SlideShare ist ein Scribd-Unternehmen logo
1 von 11
Downloaden Sie, um offline zu lesen
International Journal of Computational Science and Information Technology (IJCSITY) Vol.2, No.2, May 2014
DOI : 10.5121/ijcsity.2014.2206 55
PROPOSED WFQ BASED DYNAMIC BANDWIDTH
ALLOCATION FOR MOBILE WIMAX APPLICATION
Dr.B.Sridevi1
, R.Anantha Priya2
, V.S.Primiya3
1
Assistant Professor, 2,3
B.E.Student
Department of Electronics and Communication Engineering
Velammal College of Engineering and Technology, Madurai
ABSTRACT
In this project, we proposed a framework to support heterogenous traffic with different QoS demand in
WiMAX. This framework dynamically changes the bandwidth allocation (BA) for ongoing and new arrival
connections based on network condition and service demand. The objective is to efficiently use the
available bandwidth and provide QoS support in a fair manner. Dynamic allocation of spectrum prior to
transmission can mitigate the starvation problem of Non Real time application. The WFQ based dynamic
bandwidth allocation framework uses architecture that has packet scheduler scheme (PS), call admission
policy and a dynamic bandwidth allocation mechanism. By the simulation result we have showed that this
architecture could provide QoS support by being fair to all classes of services.
KEYWORDS
QoS in WiMAX, Dynamic Bandwidth Allocation, WFQ.
1. INTRODUCTION
Worldwide Interoperability for Microwave Access(WiMAX) will play an important role in the
fixed broadband wireless access since it is more cost effective and faster to set up technology
which is based on IEEE 802.16 standard that specifies the new air interface for microwave
access,which was designed for wireless metropolitan area networks. WiMAX provides an
affordable alternative for wireless broadband access supporting a variety of applications of
different types including video conferencing, non-real-time large volume data transfer, traditional
voice/data traffic throughput connection, and web browsing.In order to have the best controlled
bandwidth allocation of the WiMAX network, IEEE 802.16e-2005 standard defines 5 types of
service flow as following: UGS (Unsolicited Grant Service), rtPS(Real-Time Polling Service),
ertPS (Extended Real-Time Polling Services), nrtPS (Non-Real Time PollingService) and BE
(Best Effort).
International Journal of Computational Science and Information Technology (IJCSITY) Vol.2, No.2, May 2014
56
Fig1. WiMAX architecture
Each traffic flows requires different QoS to meet different QoS requirements of different traffic
flows , an efficient queuing scheme is necessary due to the instability of wireless transmission
environment therefore traffic scheduling is used to ensure that QoS requirements are met.
Eventhough IEEE 802.16e was developed with QoS requirements, the scheduling standard does
not specify traffic scheduling requirements, instead such implementation are render specific.
Scheduling schemes are used to resolve conflict for shred resource in a network by allocating
bandwidth to each requested users and determine the transmission priority.Each flow requires a
certain minimum bandwidth to achieve its QoS. Bandwidth allocation to traffic classes should be
in such a way that fairness criteria is met with. Hence, we propose a dynamic bandwidth
allocation mechanism to achieve fair and efficient allocation.
Hence we propose a framework known as Dynamic QoS based Bandwidth Allocation. The aim is
to resolve the problem of bandwidth allocation in IEEE802.16e.
There are several advantage in allocating the bandwidth dynamically: (1) all users are typically
not connected to the network at one time (2) even when connected, users are not transmitting data
at all times (3) most traffic occurs in bursts, there are gaps between packets of information that
can be filled with other user traffic.
2. RELATED WORKS
The MAC scheduler in WiMAX technology is a crucial issue to design. The most important is to
fulfill design constraints like QoSguarantee minimum throughput. Among several scheduling
algorithms such as algorithms,Intra class scheduling (Round Robin, Weighted Round Robin,
Deficit Round Robin,Delay Based), Inter class Scheduling (priority based algorithm, channel
aware schedulers), the best suited WiMAX MAC scheduler is Weighted fair Queuing its dynamic
nature make it more simple than other algorithms[1] .
The main objective of this work is to provide an implementation of IEEE 802.16 e standard using
dynamic fuzzy based priority scheduler. Scheduling process is being done in two stages the
requests are classified in terms of priority using fuzzy logic and the request are scheduled using
neural networks[2].
International Journal of Computational Science and Information Technology (IJCSITY) Vol.2, No.2, May 2014
57
A detailed performance comparison of some scheduling algorithms such as Deficit Round
Robin,Proportional Fair and Weighted Deficit Round Robin by taking into account their radio
channels condition and the throughput improvement [3].
A scheduling scheme for the QoS classes in WiMAX, which considers the pricing factor in the
optimization of resource usage and resource allocation.Wireless technologies are facing
challenging issues with respect to new applications and increased user demands. Most of the
challenging issues dealt with wireless signal propogation problem such as
noise,fading,interference and so on. Although traditional problems such as the limited radio
spectrum still remain among key problems, more sophisticated problems have evolved, which
deal with QoS, resource allocation and resource reservation.One main issue in providing
multimedia services: The proposed DQBA is implemented in three blocks, they are call
admission control Tier1 and Tier2 .The admission control policy is implemented in the cache
module. The packet scheduling is implemented in two levels, the first is intra class scheduling is
done in tier 1 and interclass scheduling in tier 2.
Providing the required QoS level depends on four operations they are connection admission
control, packet scheduling,traffic shaping and traffic policing. Packet scheduling consists of
serving the resource requests which have been sent by the mobile users and queued at the base
station level. Scheduling is based on two orthogonal components which are deciding the order of
serving the user request and managing the service queue .Scheduling architecture for an IEEE
802.16 should guarantee efficient bandwidth utilization while providing fairness between users
and responding correctly to the QoS constraints of real time application.
Two types of scheduling architecture are traditional scheduling architecture and new scheduling
architecture. Traditional scheduling architecture are based on classical and simple scheduling
algorithms which were used earlier in the wired technologies. Thus the traditional architectures
use these algorithms initially while other architectures implement additional mechanism in order
to extend these algorithms so that they become more suited to the IEEE 802.16 QoS context. The
two modes allowed in the allocation of the bandwidth are : (i) Grant Per Connection(GPC) and
(ii) Grant Per Subscriber Station (GPSS). When there are more connections its being compulsory
for he users to use the 66 GHz PHY specifications [5],[6] .
WiMAX Forum [10] according to IEEE 802.16e-2005standard defines the air interface of
WiMAX system inPhysical (PHY) layer. WiMAX system can use bothOrthogonal Frequency
Division Multiplexing (OFDM)and Orthogonal Frequency Division MultiplexingAccess
(OFDMA) modulation technology, to effectivelyprovide multi-path access in Non-Line-of-
Sight(NLOS)environment. Thus, WiMAX will choose appropriatebandwidth at 1.25~20 MHz,
according to the frequencyresource and service flow demand. WiMAX Physicallayer adopts to
TDD mode, to choose proportion framefor Uplink and Downlink direction according to the
Unsolicited grant service (UGS) that supports constant bit rate such as voice application .Real
Time Polling Service (rtPS) support real time data streams that contain variable size data packets
which are issued as periodic intervals such as MPEG video.Extended Real Time Polling
Service(ertPS) applicable with variable rate real time applications that require data rate with delay
guarantees like VoIP with silence suppression.Non Real Time Polling Service (nrtPS) supports
delaytolerance data streams that contains variable size data packets that require a minimum data
rate like FTP. Best Effort (BE) support data streams that donot need any QoS guarantees like
HTTP.While considering the pricing factor in case of resource optimization and allocation of
International Journal of Computational Science and Information Technology (IJCSITY) Vol.2, No.2, May 2014
58
resources it provides a higher revenue for the service providers by the pricing model which is
being provided by the Radio Resource Management (RRM) which was given by Belghith
scheduling scheme. This clearly have an impact on the utilization overall performance operation.
For various service classes different types of pricing schemes where introduced. In case of the
economic impact the fairness in allocation of resources could be affected and can even make an
impact
Table1.Types Of Traffic And Application
3. PROPOSED WORK
The objective of this framework is to provide the best Quality of Service and which would pave
way for the reduction in the number of call drops, even the starvation problem and wastage of
resources in the fixed bandwidth allocation can be solved. This can be given by the
methodologies which follows Call Admission Control followed by Tier1 and then Tier2. For this
task the operations performed are scheduling, bandwidth allocation and admission control. The
five different classes follows Unsolicited Grant Service(UGS), Extended Real Time Polling
Service(ertPS), Non Real Time Polling Service(nrtPS), Real Time Polling Service(rtPS) and Best
Effort(BE).
3.1 Packet Scheduling
In case of UGS it uses Earliest Deadline First (EDF) which includes the latency period and the
arrival timeit is also a kind of priority based algorithm which provides the delay guarantee service
for its users. In case of rtPS and ertPS, Weighted Fair Queuing (WFQ) is being used. It result in
the superior performance compared with the other algorithms with the presence of the variable
sized packets and the reason behind that is, it does not consider the starting time of the packets.
The nrtPS uses Round Robin(RR) algorithm. It is the most basic scheduling algorithm it can
distribute the channel resources to all the substation. In tier2, Weighted Fair Queuing can ensure
satisfactory response time to all kinds of critical applications, such as interactive and transaction
based ones,that are being intolerant to performance degradation.A Dynamic WFQ [9][10] is able
to dynamically and consistently adapt the queue weights according to the time-variant amount of
the incoming traffic and the preassigned target QoS.
SERVICE CLASS CLASS 1 CLASS 2 CLASS 3 CLASS 4 CLASS 5
TYPE OF
TRAFFIC
UGS ertPS rtPS nrtPS BE
PRIORITY
LEVEL
5 4 3 2 1
BANDWIDTH
REQUIREMENT
5Mbps 3 Mbps 1.5 Mbps 64 Kpbs 32 Kpbs
APPLICATION Voice video Video Audio Email
International Journal of Computational Science and Information Technology (IJCSITY) Vol.2, No.2, May 2014
59
STEP 1:
