NetworksEffective Path Identification Protocol for Wireless Mesh Networks
Effective Path Identification Protocol for Wireless Mesh NetworksIDES Editor
 
Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...
Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...
Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...IAEME Publication
 
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...Saurabh Mishra
 
Analyzing performance of zrp by varying node density and transmission range
Analyzing performance of zrp by varying node density and transmission rangeAnalyzing performance of zrp by varying node density and transmission range
Analyzing performance of zrp by varying node density and transmission rangeAlexander Decker
 
Enhancenig OLSR routing protocol using K-means clustering in MANETs
Enhancenig OLSR routing protocol using K-means clustering  in MANETs Enhancenig OLSR routing protocol using K-means clustering  in MANETs
Enhancenig OLSR routing protocol using K-means clustering in MANETs IJECEIAES
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Performance analysis on multihop transmission using
Performance analysis on multihop transmission usingPerformance analysis on multihop transmission using
Performance analysis on multihop transmission usingeSAT Publishing House
 
rupali published paper
rupali published paperrupali published paper
rupali published paperRoopali Singh
 

Was ist angesagt? (17)

Comparative Study for Performance Analysis of Routing Protocols in Mobility a...
Comparative Study for Performance Analysis of Routing Protocols in Mobility a...Comparative Study for Performance Analysis of Routing Protocols in Mobility a...
Comparative Study for Performance Analysis of Routing Protocols in Mobility a...
 
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MOBILITY A...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MOBILITY A...COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MOBILITY A...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MOBILITY A...
 
EBCD: A ROUTING ALGORITHM BASED ON BEE COLONY FOR ENERGY CONSUMPTION REDUCTIO...
EBCD: A ROUTING ALGORITHM BASED ON BEE COLONY FOR ENERGY CONSUMPTION REDUCTIO...EBCD: A ROUTING ALGORITHM BASED ON BEE COLONY FOR ENERGY CONSUMPTION REDUCTIO...
EBCD: A ROUTING ALGORITHM BASED ON BEE COLONY FOR ENERGY CONSUMPTION REDUCTIO...
 
Mq3624532158
Mq3624532158Mq3624532158
Mq3624532158
 
Qo s parameters for obs network
Qo s parameters for obs networkQo s parameters for obs network
Qo s parameters for obs network
 
A CLUSTER BASED STABLE ROUTING PROTOCOL USING BINARY PARTICLE SWARM OPTIMIZAT...
A CLUSTER BASED STABLE ROUTING PROTOCOL USING BINARY PARTICLE SWARM OPTIMIZAT...A CLUSTER BASED STABLE ROUTING PROTOCOL USING BINARY PARTICLE SWARM OPTIMIZAT...
A CLUSTER BASED STABLE ROUTING PROTOCOL USING BINARY PARTICLE SWARM OPTIMIZAT...
 
Analysis of Latency and Throughput of 2D Torus Topology using Modified XY Rou...
Analysis of Latency and Throughput of 2D Torus Topology using Modified XY Rou...Analysis of Latency and Throughput of 2D Torus Topology using Modified XY Rou...
Analysis of Latency and Throughput of 2D Torus Topology using Modified XY Rou...
 
G1063841
G1063841G1063841
G1063841
 
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless NetworkQuadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
 
Effective Path Identification Protocol for Wireless Mesh Networks
Effective Path Identification Protocol for Wireless Mesh NetworksEffective Path Identification Protocol for Wireless Mesh Networks
Effective Path Identification Protocol for Wireless Mesh Networks
 
Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...
Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...
Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...
 
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
 
Analyzing performance of zrp by varying node density and transmission range
Analyzing performance of zrp by varying node density and transmission rangeAnalyzing performance of zrp by varying node density and transmission range
Analyzing performance of zrp by varying node density and transmission range
 
Enhancenig OLSR routing protocol using K-means clustering in MANETs
Enhancenig OLSR routing protocol using K-means clustering  in MANETs Enhancenig OLSR routing protocol using K-means clustering  in MANETs
Enhancenig OLSR routing protocol using K-means clustering in MANETs
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Performance analysis on multihop transmission using
Performance analysis on multihop transmission usingPerformance analysis on multihop transmission using
Performance analysis on multihop transmission using
 
rupali published paper
rupali published paperrupali published paper
rupali published paper
 

Andere mochten auch

Dicas para um TCC de sucesso
Dicas para um TCC de sucessoDicas para um TCC de sucesso
Dicas para um TCC de sucessoJaime Albunio
 
Technological and cross border mixture value chain of science and engineering...
Technological and cross border mixture value chain of science and engineering...Technological and cross border mixture value chain of science and engineering...
Technological and cross border mixture value chain of science and engineering...eSAT Journals
 
Business Development and Market Strategies
Business Development and Market StrategiesBusiness Development and Market Strategies
Business Development and Market StrategiesKunle Dosumu
 
Vermont maturity
Vermont maturityVermont maturity
Vermont maturityFlashonCam
 
Fundamentos Pedagógicos
Fundamentos PedagógicosFundamentos Pedagógicos
Fundamentos PedagógicosGabygonzalezp
 
Basil john mm field assignment jan2016
Basil john mm field assignment jan2016Basil john mm field assignment jan2016
Basil john mm field assignment jan2016Basil John
 
Manual de funciones COMANDO DE TECLADOS
Manual de funciones COMANDO DE TECLADOS Manual de funciones COMANDO DE TECLADOS
Manual de funciones COMANDO DE TECLADOS andresoyola17
 
Cost cutting with excel reporting
Cost cutting with excel reportingCost cutting with excel reporting
Cost cutting with excel reportingTim Schojohann
 
Color and texture based image retrieval
Color and texture based image retrievalColor and texture based image retrieval
Color and texture based image retrievaleSAT Journals
 
The problem of evil and suffering
The problem of evil and sufferingThe problem of evil and suffering
The problem of evil and sufferingphilipapeters
 
CATEGORÍA DE FUNCIONES DE TEXTO EN EXCEL
CATEGORÍA DE FUNCIONES DE TEXTO EN EXCELCATEGORÍA DE FUNCIONES DE TEXTO EN EXCEL
CATEGORÍA DE FUNCIONES DE TEXTO EN EXCELmeryetc
 
Bible Correspondence Course 13
Bible Correspondence Course 13Bible Correspondence Course 13
Bible Correspondence Course 13Mark GV
 

Andere mochten auch (16)

Dicas para um TCC de sucesso
Dicas para um TCC de sucessoDicas para um TCC de sucesso
Dicas para um TCC de sucesso
 
Technological and cross border mixture value chain of science and engineering...
Technological and cross border mixture value chain of science and engineering...Technological and cross border mixture value chain of science and engineering...
Technological and cross border mixture value chain of science and engineering...
 
Business Development and Market Strategies
Business Development and Market StrategiesBusiness Development and Market Strategies
Business Development and Market Strategies
 
Vermont maturity
Vermont maturityVermont maturity
Vermont maturity
 
UBONTU
UBONTUUBONTU
UBONTU
 
Pertambangan
PertambanganPertambangan
Pertambangan
 
Fundamentos Pedagógicos
Fundamentos PedagógicosFundamentos Pedagógicos
Fundamentos Pedagógicos
 
Basil john mm field assignment jan2016
Basil john mm field assignment jan2016Basil john mm field assignment jan2016
Basil john mm field assignment jan2016
 
Manual de funciones COMANDO DE TECLADOS
Manual de funciones COMANDO DE TECLADOS Manual de funciones COMANDO DE TECLADOS
Manual de funciones COMANDO DE TECLADOS
 
Cost cutting with excel reporting
Cost cutting with excel reportingCost cutting with excel reporting
Cost cutting with excel reporting
 
Color and texture based image retrieval
Color and texture based image retrievalColor and texture based image retrieval
Color and texture based image retrieval
 
The problem of evil and suffering
The problem of evil and sufferingThe problem of evil and suffering
The problem of evil and suffering
 
CATEGORÍA DE FUNCIONES DE TEXTO EN EXCEL
CATEGORÍA DE FUNCIONES DE TEXTO EN EXCELCATEGORÍA DE FUNCIONES DE TEXTO EN EXCEL
CATEGORÍA DE FUNCIONES DE TEXTO EN EXCEL
 