Fig 2. Intra class scheduling
3.2 Bandwidth Allocation
The bandwidth is dynamically allocated based on BVal.BVal is calculated by considering
fairness, utilization and delay bound. BVal is an important parameter used for packet scheduling,
call admission control and dynamic bandwidth allocation by integrating traffic and network
characteristics
Algorithm 1 :BVal calculation
1: GET incoming packets
2: GETutilization,fairness and delay bound for each service request.
3:GET the requested bandwidth
4: For each service request
5: if ( F (i,j)
≥ F(i,j-1)
(i,j)
) and (U (i,j)
≥ U(i,j-1) )
6: then (BVal(i,j+1)
= £(i.,j)
)
7: elseif(F (i,j)
< F (i,j-i)
(i,j)
8: then ( BVal(i,j+1)
) = £ (i,j-1)
(i,j)
( 1+ F(i,j-1) )
9: elseif( U(i,j)
< U(i,j-1)
(i,j)
)
10: then ( BVal(i,j+1)
= £ (i,j-1)
(i,j)
( 1+ U (i,j-1) )
11:elseif( F(i,j)
< F(i,j-1))
12: then ( BVal(i,j+1)
= £(i,j)
( 1+ F (i,j)
+ U(i,j)
)
13:if (D < 10)
14: thenbdcap = BVal * 15
15:if (D < 20)
EDF
WFQ
WFQ
FIFO
INTER CLASS INTRA-CLASS
(TIER 1)
RR
International Journal of Computational Science and Information Technology (IJCSITY) Vol.2, No.2, May 2014
59
STEP 1:
Fig 2. Intra class scheduling
3.2 Bandwidth Allocation
The bandwidth is dynamically allocated based on BVal.BVal is calculated by considering
fairness, utilization and delay bound. BVal is an important parameter used for packet scheduling,
call admission control and dynamic bandwidth allocation by integrating traffic and network
characteristics
Algorithm 1 :BVal calculation
1: GET incoming packets
2: GETutilization,fairness and delay bound for each service request.
3:GET the requested bandwidth
4: For each service request
5: if ( F (i,j)
≥ F(i,j-1)
(i,j)
) and (U (i,j)
≥ U(i,j-1) )
6: then (BVal(i,j+1)
= £(i.,j)
)
7: elseif(F (i,j)
< F (i,j-i)
(i,j)
8: then ( BVal(i,j+1)
) = £ (i,j-1)
(i,j)
( 1+ F(i,j-1) )
9: elseif( U(i,j)
< U(i,j-1)
(i,j)
)
10: then ( BVal(i,j+1)
= £ (i,j-1)
(i,j)
( 1+ U (i,j-1) )
11:elseif( F(i,j)
< F(i,j-1))
12: then ( BVal(i,j+1)
= £(i,j)
( 1+ F (i,j)
+ U(i,j)
)
13:if (D < 10)
14: thenbdcap = BVal * 15
15:if (D < 20)
EDF
WFQ
WFQ
FIFO
INTER CLASS INTRA-CLASS
(TIER 1)
RR
International Journal of Computational Science and Information Technology (IJCSITY) Vol.2, No.2, May 2014
59
STEP 1:
Fig 2. Intra class scheduling
3.2 Bandwidth Allocation
The bandwidth is dynamically allocated based on BVal.BVal is calculated by considering
fairness, utilization and delay bound. BVal is an important parameter used for packet scheduling,
call admission control and dynamic bandwidth allocation by integrating traffic and network
characteristics
Algorithm 1 :BVal calculation
1: GET incoming packets
2: GETutilization,fairness and delay bound for each service request.
3:GET the requested bandwidth
4: For each service request
5: if ( F (i,j)
≥ F(i,j-1)
(i,j)
) and (U (i,j)
≥ U(i,j-1) )
6: then (BVal(i,j+1)
= £(i.,j)
)
7: elseif(F (i,j)
< F (i,j-i)
(i,j)
8: then ( BVal(i,j+1)
) = £ (i,j-1)
(i,j)
( 1+ F(i,j-1) )
9: elseif( U(i,j)
< U(i,j-1)
(i,j)
)
10: then ( BVal(i,j+1)
= £ (i,j-1)
(i,j)
( 1+ U (i,j-1) )
11:elseif( F(i,j)
< F(i,j-1))
12: then ( BVal(i,j+1)
= £(i,j)
( 1+ F (i,j)
+ U(i,j)
)
13:if (D < 10)
14: thenbdcap = BVal * 15
15:if (D < 20)
EDF
WFQ
WFQ
FIFO
INTER CLASS INTRA-CLASS
(TIER 1)
RR
International Journal of Computational Science and Information Technology (IJCSITY) Vol.2, No.2, May 2014
60
16: thenbdcap = BVal * 10
17:if (D < 30)
18:thenbdcap = BVal * 5
19: if (D < 40)
20: thenbdcap = BVal * 2.5
13: Endfor
14: ReturnBVal value
We define fairness as the ratio of the allocated bandwidth by the requested bandwidth,
F(i,j)
= (Abnw(i,j)
/Rbnw(i,j)
)
And utilization is defined as the ratio of the used network resources to the available resources
U(i,j)
= ( T(i,j)
/Abnw(i,j)
)
Residual bandwidth= allocated bandwidth – requested bandwidth
Bandwidth is allocated dynamically based on BVal.
STEP 2 :
Fig 3. Inter class scheduling.
International Journal of Computational Science and Information Technology (IJCSITY) Vol.2, No.2, May 2014
60
16: thenbdcap = BVal * 10
17:if (D < 30)
18:thenbdcap = BVal * 5
19: if (D < 40)
20: thenbdcap = BVal * 2.5
13: Endfor
14: ReturnBVal value
We define fairness as the ratio of the allocated bandwidth by the requested bandwidth,
F(i,j)
= (Abnw(i,j)
/Rbnw(i,j)
)
And utilization is defined as the ratio of the used network resources to the available resources
U(i,j)
= ( T(i,j)
/Abnw(i,j)
)
Residual bandwidth= allocated bandwidth – requested bandwidth
Bandwidth is allocated dynamically based on BVal.
STEP 2 :
Fig 3. Inter class scheduling.
International Journal of Computational Science and Information Technology (IJCSITY) Vol.2, No.2, May 2014
60
16: thenbdcap = BVal * 10
17:if (D < 30)
18:thenbdcap = BVal * 5
19: if (D < 40)
20: thenbdcap = BVal * 2.5
13: Endfor
14: ReturnBVal value
We define fairness as the ratio of the allocated bandwidth by the requested bandwidth,
F(i,j)
= (Abnw(i,j)
/Rbnw(i,j)
)
And utilization is defined as the ratio of the used network resources to the available resources
U(i,j)
= ( T(i,j)
/Abnw(i,j)
)
Residual bandwidth= allocated bandwidth – requested bandwidth
Bandwidth is allocated dynamically based on BVal.
STEP 2 :
Fig 3. Inter class scheduling.
International Journal of Computational Science and Information Technology (IJCSITY) Vol.2, No.2, May 2014
61
3.3 CAC (Call Admission Control)
Usually CAC procedure is being implemented at the BS that ensures the load supplied through
the subscriber station (SS) can be taken over by a network. The choice of the call admission
policy that is to be adopted in an IEEE802.16 network is being strongly associated with the
scheduling mechanisms used. CAC restricts the access to the network to prevent congestion or
service degradation for the users those are already being accepted. It also prevents the system
before being overloaded.
Fig 3.Call Admission Control
4. SIMULATION AND RESULTS
This section discusses the performance evaluation of the proposed algorithm. The simulations
were conducted using MATlab.
Fig 4: Intra class scheduling of UGS users
0
0.5
1
1.5
2
2.5
3
1 2 3 4 5
ugsBVal
International Journal of Computational Science and Information Technology (IJCSITY) Vol.2, No.2, May 2014
62
Fig 5 .Intra class scheduling of nrtPS users
Fig 5.Intra class scheduling of rtPS users
Fig 6. Intra class scheduling of ertPS users
0
0.5
1
1.5
2
1 2 3 4 5
nrtpsBVal
0
0.5
1
1.5
2
2.5
1 2 3 4 5
rtPSBVal
0
0.5
1
1.5
2
2.5
1 2 3 4 5
ertpsBVal
International Journal of Computational Science and Information Technology (IJCSITY) Vol.2, No.2, May 2014
63
Fig 7. Intra class scheduling of BE users
This result shows that intra class scheduling is done among all the five types of service classes by
comparing the corresponding the utilisation and fairness of each packets .Fig 4 shows that UGS
packets are ordered within the UGS class itself i.e.intraclass scheduling. Likewise
nrtPS,rtPS,ertPS and BE traffic is ordered which is shown in Fig 5, 6, 7 respectively
Fig 8. Fixed bandwidth allocation
We can infer from the fig.8 that only higher priority is getting the service leaving behind the
lower priorities, thus higher priority starve the bandwidth of lower priority. This cause the
starvation problem.
0
0.2
0.4
0.6
0.8
1
1.2
1.4
1.6
1 2 3 4 5
beBVal
0
1
2
3
4
5
6
7
8
9
ugs
ugs
ugs
ertps
ertps
ertps
rtps
rtps
rtps
nrtps
nrtps
nrtps
be
be
be
Series1
International Journal of Computational Science and Information Technology (IJCSITY) Vol.2, No.2, May 2014
64
Fig 9 : Inter class scheduling
A traffic seperation in both inter and intra class levels is shown and the QoS suport is being
guaranteed by both real time and non real time application.Thus if the bandwidth available is less
than the requested by the higher priority, then the lower priority will be served in order to provide
a fair solution for the lower priorities. Fig 9 shows that lower priority applications are not
completely suffering from starvation problem.
5. CONCLUSION
In this paper we proposed a framework which supports all kinds of service flows and provide a
fair share of bandwidth by using several strategies such as multilevel queuing discipline, QoS
differentiation and unused bandwidth reallocation, thus the network performence is being
improved .This result indicate that eventhough the low priority flows or not completely starved,
the higher priority applications are consuming a considerable portion of the bandwidth .thus the
simulatuion result shows that the the utilization has been increased which directly affects the
reduction of the call blocking property.
6. REFERENCE
[1] Comparitive study of different scheduling algorithms for WiMAX MAC scheduler design.Gajanan M.
Galshetwar, Prof. AmuthaJayakumar , Yashika Mittal
[2] An Enhanced Scheduling Scheme for QoS in mobile WiMAX networks. D.DavidNeelaPon Kumar,
Jithin Kumar, K. Arun Kumar, K.Murugesan
[3] Comparison Of Different Scheduling Algorithms For WiMAX base station. JaniLakkakori,
AlexandarSayenko, JaniMoilanen. Las Vegas, Nevada: IEEE Wireless Communication and
Networking Conference WCNC, 2008, Vol. 08. 1525-3511.
[4] A.Belghith, “Pricing Based Schedulers for WiMAX “, in Proc. IEEE Int Conf. Wireless Mobile
Computer, Netw. Communication WIMOB , Oct 12-14, 2009, pp.202-207
[5] IEEE 802.16 Standard (2004), “IEEE Standard For Local and Metropolitan Area Networks – Part 16:
Air Interface for Fixed Broadband Wireless Access Systems”.
[6] Robert Holte, Al Mok, Louis Rosier, Igor Tulcjinsky and Donald Varvel, “The Pinwheel: A Real
Time Scheduling Problem”. Proc of the 22nd Hawaii International Conference on System Science,
1989, pp 693-702.
[7] K .Wongthavarawat and A.Ganz, “ Packet Scheduling for QoS Support in IEEE802.16 broadband
wireless access systems,” Int. J. Commun. Syst., vol. 16, no. 1,pp. 81-96, Feb.2003.
0
0.5
1
1.5
2
2.5
3
ugs
rtps
ugs
nrtps
be
rtps
ertps
ugs
rtps
be
nrtps
ertps
rtps
rtps
be
ugs
rtps
ertps
be
Series1
International Journal of Computational Science and Information Technology (IJCSITY) Vol.2, No.2, May 2014
65
[8] J.Chen, W.Jiao, and Q.Guo, “Providing integrated QoS control for IEEE 802.16 broadband wireless
access systems ,” in Proc. VTC,Dallas,TX,2005, vol. 2, pp. 1254-1258,
[9] Chin-Chang Li, Shiano-Li Tsao, Mengchengchen, Yaeli Sun, Yueh-Min Huang, Proportional Delay
Differentation Service Based on Weighted Fair Queuing.
[10] Kun Pang Xiaokang Lin JunliXuedaoGu Nat, Dynamic WFQ scheduling for real-time traffic in
wireless ATM links, CommunicationTechnology Proceedings, 2000
Authors
B.Sridevi, Assistant Professor of ECE Department of Velammal College of
Engineering & Technology, Madurai, obtained her B.E., degree from A.C.C.E.T
Karaikudi, Madurai Kamaraj University, Madurai and M.E. degree from Anna
University, Chennai. She has 2 years of Industrial experience, 10 years of
Teaching,and Research experience. Pursuing Ph.D. in Anna University, Tirunelveli in
Networking. She published many research papers in International journals, national
and international conferences. Her area of research includes Network Security,
Wireless Networks.
V. S. Primiya, pursuing Bachelor of engineering in Velammal College of Engineering
and Technology, Madurai-625009. Her area of interest is wireless networks
R.AnanthaPriya, pursuing Bachelor of engineering in Velammal College of
Engineering and Technology, Madurai-625009. Her area of interest is wireless
networks