Bible Correspondence Course 13
Bible Correspondence Course 13Bible Correspondence Course 13
Bible Correspondence Course 13
 
2º Aulão Beneficente
2º Aulão Beneficente2º Aulão Beneficente
2º Aulão Beneficente
 
Aula 6 - Higiene e Segurança do Trabalho
Aula 6 - Higiene e Segurança do TrabalhoAula 6 - Higiene e Segurança do Trabalho
Aula 6 - Higiene e Segurança do Trabalho
 

Ähnlich wie Analysis of data transmission in wireless lan for 802.11 e2 et

EEIT2-F: energy-efficient aware IT2-fuzzy based clustering protocol in wirel...
EEIT2-F: energy-efficient aware IT2-fuzzy based clustering  protocol in wirel...EEIT2-F: energy-efficient aware IT2-fuzzy based clustering  protocol in wirel...
EEIT2-F: energy-efficient aware IT2-fuzzy based clustering protocol in wirel...IJECEIAES
 
PERFORMANCE EVALUATION OF LTE NETWORK USING MAXIMUM FLOW ALGORITHM
PERFORMANCE EVALUATION OF LTE NETWORK USING MAXIMUM FLOW ALGORITHMPERFORMANCE EVALUATION OF LTE NETWORK USING MAXIMUM FLOW ALGORITHM
PERFORMANCE EVALUATION OF LTE NETWORK USING MAXIMUM FLOW ALGORITHMijcsit
 
Performance Evaluation of LTE Network using Maximum Flow Algorithm
Performance Evaluation of LTE Network using Maximum Flow AlgorithmPerformance Evaluation of LTE Network using Maximum Flow Algorithm
Performance Evaluation of LTE Network using Maximum Flow AlgorithmAIRCC Publishing Corporation
 
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless NetworksEfficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless NetworksCSCJournals
 
Traffic Engineering in Metro Ethernet
Traffic Engineering in Metro EthernetTraffic Engineering in Metro Ethernet
Traffic Engineering in Metro EthernetCSCJournals
 
Paper id 28201419
Paper id 28201419Paper id 28201419
Paper id 28201419IJRAT
 
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...IJECEIAES
 
Newton-raphson method to solve systems of non-linear equations in VANET perfo...
Newton-raphson method to solve systems of non-linear equations in VANET perfo...Newton-raphson method to solve systems of non-linear equations in VANET perfo...
Newton-raphson method to solve systems of non-linear equations in VANET perfo...journalBEEI
 
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3ijwmn
 
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...IJNSA Journal
 
Design and analysis of routing protocol for cognitive radio ad hoc networks i...
Design and analysis of routing protocol for cognitive radio ad hoc networks i...Design and analysis of routing protocol for cognitive radio ad hoc networks i...
Design and analysis of routing protocol for cognitive radio ad hoc networks i...IJECEIAES
 
Design And Evaluation of Time Slot Assignment Algorithm For IEEE 802.16j Rela...
Design And Evaluation of Time Slot Assignment Algorithm For IEEE 802.16j Rela...Design And Evaluation of Time Slot Assignment Algorithm For IEEE 802.16j Rela...
Design And Evaluation of Time Slot Assignment Algorithm For IEEE 802.16j Rela...CSCJournals
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...Editor IJCATR
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...Editor IJCATR
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...Editor IJCATR
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...Editor IJCATR
 
IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...
IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...
IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...IJNSA Journal
 
PERFORMANCE ANALYSIS OF RESOURCE SCHEDULING IN LTE FEMTOCELLS NETWORKS
PERFORMANCE ANALYSIS OF RESOURCE SCHEDULING IN LTE FEMTOCELLS NETWORKSPERFORMANCE ANALYSIS OF RESOURCE SCHEDULING IN LTE FEMTOCELLS NETWORKS
PERFORMANCE ANALYSIS OF RESOURCE SCHEDULING IN LTE FEMTOCELLS NETWORKScscpconf
 

Ähnlich wie Analysis of data transmission in wireless lan for 802.11 e2 et (20)

EEIT2-F: energy-efficient aware IT2-fuzzy based clustering protocol in wirel...
EEIT2-F: energy-efficient aware IT2-fuzzy based clustering  protocol in wirel...EEIT2-F: energy-efficient aware IT2-fuzzy based clustering  protocol in wirel...
EEIT2-F: energy-efficient aware IT2-fuzzy based clustering protocol in wirel...
 
PERFORMANCE EVALUATION OF LTE NETWORK USING MAXIMUM FLOW ALGORITHM
PERFORMANCE EVALUATION OF LTE NETWORK USING MAXIMUM FLOW ALGORITHMPERFORMANCE EVALUATION OF LTE NETWORK USING MAXIMUM FLOW ALGORITHM
PERFORMANCE EVALUATION OF LTE NETWORK USING MAXIMUM FLOW ALGORITHM
 
Performance Evaluation of LTE Network using Maximum Flow Algorithm
Performance Evaluation of LTE Network using Maximum Flow AlgorithmPerformance Evaluation of LTE Network using Maximum Flow Algorithm
Performance Evaluation of LTE Network using Maximum Flow Algorithm
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless NetworksEfficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
 
Traffic Engineering in Metro Ethernet
Traffic Engineering in Metro EthernetTraffic Engineering in Metro Ethernet
Traffic Engineering in Metro Ethernet
 
Paper id 28201419
Paper id 28201419Paper id 28201419
Paper id 28201419
 
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...
 
Newton-raphson method to solve systems of non-linear equations in VANET perfo...
Newton-raphson method to solve systems of non-linear equations in VANET perfo...Newton-raphson method to solve systems of non-linear equations in VANET perfo...
Newton-raphson method to solve systems of non-linear equations in VANET perfo...
 
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3
 
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...
 
International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)
 
Design and analysis of routing protocol for cognitive radio ad hoc networks i...
Design and analysis of routing protocol for cognitive radio ad hoc networks i...Design and analysis of routing protocol for cognitive radio ad hoc networks i...
Design and analysis of routing protocol for cognitive radio ad hoc networks i...
 
Design And Evaluation of Time Slot Assignment Algorithm For IEEE 802.16j Rela...
Design And Evaluation of Time Slot Assignment Algorithm For IEEE 802.16j Rela...Design And Evaluation of Time Slot Assignment Algorithm For IEEE 802.16j Rela...
Design And Evaluation of Time Slot Assignment Algorithm For IEEE 802.16j Rela...
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
 
IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...
IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...
IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...
 
PERFORMANCE ANALYSIS OF RESOURCE SCHEDULING IN LTE FEMTOCELLS NETWORKS
PERFORMANCE ANALYSIS OF RESOURCE SCHEDULING IN LTE FEMTOCELLS NETWORKSPERFORMANCE ANALYSIS OF RESOURCE SCHEDULING IN LTE FEMTOCELLS NETWORKS
PERFORMANCE ANALYSIS OF RESOURCE SCHEDULING IN LTE FEMTOCELLS NETWORKS
 

Mehr von eSAT Journals

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementseSAT Journals
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case studyeSAT Journals
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case studyeSAT Journals
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreeSAT Journals
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialseSAT Journals
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...eSAT Journals
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...eSAT Journals
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizereSAT Journals
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementeSAT Journals
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...eSAT Journals
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteeSAT Journals
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...eSAT Journals
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...eSAT Journals
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabseSAT Journals
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaeSAT Journals
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...eSAT Journals
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodeSAT Journals
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniqueseSAT Journals
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...eSAT Journals
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...eSAT Journals
 

Mehr von eSAT Journals (20)

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavements
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case study
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case study
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangalore
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizer
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources management
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concrete
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabs
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in india
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn method
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniques
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...
 