Weitere ähnliche Inhalte

Was ist angesagt?

Implementing a Session Aware Policy Based Mechanism for QoS Control in LTE
Implementing a Session Aware Policy Based Mechanism for QoS Control in LTEImplementing a Session Aware Policy Based Mechanism for QoS Control in LTE
Implementing a Session Aware Policy Based Mechanism for QoS Control in LTEIJERA Editor
 
QOS-APCVS: AN ENHANCED EPS-IMS PCC ARCHITECTURE PROPOSAL TO IMPROVE MOBILE SE...
QOS-APCVS: AN ENHANCED EPS-IMS PCC ARCHITECTURE PROPOSAL TO IMPROVE MOBILE SE...QOS-APCVS: AN ENHANCED EPS-IMS PCC ARCHITECTURE PROPOSAL TO IMPROVE MOBILE SE...
QOS-APCVS: AN ENHANCED EPS-IMS PCC ARCHITECTURE PROPOSAL TO IMPROVE MOBILE SE...ecij
 
HANDOVER NECESSITY ESTIMATION FOR 4G HETEROGENEOUS NETWORKS
HANDOVER NECESSITY ESTIMATION FOR 4G HETEROGENEOUS NETWORKSHANDOVER NECESSITY ESTIMATION FOR 4G HETEROGENEOUS NETWORKS
HANDOVER NECESSITY ESTIMATION FOR 4G HETEROGENEOUS NETWORKSijistjournal
 
ANALYTIC HIERARCHY PROCESS FOR QOS EVALUATION OF MOBILE DATA NETWORKS
ANALYTIC HIERARCHY PROCESS FOR QOS EVALUATION OF MOBILE DATA NETWORKSANALYTIC HIERARCHY PROCESS FOR QOS EVALUATION OF MOBILE DATA NETWORKS
ANALYTIC HIERARCHY PROCESS FOR QOS EVALUATION OF MOBILE DATA NETWORKSIJCNCJournal
 
NETWORK PERFORMANCE EVALUATION WITH REAL TIME APPLICATION ENSURING QUALITY OF...
NETWORK PERFORMANCE EVALUATION WITH REAL TIME APPLICATION ENSURING QUALITY OF...NETWORK PERFORMANCE EVALUATION WITH REAL TIME APPLICATION ENSURING QUALITY OF...
NETWORK PERFORMANCE EVALUATION WITH REAL TIME APPLICATION ENSURING QUALITY OF...ijngnjournal
 
A Novel Parameterized QoS based Uplink and Downlink Scheduler for Bandwidth/D...
A Novel Parameterized QoS based Uplink and Downlink Scheduler for Bandwidth/D...A Novel Parameterized QoS based Uplink and Downlink Scheduler for Bandwidth/D...
A Novel Parameterized QoS based Uplink and Downlink Scheduler for Bandwidth/D...IDES Editor
 
A Proposal for End-to-End QoS Provisioning in Software-Defined Networks
A Proposal for End-to-End QoS Provisioning in Software-Defined NetworksA Proposal for End-to-End QoS Provisioning in Software-Defined Networks
A Proposal for End-to-End QoS Provisioning in Software-Defined NetworksIJECEIAES
 
Traffic-aware adaptive server load balancing for softwaredefined networks
Traffic-aware adaptive server load balancing for softwaredefined networks Traffic-aware adaptive server load balancing for softwaredefined networks
Traffic-aware adaptive server load balancing for softwaredefined networks IJECEIAES
 
Performance evaluation of interference aware topology power and flow control ...
Performance evaluation of interference aware topology power and flow control ...Performance evaluation of interference aware topology power and flow control ...
Performance evaluation of interference aware topology power and flow control ...IJECEIAES
 