Kürzlich hochgeladen

Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 
Air Compressor reciprocating single stage
Air Compressor reciprocating single stageAir Compressor reciprocating single stage
Air Compressor reciprocating single stageAbc194748
 
Rums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdfRums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdfsmsksolar
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdfKamal Acharya
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Servicemeghakumariji156
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationBhangaleSonal
 
Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesEngineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesRAJNEESHKUMAR341697
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Call Girls Mumbai
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdfKamal Acharya
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxSCMS School of Architecture
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptMsecMca
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapRishantSharmaFr
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"mphochane1998
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network DevicesChandrakantDivate1
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...HenryBriggs2
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARKOUSTAV SARKAR
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityMorshed Ahmed Rahath
 

Kürzlich hochgeladen (20)

Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
Air Compressor reciprocating single stage
Air Compressor reciprocating single stageAir Compressor reciprocating single stage
Air Compressor reciprocating single stage
 
Rums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdfRums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdf
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesEngineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planes
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 

Analysis of data transmission in wireless lan for 802.11 e2 et

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 11 | Nov-2013, Available @ http://www.ijret.org 634 ANALYSIS OF DATA TRANSMISSION IN WIRELESS-LAN FOR 802.11 E2ET Boddu Manikanta1 , Chuppana Sampath Kumar2 1 Student, 2 Associate Professor, Department of ECE, Chaitanya engineering college, Andhra Pradesh maninani.ashok@gmail.com, amorous_sam@yahoo.co.in Abstract The aim of this paper is to investigate the transmission of data between client and server through different IEEE 802.11 wireless LAN multi- HOP network. To improve this issue, the transmission opportunity (TXOP) mechanism is defined in the IEEE 802.11e standard, with which a wireless node can transmit multiple frames consecutively for a maximum channel occupancy time, called TXOP limit. This paper considers the performance of the TXOP mechanism for multi-hop wireless networks. Focusing on a three-node chain topology, we model it as a tandem queuing network with two nodes. The E2ET is derived and the analysis is validated by simulation. Numerical results show that the TXOP mechanism works well for multi-hop wireless networks. It is also shown that adjusting TXOP limit is significantly important in order to increase the overall throughput. In terms of multi-hop wireless networks, there is little analytical work with regard to the E2ET performance. One of the rationales for the analytical difficulty for multi-hop wireless networks is that IEEE 802.11 MAC protocol is too complex to model the behavior of multi-hop frame transmissions. Keywords: IEEE 802.11e, multi-hop wireless LAN, TXOP, E2ET -----------------------------------------------------------------------***----------------------------------------------------------------------- 1. INTRODUCTION IEEE 802.11-based multihop wireless net-works have attracted much interest for next-generation networks [1]. The distributed coordination function (DCF) is a fundamental mechanism of the medium access control (MAC) protocol for IEEE 802.11, employing Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA). The IEEE 802.11 DCF specifies random back off algorithm, with which each wireless node DCF transmits data in an autonomously distributed manner. It can provide a high-speed wireless connection (e.g. IEEE802.11g provides up to 54 Mb/s data rate), however, it is well known that the effective end-to-end throughput (E2ET) degrades due to the overhead caused by the random back off and the four-way handshake mechanism based on the exchange of Request-To-Send/Clear-To-Send (RTS/CTS) frames. To improve this issue, the transmission opportunity (TXOP) mechanism is defined in IEEE 802.11e, enabling a wireless node to transmit multiple frames consecutively for a maximum channel occupancy time called TXOP limit [2]. The TXOP mechanism is expected to enhance significantly the capacity in order to accommodate multimedia traffic such as video streaming and Voice over Internet Protocol (VoIP). It is well known that in multi-hop wireless backhaul net-works with homogeneous frame flows, the E2ET of a frame flow degrades significantly with the increase in the number of its transmission hops. Since the TXOP mechanism was developed for single-hop communication, it greatly improves the throughput for single-hop communication. However, it is not clear how the E2ET in multihop wireless networks is improved by the TXOP mechanism. The aim of this paper is to develop an analytical model with which the sensitivity of the TXOP limit to the E2ET can be quantitatively investigated. In this, we consider how the TXOP mechanism improves the E2ET in a backhaul-type wireless mesh network. Our analysis consists of two steps. First, focusing on a three-node chain topology, we model it as a tandem queuing network with two nodes. With this model, we analyze the joint distribution of the numbers of frames in the two nodes and the server state, deriving the E2ET. Note that in the tandem queuing network model, we simply assume that the time intervals caused by the back off mechanism are exponentially distributed, depending on which node completes the last frame transmission [11]. In the second step, we analyze the back off-timer process observed at the completion epoch of a frame transmission. Using the analytical results of the second step, we can determine the parameters of exponential distributions for time intervals caused by the back off mechanism. We validate the analysis with simulation. 2. LITERATURE OF MULTI-HOP There is much literature on the performance of TXOP mechanism for multihop wireless networks (see, e.g., [3]–[6]), however, most of the previous studies are based on simulation, and there is little analytical work taking into account the flow- level behavior resulting from the IEEE 802.11 MAC protocol.
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 11 | Nov-2013, Available @ http://www.ijret.org 635 In terms of single-hop wireless networks, [8] proposed an analytical model for TXOP mechanism in WLANs under various channel conditions. They modeled the transmission queue of each node by a two-state continuous-time Markov chain which captures the burst transmission mechanism and the wireless channel errors. By using their analytical model, they could obtain the performance metrics including the throughput and buffer overflow probability. [9] also proposed an analytical model to evaluate the performance of TXOP mechanism for single-hop networks. They divided the transmission duration into three different components, successful transmit overhead, collision time overhead and data transmission. They specified the values of these components for two different access modes: basic access and RTS/CTS access, showing how to calculate the total throughput achieved under each access mode. Lee et al. [10] introduced a three dimensional Markov chain model to evaluate the throughput for IEEE 802.11e under saturation condition. Their model captured IEEE 802.11e parameters, and a numerical approach was proposed to obtain the set of parameters to meet the performance requirements. In terms of multihop wireless networks, there is little analytical work with regard to the E2ET performance. One of the rationales for the analytical difficulty for multihop wireless networks is that IEEE 802.11 MAC protocol is too complex to model the behavior of multihop frame transmissions.[11] derived the maximum E2ET of multi-hop networks, taking location-dependant neighboring interference into consideration. A strong point of their approach is that the maximum E2ET of any pair of nodes in a multi-hop network can be calculated. However, the impact of parameters such as the offered load and buffer size of a wireless node on the E2ET cannot be investigated. In our three-node tandem network model, on the other hand, location-dependant neighboring interference is not taken into consideration. However, the three-node tandem network model enables us to investigate the sensitivity of the parameters including TXOP limit to the E2ET. Fig. 1 Transmission opportunity (TXOP) mechanism 3. TRANSMISSION OPPORTUNITY (TXOP) MECHANISM IEEE 802.11e standard has been issued to introduce quality of service (QoS) support for wireless LANs. The Enhanced Distributed Channel Access (EDCA) is used as the fundamental access mechanism for the MAC layer in IEEE 802.11e. In the EDCA, relative priority service is supported in order to improve the multimedia transmission such as VoIP, and the TXOP is a principal mechanism of the EDCA to guarantee QoS required by real-time applications. To reduce the overhead of the contention time, the TXOP allows multiple consecutive frame exchanges without back off. Fig. 1 shows the frame-transmission diagram of three