Handover Behaviour of Transparent Relay in WiMAX Networks
Handover Behaviour of Transparent Relay in WiMAX NetworksHandover Behaviour of Transparent Relay in WiMAX Networks
Handover Behaviour of Transparent Relay in WiMAX NetworksIDES Editor
 
EFFICIENT PACKET DELIVERY APPROACH FOR ADHOC WIRELESS NETWORKS
EFFICIENT PACKET DELIVERY APPROACH FOR ADHOC WIRELESS NETWORKS EFFICIENT PACKET DELIVERY APPROACH FOR ADHOC WIRELESS NETWORKS
EFFICIENT PACKET DELIVERY APPROACH FOR ADHOC WIRELESS NETWORKS cscpconf
 
An Approach to Improve the Quality of Service in OFDMA Relay Networks via Re-...
An Approach to Improve the Quality of Service in OFDMA Relay Networks via Re-...An Approach to Improve the Quality of Service in OFDMA Relay Networks via Re-...
An Approach to Improve the Quality of Service in OFDMA Relay Networks via Re-...iosrjce
 
A MAC PROTOCOL WITH DYNAMIC ALLOCATION OF TIME SLOTS BASED ON TRAFFIC PRIORIT...
A MAC PROTOCOL WITH DYNAMIC ALLOCATION OF TIME SLOTS BASED ON TRAFFIC PRIORIT...A MAC PROTOCOL WITH DYNAMIC ALLOCATION OF TIME SLOTS BASED ON TRAFFIC PRIORIT...
A MAC PROTOCOL WITH DYNAMIC ALLOCATION OF TIME SLOTS BASED ON TRAFFIC PRIORIT...ijaia
 
IRJET- Aggregate Signature Scheme and Secured ID for Wireless Sensor Netw...
IRJET-  	  Aggregate Signature Scheme and Secured ID for Wireless Sensor Netw...IRJET-  	  Aggregate Signature Scheme and Secured ID for Wireless Sensor Netw...
IRJET- Aggregate Signature Scheme and Secured ID for Wireless Sensor Netw...IRJET Journal
 
IRJET - A Review on Congestion Control Methods in Mobile Adhoc Networks
IRJET - A Review on Congestion Control Methods in Mobile Adhoc NetworksIRJET - A Review on Congestion Control Methods in Mobile Adhoc Networks
IRJET - A Review on Congestion Control Methods in Mobile Adhoc NetworksIRJET Journal
 

Was ist angesagt? (17)

Implementing a Session Aware Policy Based Mechanism for QoS Control in LTE
Implementing a Session Aware Policy Based Mechanism for QoS Control in LTEImplementing a Session Aware Policy Based Mechanism for QoS Control in LTE
Implementing a Session Aware Policy Based Mechanism for QoS Control in LTE
 
QOS-APCVS: AN ENHANCED EPS-IMS PCC ARCHITECTURE PROPOSAL TO IMPROVE MOBILE SE...
QOS-APCVS: AN ENHANCED EPS-IMS PCC ARCHITECTURE PROPOSAL TO IMPROVE MOBILE SE...QOS-APCVS: AN ENHANCED EPS-IMS PCC ARCHITECTURE PROPOSAL TO IMPROVE MOBILE SE...
QOS-APCVS: AN ENHANCED EPS-IMS PCC ARCHITECTURE PROPOSAL TO IMPROVE MOBILE SE...
 
HANDOVER NECESSITY ESTIMATION FOR 4G HETEROGENEOUS NETWORKS
HANDOVER NECESSITY ESTIMATION FOR 4G HETEROGENEOUS NETWORKSHANDOVER NECESSITY ESTIMATION FOR 4G HETEROGENEOUS NETWORKS
HANDOVER NECESSITY ESTIMATION FOR 4G HETEROGENEOUS NETWORKS
 
ANALYTIC HIERARCHY PROCESS FOR QOS EVALUATION OF MOBILE DATA NETWORKS
ANALYTIC HIERARCHY PROCESS FOR QOS EVALUATION OF MOBILE DATA NETWORKSANALYTIC HIERARCHY PROCESS FOR QOS EVALUATION OF MOBILE DATA NETWORKS
ANALYTIC HIERARCHY PROCESS FOR QOS EVALUATION OF MOBILE DATA NETWORKS
 
NETWORK PERFORMANCE EVALUATION WITH REAL TIME APPLICATION ENSURING QUALITY OF...
NETWORK PERFORMANCE EVALUATION WITH REAL TIME APPLICATION ENSURING QUALITY OF...NETWORK PERFORMANCE EVALUATION WITH REAL TIME APPLICATION ENSURING QUALITY OF...
NETWORK PERFORMANCE EVALUATION WITH REAL TIME APPLICATION ENSURING QUALITY OF...
 
B010410411
B010410411B010410411
B010410411
 
Ly3421472152
Ly3421472152Ly3421472152
Ly3421472152
 
A Novel Parameterized QoS based Uplink and Downlink Scheduler for Bandwidth/D...
A Novel Parameterized QoS based Uplink and Downlink Scheduler for Bandwidth/D...A Novel Parameterized QoS based Uplink and Downlink Scheduler for Bandwidth/D...
A Novel Parameterized QoS based Uplink and Downlink Scheduler for Bandwidth/D...
 
A Proposal for End-to-End QoS Provisioning in Software-Defined Networks
A Proposal for End-to-End QoS Provisioning in Software-Defined NetworksA Proposal for End-to-End QoS Provisioning in Software-Defined Networks
A Proposal for End-to-End QoS Provisioning in Software-Defined Networks
 
Traffic-aware adaptive server load balancing for softwaredefined networks
Traffic-aware adaptive server load balancing for softwaredefined networks Traffic-aware adaptive server load balancing for softwaredefined networks
Traffic-aware adaptive server load balancing for softwaredefined networks
 
Performance evaluation of interference aware topology power and flow control ...
Performance evaluation of interference aware topology power and flow control ...Performance evaluation of interference aware topology power and flow control ...
Performance evaluation of interference aware topology power and flow control ...
 
Handover Behaviour of Transparent Relay in WiMAX Networks
Handover Behaviour of Transparent Relay in WiMAX NetworksHandover Behaviour of Transparent Relay in WiMAX Networks
Handover Behaviour of Transparent Relay in WiMAX Networks
 
EFFICIENT PACKET DELIVERY APPROACH FOR ADHOC WIRELESS NETWORKS
EFFICIENT PACKET DELIVERY APPROACH FOR ADHOC WIRELESS NETWORKS EFFICIENT PACKET DELIVERY APPROACH FOR ADHOC WIRELESS NETWORKS
EFFICIENT PACKET DELIVERY APPROACH FOR ADHOC WIRELESS NETWORKS
 
An Approach to Improve the Quality of Service in OFDMA Relay Networks via Re-...
An Approach to Improve the Quality of Service in OFDMA Relay Networks via Re-...An Approach to Improve the Quality of Service in OFDMA Relay Networks via Re-...
An Approach to Improve the Quality of Service in OFDMA Relay Networks via Re-...
 
A MAC PROTOCOL WITH DYNAMIC ALLOCATION OF TIME SLOTS BASED ON TRAFFIC PRIORIT...
A MAC PROTOCOL WITH DYNAMIC ALLOCATION OF TIME SLOTS BASED ON TRAFFIC PRIORIT...A MAC PROTOCOL WITH DYNAMIC ALLOCATION OF TIME SLOTS BASED ON TRAFFIC PRIORIT...
A MAC PROTOCOL WITH DYNAMIC ALLOCATION OF TIME SLOTS BASED ON TRAFFIC PRIORIT...
 
IRJET- Aggregate Signature Scheme and Secured ID for Wireless Sensor Netw...
IRJET-  	  Aggregate Signature Scheme and Secured ID for Wireless Sensor Netw...IRJET-  	  Aggregate Signature Scheme and Secured ID for Wireless Sensor Netw...
IRJET- Aggregate Signature Scheme and Secured ID for Wireless Sensor Netw...
 
IRJET - A Review on Congestion Control Methods in Mobile Adhoc Networks
IRJET - A Review on Congestion Control Methods in Mobile Adhoc NetworksIRJET - A Review on Congestion Control Methods in Mobile Adhoc Networks
IRJET - A Review on Congestion Control Methods in Mobile Adhoc Networks
 

Andere mochten auch

DWDM-RAM:Enabling Grid Services with Dynamic Optical Networks
DWDM-RAM:Enabling Grid Services with Dynamic Optical NetworksDWDM-RAM:Enabling Grid Services with Dynamic Optical Networks
DWDM-RAM:Enabling Grid Services with Dynamic Optical NetworksTal Lavian Ph.D.
 