data frames by using the TXOP mechanism. In the TXOP trans- mission, a sender node can transmit multiple frames within a pre specified time interval called TXOP limit. After a frame transmission, the next frame is transmitted immediately after a successful ACK reception and the Short Inter Frame Space (SIFS). If the sender node cannot receive the ACK frame, it terminates the TXOP transmission and sends frames again after another back off interval. When the TXO Limit is over, the node goes into back off phase. Fig. 2 Queuing model Using TXOP mechanism, data transfer efficiency is im-proved since the frames included in the same burst share the overhead per transmission opportunity. Hence, the TXOP mechanism provides high throughput performance and low delay for congested networks. 4. DATA TRANSMISSION BETWEEN CLIENT AND SREVER We consider a wireless network with three-node chain topology, which consists of Nodes 1 and 2 and the gateway (GW). Node 1 and GW are out of the transmission range but within the sensing range of each other, while each pair of neighboring nodes among the three nodes is within the transmission range. We assume that a single frequency channel is used for frame transmission, which implies that any two nodes cannot use the channel simultaneously. In the wireless network, Flows 1 and 2 are transmitted. Flow 1 is
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 11 | Nov-2013, Available @ http://www.ijret.org 636 transmitted from Node 1 to GW via Node 2, and Flow 2 is from Node 2 to GW. Nodes 1 and 2 use burst transmission mechanism, and a node having the transmission right sends frames continuously during TXOP limit. We model the wireless network as a tandem queuing network with two nodes. (See Fig. 2.) We assume that frames arrive at Node 1 (resp. 2) according to a Poisson process with rate 1 (resp. 2). The system capacity of each node is equal to (frames). After the transmission right is assigned to Node 1 (resp. 2), Node 1 (resp. 2) sends at most 1 (resp. 2) frames during the TXOP limit. Frames transmitted by Node 1 join the queue of Node 2, while those transmitted by Node 2 leave the network. Either one but not both of the two nodes can transmit a frame when it gets ready for transmission. When the frame transmission of Node 1 (resp. 2) completes, Node 1 or 2 gets ready for frame transmission after a time interval consisting of DIFS and the back off time. Such interval of Node 1 (resp. 2). The data transmission takes place with server and client between nodes analysis. The last assumption (called the inactive-period assumption hereafter) implies that when one of the two nodes completes a frame transmission, each node is forced to be inactive for an exponential time interval. Note that a node in inactive state cannot transmit a frame even when it has the frame in the buffer. If the inactive period of the node is over and the node has no frames to transmit, then the idle period of the node starts. Further when the node is in idle state and a new frame arrives at the node, the node immediately starts the frame transmission. 5. THROUGHPUT ANALYSIS The value of the TXOP limit affects the throughput performance. Fig. 6 represents E2ETs of Flows 1 and 2 against TXOP limit 1 and 2. In this figure, the offered loads of both flows are the same and equal to 8 Mb/s and 12 Mb/s. From the fact, we can improve the throughput performance for multihop wireless networks to use TXOP mechanism. However, for 1, 2 > 20, all the E2ETs in the figure remain almost constant. Using TXOP mechanism for multihop wireless networks has both positive and negative effects. The positive effect is the reduction of the overhead caused by the back off algorithm and by the exchange of control frames. This enables wireless nodes to send data frames efficiently. On the other hand, the negative effect is that the node having the transmission right is likely to use the network channel during a large period of time. Occasionally, this channel occupation leads to deteriorate the performance in multihop wireless networks. In our model, if Node 1 occupies the network channel for a long term and sends lots of frames at a time, the Node 2’s queue is overflowed, degrading the throughput performance significantly. End-to-end throughput (E2EPT) transmission takes place with overload of data transmission. 6. SIMULATION RESULTS The simulation result explains about the nodes design from client to server. Fig- 3 Client to server Nodes design The result explains about the message information transfer from client to server from the nodes. Fig-4 Path design from client to server The plot explains about the acknowledgment received from the message transfer from client to server. Fig- 5 Path verification from channel created in nodes
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 11 | Nov-2013, Available @ http://www.ijret.org 637 The plot explains about the path created from the design and gives an acknowledgement received from the server. Fig- 6 Acknowledgement received from client The plot explains about the overall through put with load and obtains the best transmission. Fig- 7 Overall throughput with data load transmission The plot explains the status updating of the nodes for the transmission of data. Fig- 8 Status of nodes for data transmission The plot explains about the traffic checking with any interruption with data transmission in output. Fig- 9 Traffic checking in data transmission The plot explains about the data reception from server to client. Fig- 10 Data reception from server to client CONCLUSIONS In this paper, we have considered the performance of the TXOP mechanism for multihop wireless networks. We have derived the E2ET and validated the analysis with simulation. From numerical results, we have confirmed that the analytical results agree well with the simulation. Numerical results also showed that a large TXOP limit causes the degradation of the E2ET, and that under a homogeneous offered load condition, setting the TXOP limits of nodes to the same value is effective to achieve high throughput fairness. Note that the analytical model in the paper consists of two parts: a three-node network model and a back off-timer process model. Here, the frame- level queuing behavior is characterized without considering the detailed behavior of the back off timer. This analytical approach was originally developed by Bianchi [7]. From the modeling point of view, our study verified the effectiveness of the analytical framework developed by [7]. This suggests that two-model based approach is significantly useful for performance analysis of IEEE 802.11-based network systems in which frame-level behavior is mainly concerned.
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 11 | Nov-2013, Available @ http://www.ijret.org 638 REFERENCES [1] I. F. Akyildiz, X. Wang, and W. Wang, “Wireless mesh networks: a survey," Comput. Netw., vol. 47, no. 4, pp. 445-487, 2005. [2] IEEE Standard 802.11: Wireless LAN medium access control (MAC) and physical layer (PHY) specifications: medium access control (MAC) quality of service (QoS) enhancements, IEEE 802.11e/D13.0, 2005. [3] S. Choi, J. Prado, S. Mangold, and S. Shankar, “IEEE 802.11e contention-based channel access (EDCF) performance evaluation," in Proc. IEEE ICC, 2003, pp. 1151-1156. [4] A. Grilo and M. Nunes, “Performance evaluation of IEEE 802.11e," in Proc. IEEE PIMRC, Sep. 2002, pp. 511-517. [5] F. Keceli, I. Inan, and E. Ayanoglu, “Fair access provisioning through contention parameter adaptation in the IEEE 802.11e infrastructure basic service set," Arxiv preprint, arXiv:0806.1093, 2008. [6] T. Suzuki, A. Noguchi, and S. Tasaka, “Effect of TXOP-bursting and transmission error on application- level and user-level QoS in audio-video transmission with IEEE 802.11e EDCA," in Proc. IEEE PIMRC, Sep. 2006, pp. 1-7. [7] G. Bianchi, “Performance analysis of the IEEE 802.11 distributed coordination function," IEEE J. Sel. Areas Commun., vol. 18, no. 3, 535-48, 2000. [8] G. Min, J. Hu, W. Jia and M. E. Woodward, “Performance analysis of the TXOP scheme in IEEE 802.11e WLANs with bursty error channels," in Proc. IEEE WCNC, 2009, pp. 1185-1190. [9] F. Peng, H. M. Alnuweiri, and V. C. M. Leung, “Analysis of burst transmission in IEEE 802.11e wireless LANs," in Proc. IEEE ICC, June 2006, vol. 2, pp. 535-539. [10] Y. Lee, K. S. Lee, and J. M. Jang, “Saturation throughput analysis of IEEE 802.11e EDCA," Lecture Notes Comput. Science, no. 4682, pp. 1223-1232, 2007. [11] Y. Gao, D. M. Chiu, and J. C. S. Lui, “Determining the end-to-end throughput capacity in multi-hop networks: methodology and appli-cations," in Proc. Joint International Conf. Measurement Modeling Comput. Syst., June 2006, pp. 39-50. [12] T. Tainaka, H. Masuyama, S, Kasahara, Y. Takahashi, “A Markovian approach to per-flow throughput unfairness in IEEE 802.11 multihop wireless networks," J. Industrial Management Optimization, vol. 5, no. 3, pp. 493-510, 2009. [13] R. W. Wolf, “Poisson arrivals see time averages," Operations Research, vol. 30, pp. 223-231, 1982. [14] D. Vardalis, “On the efficiency and fairness of TCP over wired/wireless networks," Master Thesis, State University of New York at Stony Brook, 2001. [15] P. T. Giang and K. Nakagawa, “Improvement of fairness by PCRQ scheduling in multihop wireless adHoc networks," in Proc. Asia-Pacific Symp. Queueing Theory Netw. Appl., 2007, pp. 339-348. BIOGRAPHIES B.Manikanta pursuing M.Tech in specialization of Digital Electronics and communication systems at Chaitanya Engineering college in Department of Electronics and Communication Engineering Ch.Sampath Kumar working as an Associate Professor in Chaitanya Engineering college in Department of Electronics and communication Engineering.