AN ENERGY EFFICIENT COUNTERMEASURE AGAINST MULTIPLE ATTACKS OF THE FALSE DATA...
AN ENERGY EFFICIENT COUNTERMEASURE AGAINST MULTIPLE ATTACKS OF THE FALSE DATA...AN ENERGY EFFICIENT COUNTERMEASURE AGAINST MULTIPLE ATTACKS OF THE FALSE DATA...
AN ENERGY EFFICIENT COUNTERMEASURE AGAINST MULTIPLE ATTACKS OF THE FALSE DATA...ijcsity
 
60번 주강욱 예방논문2 발표
60번 주강욱 예방논문2 발표60번 주강욱 예방논문2 발표
60번 주강욱 예방논문2 발표Benedict Choi
 
What is Personal Branding
What is Personal BrandingWhat is Personal Branding
What is Personal BrandingJon Parks
 
Office box user guide_v3.0
Office box user guide_v3.0Office box user guide_v3.0
Office box user guide_v3.0Jiransoft
 
Novel text categorization by amalgamation of augmented k nearest neighbourhoo...
Novel text categorization by amalgamation of augmented k nearest neighbourhoo...Novel text categorization by amalgamation of augmented k nearest neighbourhoo...
Novel text categorization by amalgamation of augmented k nearest neighbourhoo...ijcsity
 
Introducing ViewToo v.2.0
Introducing ViewToo v.2.0Introducing ViewToo v.2.0
Introducing ViewToo v.2.0Jiransoft
 
Google Plus and Your Mobile Recruiting Strategy
Google Plus and Your Mobile Recruiting StrategyGoogle Plus and Your Mobile Recruiting Strategy
Google Plus and Your Mobile Recruiting StrategyJon Parks
 
Introducing OfficeBox (Oct.2013)
Introducing OfficeBox (Oct.2013)Introducing OfficeBox (Oct.2013)
Introducing OfficeBox (Oct.2013)Jiransoft
 
Cancer recurrence prediction using
Cancer recurrence prediction usingCancer recurrence prediction using
Cancer recurrence prediction usingijcsity
 
Questione di prospettiva
Questione di prospettivaQuestione di prospettiva
Questione di prospettivaAndrea Sollena
 
ANALYSE THE PERFORMANCE OF MOBILE PEER TO PEER NETWORK USING ANT COLONY OPTIM...
ANALYSE THE PERFORMANCE OF MOBILE PEER TO PEER NETWORK USING ANT COLONY OPTIM...ANALYSE THE PERFORMANCE OF MOBILE PEER TO PEER NETWORK USING ANT COLONY OPTIM...
ANALYSE THE PERFORMANCE OF MOBILE PEER TO PEER NETWORK USING ANT COLONY OPTIM...ijcsity
 
37번 여의주 예방논문1 발표
37번 여의주 예방논문1 발표37번 여의주 예방논문1 발표
37번 여의주 예방논문1 발표Benedict Choi
 
Convergence tendency of genetic algorithms and artificial immune system in so...
Convergence tendency of genetic algorithms and artificial immune system in so...Convergence tendency of genetic algorithms and artificial immune system in so...
Convergence tendency of genetic algorithms and artificial immune system in so...ijcsity
 
A Fresh Look at Google Analytics
A Fresh Look at Google AnalyticsA Fresh Look at Google Analytics
A Fresh Look at Google AnalyticsJon Parks
 

Andere mochten auch (20)

Wi Max
Wi MaxWi Max
Wi Max
 
MTP PPT1
MTP PPT1MTP PPT1
MTP PPT1
 
DWDM-RAM:Enabling Grid Services with Dynamic Optical Networks
DWDM-RAM:Enabling Grid Services with Dynamic Optical NetworksDWDM-RAM:Enabling Grid Services with Dynamic Optical Networks
DWDM-RAM:Enabling Grid Services with Dynamic Optical Networks
 
AN ENERGY EFFICIENT COUNTERMEASURE AGAINST MULTIPLE ATTACKS OF THE FALSE DATA...
AN ENERGY EFFICIENT COUNTERMEASURE AGAINST MULTIPLE ATTACKS OF THE FALSE DATA...AN ENERGY EFFICIENT COUNTERMEASURE AGAINST MULTIPLE ATTACKS OF THE FALSE DATA...
AN ENERGY EFFICIENT COUNTERMEASURE AGAINST MULTIPLE ATTACKS OF THE FALSE DATA...
 
60번 주강욱 예방논문2 발표
60번 주강욱 예방논문2 발표60번 주강욱 예방논문2 발표
60번 주강욱 예방논문2 발표
 
What is Personal Branding
What is Personal BrandingWhat is Personal Branding
What is Personal Branding
 
Office box user guide_v3.0
Office box user guide_v3.0Office box user guide_v3.0
Office box user guide_v3.0
 
Novel text categorization by amalgamation of augmented k nearest neighbourhoo...
Novel text categorization by amalgamation of augmented k nearest neighbourhoo...Novel text categorization by amalgamation of augmented k nearest neighbourhoo...
Novel text categorization by amalgamation of augmented k nearest neighbourhoo...
 
Introducing ViewToo v.2.0
Introducing ViewToo v.2.0Introducing ViewToo v.2.0
Introducing ViewToo v.2.0
 
Google Plus and Your Mobile Recruiting Strategy
Google Plus and Your Mobile Recruiting StrategyGoogle Plus and Your Mobile Recruiting Strategy
Google Plus and Your Mobile Recruiting Strategy
 
Introducing OfficeBox (Oct.2013)
Introducing OfficeBox (Oct.2013)Introducing OfficeBox (Oct.2013)
Introducing OfficeBox (Oct.2013)
 
Hr
HrHr
Hr
 
Cancer recurrence prediction using
Cancer recurrence prediction usingCancer recurrence prediction using
Cancer recurrence prediction using
 
Questione di prospettiva
Questione di prospettivaQuestione di prospettiva
Questione di prospettiva
 
Ingles jess
Ingles jessIngles jess
Ingles jess
 
ANALYSE THE PERFORMANCE OF MOBILE PEER TO PEER NETWORK USING ANT COLONY OPTIM...
ANALYSE THE PERFORMANCE OF MOBILE PEER TO PEER NETWORK USING ANT COLONY OPTIM...ANALYSE THE PERFORMANCE OF MOBILE PEER TO PEER NETWORK USING ANT COLONY OPTIM...
ANALYSE THE PERFORMANCE OF MOBILE PEER TO PEER NETWORK USING ANT COLONY OPTIM...
 
Ejercicio
EjercicioEjercicio
Ejercicio
 
37번 여의주 예방논문1 발표
37번 여의주 예방논문1 발표37번 여의주 예방논문1 발표
37번 여의주 예방논문1 발표
 
Convergence tendency of genetic algorithms and artificial immune system in so...
Convergence tendency of genetic algorithms and artificial immune system in so...Convergence tendency of genetic algorithms and artificial immune system in so...
Convergence tendency of genetic algorithms and artificial immune system in so...
 
A Fresh Look at Google Analytics
A Fresh Look at Google AnalyticsA Fresh Look at Google Analytics
A Fresh Look at Google Analytics
 

Ähnlich wie Proposed wfq based dynamic bandwidth

Adaptive Bandwidth Management Model for Wireless Mobile Ad-hoc Network
Adaptive Bandwidth Management Model for Wireless Mobile Ad-hoc NetworkAdaptive Bandwidth Management Model for Wireless Mobile Ad-hoc Network
Adaptive Bandwidth Management Model for Wireless Mobile Ad-hoc NetworkIJCNCJournal
 
ADAPTIVE BANDWIDTH MANAGEMENT MODEL FOR WIRELESS MOBILE AD-HOC NETWORK
ADAPTIVE BANDWIDTH MANAGEMENT MODEL FOR WIRELESS MOBILE AD-HOC NETWORKADAPTIVE BANDWIDTH MANAGEMENT MODEL FOR WIRELESS MOBILE AD-HOC NETWORK
ADAPTIVE BANDWIDTH MANAGEMENT MODEL FOR WIRELESS MOBILE AD-HOC NETWORKIJCNCJournal
 
RESOURCE ALLOCATION ALGORITHMS FOR QOS OPTIMIZATION IN MOBILE WIMAX NETWORKS
RESOURCE ALLOCATION ALGORITHMS FOR QOS OPTIMIZATION IN MOBILE WIMAX NETWORKSRESOURCE ALLOCATION ALGORITHMS FOR QOS OPTIMIZATION IN MOBILE WIMAX NETWORKS
RESOURCE ALLOCATION ALGORITHMS FOR QOS OPTIMIZATION IN MOBILE WIMAX NETWORKSijwmn
 
IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANET
IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANETIMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANET
IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANETIJCNCJournal
 
Two-level scheduling scheme for integrated 4G-WLAN network
Two-level scheduling scheme for integrated 4G-WLAN network Two-level scheduling scheme for integrated 4G-WLAN network
Two-level scheduling scheme for integrated 4G-WLAN network IJECEIAES
 
DATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKS
DATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKSDATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKS
DATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKSEditor IJMTER
 
Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...
Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...
Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...Waqas Tariq
 
Ijartes v1-i3-001
Ijartes v1-i3-001Ijartes v1-i3-001
Ijartes v1-i3-001IJARTES
 
Iisrt arunkumar b (networks)
Iisrt arunkumar b (networks)Iisrt arunkumar b (networks)
Iisrt arunkumar b (networks)IISRT
 
Multi-Criteria Handoff Decision Algorithms In Wireless Networks
Multi-Criteria Handoff Decision Algorithms In Wireless NetworksMulti-Criteria Handoff Decision Algorithms In Wireless Networks
Multi-Criteria Handoff Decision Algorithms In Wireless Networksiosrjce
 
Intelligent network selection using fuzzy logic for 4 g wireless networks
Intelligent network selection using fuzzy logic for 4 g wireless networksIntelligent network selection using fuzzy logic for 4 g wireless networks
Intelligent network selection using fuzzy logic for 4 g wireless networksIAEME Publication
 
A SURVEY ON CALL ADMISSION CONTROL SCHEMES IN LTE
A SURVEY ON CALL ADMISSION CONTROL SCHEMES IN LTEA SURVEY ON CALL ADMISSION CONTROL SCHEMES IN LTE
A SURVEY ON CALL ADMISSION CONTROL SCHEMES IN LTEIJCSES Journal
 
Comparative Analysis of Quality of Service for Various Service Classes in WiM...
Comparative Analysis of Quality of Service for Various Service Classes in WiM...Comparative Analysis of Quality of Service for Various Service Classes in WiM...
Comparative Analysis of Quality of Service for Various Service Classes in WiM...Editor IJCATR
 
Performance Analysis of Wireless Networks With MDQOS
Performance Analysis of Wireless Networks With MDQOSPerformance Analysis of Wireless Networks With MDQOS
Performance Analysis of Wireless Networks With MDQOSIJERA Editor
 
A Quality of Service Strategy to Optimize Bandwidth Utilization in Mobile Net...
A Quality of Service Strategy to Optimize Bandwidth Utilization in Mobile Net...A Quality of Service Strategy to Optimize Bandwidth Utilization in Mobile Net...
A Quality of Service Strategy to Optimize Bandwidth Utilization in Mobile Net...IDES Editor
 
A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...
A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...
A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...ijasuc
 
A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...
A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...
A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...ijasuc
 

Ähnlich wie Proposed wfq based dynamic bandwidth (20)

Adaptive Bandwidth Management Model for Wireless Mobile Ad-hoc Network
Adaptive Bandwidth Management Model for Wireless Mobile Ad-hoc NetworkAdaptive Bandwidth Management Model for Wireless Mobile Ad-hoc Network
Adaptive Bandwidth Management Model for Wireless Mobile Ad-hoc Network
 
ADAPTIVE BANDWIDTH MANAGEMENT MODEL FOR WIRELESS MOBILE AD-HOC NETWORK
ADAPTIVE BANDWIDTH MANAGEMENT MODEL FOR WIRELESS MOBILE AD-HOC NETWORKADAPTIVE BANDWIDTH MANAGEMENT MODEL FOR WIRELESS MOBILE AD-HOC NETWORK
ADAPTIVE BANDWIDTH MANAGEMENT MODEL FOR WIRELESS MOBILE AD-HOC NETWORK
 
Hp3613441350
Hp3613441350Hp3613441350
Hp3613441350
 
Hp3613441350
Hp3613441350Hp3613441350
Hp3613441350
 
RESOURCE ALLOCATION ALGORITHMS FOR QOS OPTIMIZATION IN MOBILE WIMAX NETWORKS
RESOURCE ALLOCATION ALGORITHMS FOR QOS OPTIMIZATION IN MOBILE WIMAX NETWORKSRESOURCE ALLOCATION ALGORITHMS FOR QOS OPTIMIZATION IN MOBILE WIMAX NETWORKS
RESOURCE ALLOCATION ALGORITHMS FOR QOS OPTIMIZATION IN MOBILE WIMAX NETWORKS
 
IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANET
IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANETIMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANET
IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANET
 
Two-level scheduling scheme for integrated 4G-WLAN network
Two-level scheduling scheme for integrated 4G-WLAN network Two-level scheduling scheme for integrated 4G-WLAN network
Two-level scheduling scheme for integrated 4G-WLAN network
 
DATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKS
DATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKSDATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKS
DATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKS
 
Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...
Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...
Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...
 
Ijartes v1-i3-001
Ijartes v1-i3-001Ijartes v1-i3-001
Ijartes v1-i3-001
 
Iisrt arunkumar b (networks)
Iisrt arunkumar b (networks)Iisrt arunkumar b (networks)
Iisrt arunkumar b (networks)
 
Multi-Criteria Handoff Decision Algorithms In Wireless Networks
Multi-Criteria Handoff Decision Algorithms In Wireless NetworksMulti-Criteria Handoff Decision Algorithms In Wireless Networks
Multi-Criteria Handoff Decision Algorithms In Wireless Networks
 
Intelligent network selection using fuzzy logic for 4 g wireless networks
Intelligent network selection using fuzzy logic for 4 g wireless networksIntelligent network selection using fuzzy logic for 4 g wireless networks
Intelligent network selection using fuzzy logic for 4 g wireless networks
 
A SURVEY ON CALL ADMISSION CONTROL SCHEMES IN LTE
A SURVEY ON CALL ADMISSION CONTROL SCHEMES IN LTEA SURVEY ON CALL ADMISSION CONTROL SCHEMES IN LTE
A SURVEY ON CALL ADMISSION CONTROL SCHEMES IN LTE
 
Comparative Analysis of Quality of Service for Various Service Classes in WiM...
Comparative Analysis of Quality of Service for Various Service Classes in WiM...Comparative Analysis of Quality of Service for Various Service Classes in WiM...
Comparative Analysis of Quality of Service for Various Service Classes in WiM...
 
Performance Analysis of Wireless Networks With MDQOS
Performance Analysis of Wireless Networks With MDQOSPerformance Analysis of Wireless Networks With MDQOS
Performance Analysis of Wireless Networks With MDQOS
 
D044021420
D044021420D044021420
D044021420
 
A Quality of Service Strategy to Optimize Bandwidth Utilization in Mobile Net...
A Quality of Service Strategy to Optimize Bandwidth Utilization in Mobile Net...A Quality of Service Strategy to Optimize Bandwidth Utilization in Mobile Net...
A Quality of Service Strategy to Optimize Bandwidth Utilization in Mobile Net...
 
A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...
A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...
A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...
 
A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...
A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...
A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...
 

Mehr von ijcsity

International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...ijcsity
 
NETWORK MEDIA ATTENTION AND GREEN TECHNOLOGY INNOVATION
NETWORK MEDIA ATTENTION AND  GREEN TECHNOLOGY INNOVATION NETWORK MEDIA ATTENTION AND  GREEN TECHNOLOGY INNOVATION
NETWORK MEDIA ATTENTION AND GREEN TECHNOLOGY INNOVATION ijcsity
 
4th International Conference on Artificial Intelligence and Machine Learning ...
4th International Conference on Artificial Intelligence and Machine Learning ...4th International Conference on Artificial Intelligence and Machine Learning ...
4th International Conference on Artificial Intelligence and Machine Learning ...ijcsity
 
International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...ijcsity
 
5th International Conference on Machine Learning & Applications (CMLA 2023)
5th International Conference on Machine Learning & Applications (CMLA 2023)5th International Conference on Machine Learning & Applications (CMLA 2023)
5th International Conference on Machine Learning & Applications (CMLA 2023)ijcsity
 
International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...ijcsity
 
International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...ijcsity
 
8th International Conference on Networks, Communications, Wireless and Mobile...
8th International Conference on Networks, Communications, Wireless and Mobile...8th International Conference on Networks, Communications, Wireless and Mobile...
8th International Conference on Networks, Communications, Wireless and Mobile...ijcsity
 
International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...ijcsity
 
10th International Conference on Computer Science and Information Technology ...
10th International Conference on Computer Science and Information Technology ...10th International Conference on Computer Science and Information Technology ...
10th International Conference on Computer Science and Information Technology ...ijcsity
 
International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...ijcsity
 
International Conference on Speech and NLP (SPNLP 2023)
International Conference on Speech and NLP (SPNLP 2023) International Conference on Speech and NLP (SPNLP 2023)
International Conference on Speech and NLP (SPNLP 2023) ijcsity
 
SPNLP CFP - 27 mar.pdf
SPNLP CFP - 27 mar.pdfSPNLP CFP - 27 mar.pdf
SPNLP CFP - 27 mar.pdfijcsity
 
International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...ijcsity
 
International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...ijcsity
 
International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...ijcsity
 
International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...ijcsity
 
International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...ijcsity
 
International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...ijcsity
 
International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...ijcsity
 

Mehr von ijcsity (20)

International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...
 
NETWORK MEDIA ATTENTION AND GREEN TECHNOLOGY INNOVATION
NETWORK MEDIA ATTENTION AND  GREEN TECHNOLOGY INNOVATION NETWORK MEDIA ATTENTION AND  GREEN TECHNOLOGY INNOVATION
NETWORK MEDIA ATTENTION AND GREEN TECHNOLOGY INNOVATION
 
4th International Conference on Artificial Intelligence and Machine Learning ...
4th International Conference on Artificial Intelligence and Machine Learning ...4th International Conference on Artificial Intelligence and Machine Learning ...
4th International Conference on Artificial Intelligence and Machine Learning ...
 
International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...
 
5th International Conference on Machine Learning & Applications (CMLA 2023)
5th International Conference on Machine Learning & Applications (CMLA 2023)5th International Conference on Machine Learning & Applications (CMLA 2023)
5th International Conference on Machine Learning & Applications (CMLA 2023)
 
International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...
 
International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...
 
8th International Conference on Networks, Communications, Wireless and Mobile...
8th International Conference on Networks, Communications, Wireless and Mobile...8th International Conference on Networks, Communications, Wireless and Mobile...
8th International Conference on Networks, Communications, Wireless and Mobile...
 
International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...
 
10th International Conference on Computer Science and Information Technology ...
10th International Conference on Computer Science and Information Technology ...10th International Conference on Computer Science and Information Technology ...
10th International Conference on Computer Science and Information Technology ...
 
International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...
 
International Conference on Speech and NLP (SPNLP 2023)
International Conference on Speech and NLP (SPNLP 2023) International Conference on Speech and NLP (SPNLP 2023)
International Conference on Speech and NLP (SPNLP 2023)
 
SPNLP CFP - 27 mar.pdf
SPNLP CFP - 27 mar.pdfSPNLP CFP - 27 mar.pdf
SPNLP CFP - 27 mar.pdf
 
International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...
 
International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...
 
International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...
 
International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...
 
International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...
 
International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...
 
International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...
 

Kürzlich hochgeladen

Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 

Kürzlich hochgeladen (20)

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 

Proposed wfq based dynamic bandwidth

  • 1. International Journal of Computational Science and Information Technology (IJCSITY) Vol.2, No.2, May 2014 DOI : 10.5121/ijcsity.2014.2206 55 PROPOSED WFQ BASED DYNAMIC BANDWIDTH ALLOCATION FOR MOBILE WIMAX APPLICATION Dr.B.Sridevi1 , R.Anantha Priya2 , V.S.Primiya3 1 Assistant Professor, 2,3 B.E.Student Department of Electronics and Communication Engineering Velammal College of Engineering and Technology, Madurai ABSTRACT In this project, we proposed a framework to support heterogenous traffic with different QoS demand in WiMAX. This framework dynamically changes the bandwidth allocation (BA) for ongoing and new arrival connections based on network condition and service demand. The objective is to efficiently use the available bandwidth and provide QoS support in a fair manner. Dynamic allocation of spectrum prior to transmission can mitigate the starvation problem of Non Real time application. The WFQ based dynamic bandwidth allocation framework uses architecture that has packet scheduler scheme (PS), call admission policy and a dynamic bandwidth allocation mechanism. By the simulation result we have showed that this architecture could provide QoS support by being fair to all classes of services. KEYWORDS QoS in WiMAX, Dynamic Bandwidth Allocation, WFQ. 1. INTRODUCTION Worldwide Interoperability for Microwave Access(WiMAX) will play an important role in the fixed broadband wireless access since it is more cost effective and faster to set up technology which is based on IEEE 802.16 standard that specifies the new air interface for microwave access,which was designed for wireless metropolitan area networks. WiMAX provides an affordable alternative for wireless broadband access supporting a variety of applications of different types including video conferencing, non-real-time large volume data transfer, traditional voice/data traffic throughput connection, and web browsing.In order to have the best controlled bandwidth allocation of the WiMAX network, IEEE 802.16e-2005 standard defines 5 types of service flow as following: UGS (Unsolicited Grant Service), rtPS(Real-Time Polling Service), ertPS (Extended Real-Time Polling Services), nrtPS (Non-Real Time PollingService) and BE (Best Effort).
  • 2. International Journal of Computational Science and Information Technology (IJCSITY) Vol.2, No.2, May 2014 56 Fig1. WiMAX architecture Each traffic flows requires different QoS to meet different QoS requirements of different traffic flows , an efficient queuing scheme is necessary due to the instability of wireless transmission environment therefore traffic scheduling is used to ensure that QoS requirements are met. Eventhough IEEE 802.16e was developed with QoS requirements, the scheduling standard does not specify traffic scheduling requirements, instead such implementation are render specific. Scheduling schemes are used to resolve conflict for shred resource in a network by allocating bandwidth to each requested users and determine the transmission priority.Each flow requires a certain minimum bandwidth to achieve its QoS. Bandwidth allocation to traffic classes should be in such a way that fairness criteria is met with. Hence, we propose a dynamic bandwidth allocation mechanism to achieve fair and efficient allocation. Hence we propose a framework known as Dynamic QoS based Bandwidth Allocation. The aim is to resolve the problem of bandwidth allocation in IEEE802.16e. There are several advantage in allocating the bandwidth dynamically: (1) all users are typically not connected to the network at one time (2) even when connected, users are not transmitting data at all times (3) most traffic occurs in bursts, there are gaps between packets of information that can be filled with other user traffic. 2. RELATED WORKS The MAC scheduler in WiMAX technology is a crucial issue to design. The most important is to fulfill design constraints like QoSguarantee minimum throughput. Among several scheduling algorithms such as algorithms,Intra class scheduling (Round Robin, Weighted Round Robin, Deficit Round Robin,Delay Based), Inter class Scheduling (priority based algorithm, channel aware schedulers), the best suited WiMAX MAC scheduler is Weighted fair Queuing its dynamic nature make it more simple than other algorithms[1] . The main objective of this work is to provide an implementation of IEEE 802.16 e standard using dynamic fuzzy based priority scheduler. Scheduling process is being done in two stages the requests are classified in terms of priority using fuzzy logic and the request are scheduled using neural networks[2].
  • 3. International Journal of Computational Science and Information Technology (IJCSITY) Vol.2, No.2, May 2014 57 A detailed performance comparison of some scheduling algorithms such as Deficit Round Robin,Proportional Fair and Weighted Deficit Round Robin by taking into account their radio channels condition and the throughput improvement [3]. A scheduling scheme for the QoS classes in WiMAX, which considers the pricing factor in the optimization of resource usage and resource allocation.Wireless technologies are facing challenging issues with respect to new applications and increased user demands. Most of the challenging issues dealt with wireless signal propogation problem such as noise,fading,interference and so on. Although traditional problems such as the limited radio spectrum still remain among key problems, more sophisticated problems have evolved, which deal with QoS, resource allocation and resource reservation.One main issue in providing multimedia services: The proposed DQBA is implemented in three blocks, they are call admission control Tier1 and Tier2 .The admission control policy is implemented in the cache module. The packet scheduling is implemented in two levels, the first is intra class scheduling is done in tier 1 and interclass scheduling in tier 2. Providing the required QoS level depends on four operations they are connection admission control, packet scheduling,traffic shaping and traffic policing. Packet scheduling consists of serving the resource requests which have been sent by the mobile users and queued at the base station level. Scheduling is based on two orthogonal components which are deciding the order of serving the user request and managing the service queue .Scheduling architecture for an IEEE 802.16 should guarantee efficient bandwidth utilization while providing fairness between users and responding correctly to the QoS constraints of real time application. Two types of scheduling architecture are traditional scheduling architecture and new scheduling architecture. Traditional scheduling architecture are based on classical and simple scheduling algorithms which were used earlier in the wired technologies. Thus the traditional architectures use these algorithms initially while other architectures implement additional mechanism in order to extend these algorithms so that they become more suited to the IEEE 802.16 QoS context. The two modes allowed in the allocation of the bandwidth are : (i) Grant Per Connection(GPC) and (ii) Grant Per Subscriber Station (GPSS). When there are more connections its being compulsory for he users to use the 66 GHz PHY specifications [5],[6] . WiMAX Forum [10] according to IEEE 802.16e-2005standard defines the air interface of WiMAX system inPhysical (PHY) layer. WiMAX system can use bothOrthogonal Frequency Division Multiplexing (OFDM)and Orthogonal Frequency Division MultiplexingAccess (OFDMA) modulation technology, to effectivelyprovide multi-path access in Non-Line-of- Sight(NLOS)environment. Thus, WiMAX will choose appropriatebandwidth at 1.25~20 MHz, according to the frequencyresource and service flow demand. WiMAX Physicallayer adopts to TDD mode, to choose proportion framefor Uplink and Downlink direction according to the Unsolicited grant service (UGS) that supports constant bit rate such as voice application .Real Time Polling Service (rtPS) support real time data streams that contain variable size data packets which are issued as periodic intervals such as MPEG video.Extended Real Time Polling Service(ertPS) applicable with variable rate real time applications that require data rate with delay guarantees like VoIP with silence suppression.Non Real Time Polling Service (nrtPS) supports delaytolerance data streams that contains variable size data packets that require a minimum data rate like FTP. Best Effort (BE) support data streams that donot need any QoS guarantees like HTTP.While considering the pricing factor in case of resource optimization and allocation of
  • 4. International Journal of Computational Science and Information Technology (IJCSITY) Vol.2, No.2, May 2014 58 resources it provides a higher revenue for the service providers by the pricing model which is being provided by the Radio Resource Management (RRM) which was given by Belghith scheduling scheme. This clearly have an impact on the utilization overall performance operation. For various service classes different types of pricing schemes where introduced. In case of the economic impact the fairness in allocation of resources could be affected and can even make an impact Table1.Types Of Traffic And Application 3. PROPOSED WORK The objective of this framework is to provide the best Quality of Service and which would pave way for the reduction in the number of call drops, even the starvation problem and wastage of resources in the fixed bandwidth allocation can be solved. This can be given by the methodologies which follows Call Admission Control followed by Tier1 and then Tier2. For this task the operations performed are scheduling, bandwidth allocation and admission control. The five different classes follows Unsolicited Grant Service(UGS), Extended Real Time Polling Service(ertPS), Non Real Time Polling Service(nrtPS), Real Time Polling Service(rtPS) and Best Effort(BE). 3.1 Packet Scheduling In case of UGS it uses Earliest Deadline First (EDF) which includes the latency period and the arrival timeit is also a kind of priority based algorithm which provides the delay guarantee service for its users. In case of rtPS and ertPS, Weighted Fair Queuing (WFQ) is being used. It result in the superior performance compared with the other algorithms with the presence of the variable sized packets and the reason behind that is, it does not consider the starting time of the packets. The nrtPS uses Round Robin(RR) algorithm. It is the most basic scheduling algorithm it can distribute the channel resources to all the substation. In tier2, Weighted Fair Queuing can ensure satisfactory response time to all kinds of critical applications, such as interactive and transaction based ones,that are being intolerant to performance degradation.A Dynamic WFQ [9][10] is able to dynamically and consistently adapt the queue weights according to the time-variant amount of the incoming traffic and the preassigned target QoS. SERVICE CLASS CLASS 1 CLASS 2 CLASS 3 CLASS 4 CLASS 5 TYPE OF TRAFFIC UGS ertPS rtPS nrtPS BE PRIORITY LEVEL 5 4 3 2 1 BANDWIDTH REQUIREMENT 5Mbps 3 Mbps 1.5 Mbps 64 Kpbs 32 Kpbs APPLICATION Voice video Video Audio Email
  • 5. International Journal of Computational Science and Information Technology (IJCSITY) Vol.2, No.2, May 2014 59 STEP 1: Fig 2. Intra class scheduling 3.2 Bandwidth Allocation The bandwidth is dynamically allocated based on BVal.BVal is calculated by considering fairness, utilization and delay bound. BVal is an important parameter used for packet scheduling, call admission control and dynamic bandwidth allocation by integrating traffic and network characteristics Algorithm 1 :BVal calculation 1: GET incoming packets 2: GETutilization,fairness and delay bound for each service request. 3:GET the requested bandwidth 4: For each service request 5: if ( F (i,j) ≥ F(i,j-1) (i,j) ) and (U (i,j) ≥ U(i,j-1) ) 6: then (BVal(i,j+1) = £(i.,j) ) 7: elseif(F (i,j) < F (i,j-i) (i,j) 8: then ( BVal(i,j+1) ) = £ (i,j-1) (i,j) ( 1+ F(i,j-1) ) 9: elseif( U(i,j) < U(i,j-1) (i,j) ) 10: then ( BVal(i,j+1) = £ (i,j-1) (i,j) ( 1+ U (i,j-1) ) 11:elseif( F(i,j) < F(i,j-1)) 12: then ( BVal(i,j+1) = £(i,j) ( 1+ F (i,j) + U(i,j) ) 13:if (D < 10) 14: thenbdcap = BVal * 15 15:if (D < 20) EDF WFQ WFQ FIFO INTER CLASS INTRA-CLASS (TIER 1) RR International Journal of Computational Science and Information Technology (IJCSITY) Vol.2, No.2, May 2014 59 STEP 1: Fig 2. Intra class scheduling 3.2 Bandwidth Allocation The bandwidth is dynamically allocated based on BVal.BVal is calculated by considering fairness, utilization and delay bound. BVal is an important parameter used for packet scheduling, call admission control and dynamic bandwidth allocation by integrating traffic and network characteristics Algorithm 1 :BVal calculation 1: GET incoming packets 2: GETutilization,fairness and delay bound for each service request. 3:GET the requested bandwidth 4: For each service request 5: if ( F (i,j) ≥ F(i,j-1) (i,j) ) and (U (i,j) ≥ U(i,j-1) ) 6: then (BVal(i,j+1) = £(i.,j) ) 7: elseif(F (i,j) < F (i,j-i) (i,j) 8: then ( BVal(i,j+1) ) = £ (i,j-1) (i,j) ( 1+ F(i,j-1) ) 9: elseif( U(i,j) < U(i,j-1) (i,j) ) 10: then ( BVal(i,j+1) = £ (i,j-1) (i,j) ( 1+ U (i,j-1) ) 11:elseif( F(i,j) < F(i,j-1)) 12: then ( BVal(i,j+1) = £(i,j) ( 1+ F (i,j) + U(i,j) ) 13:if (D < 10) 14: thenbdcap = BVal * 15 15:if (D < 20) EDF WFQ WFQ FIFO INTER CLASS INTRA-CLASS (TIER 1) RR International Journal of Computational Science and Information Technology (IJCSITY) Vol.2, No.2, May 2014 59 STEP 1: Fig 2. Intra class scheduling 3.2 Bandwidth Allocation The bandwidth is dynamically allocated based on BVal.BVal is calculated by considering fairness, utilization and delay bound. BVal is an important parameter used for packet scheduling, call admission control and dynamic bandwidth allocation by integrating traffic and network characteristics Algorithm 1 :BVal calculation 1: GET incoming packets 2: GETutilization,fairness and delay bound for each service request. 3:GET the requested bandwidth 4: For each service request 5: if ( F (i,j) ≥ F(i,j-1) (i,j) ) and (U (i,j) ≥ U(i,j-1) ) 6: then (BVal(i,j+1) = £(i.,j) ) 7: elseif(F (i,j) < F (i,j-i) (i,j) 8: then ( BVal(i,j+1) ) = £ (i,j-1) (i,j) ( 1+ F(i,j-1) ) 9: elseif( U(i,j) < U(i,j-1) (i,j) ) 10: then ( BVal(i,j+1) = £ (i,j-1) (i,j) ( 1+ U (i,j-1) ) 11:elseif( F(i,j) < F(i,j-1)) 12: then ( BVal(i,j+1) = £(i,j) ( 1+ F (i,j) + U(i,j) ) 13:if (D < 10) 14: thenbdcap = BVal * 15 15:if (D < 20) EDF WFQ WFQ FIFO INTER CLASS INTRA-CLASS (TIER 1) RR
  • 6. International Journal of Computational Science and Information Technology (IJCSITY) Vol.2, No.2, May 2014 60 16: thenbdcap = BVal * 10 17:if (D < 30) 18:thenbdcap = BVal * 5 19: if (D < 40) 20: thenbdcap = BVal * 2.5 13: Endfor 14: ReturnBVal value We define fairness as the ratio of the allocated bandwidth by the requested bandwidth, F(i,j) = (Abnw(i,j) /Rbnw(i,j) ) And utilization is defined as the ratio of the used network resources to the available resources U(i,j) = ( T(i,j) /Abnw(i,j) ) Residual bandwidth= allocated bandwidth – requested bandwidth Bandwidth is allocated dynamically based on BVal. STEP 2 : Fig 3. Inter class scheduling. International Journal of Computational Science and Information Technology (IJCSITY) Vol.2, No.2, May 2014 60 16: thenbdcap = BVal * 10 17:if (D < 30) 18:thenbdcap = BVal * 5 19: if (D < 40) 20: thenbdcap = BVal * 2.5 13: Endfor 14: ReturnBVal value We define fairness as the ratio of the allocated bandwidth by the requested bandwidth, F(i,j) = (Abnw(i,j) /Rbnw(i,j) ) And utilization is defined as the ratio of the used network resources to the available resources U(i,j) = ( T(i,j) /Abnw(i,j) ) Residual bandwidth= allocated bandwidth – requested bandwidth Bandwidth is allocated dynamically based on BVal. STEP 2 : Fig 3. Inter class scheduling. International Journal of Computational Science and Information Technology (IJCSITY) Vol.2, No.2, May 2014 60 16: thenbdcap = BVal * 10 17:if (D < 30) 18:thenbdcap = BVal * 5 19: if (D < 40) 20: thenbdcap = BVal * 2.5 13: Endfor 14: ReturnBVal value We define fairness as the ratio of the allocated bandwidth by the requested bandwidth, F(i,j) = (Abnw(i,j) /Rbnw(i,j) ) And utilization is defined as the ratio of the used network resources to the available resources U(i,j) = ( T(i,j) /Abnw(i,j) ) Residual bandwidth= allocated bandwidth – requested bandwidth Bandwidth is allocated dynamically based on BVal. STEP 2 : Fig 3. Inter class scheduling.
  • 7. International Journal of Computational Science and Information Technology (IJCSITY) Vol.2, No.2, May 2014 61 3.3 CAC (Call Admission Control) Usually CAC procedure is being implemented at the BS that ensures the load supplied through the subscriber station (SS) can be taken over by a network. The choice of the call admission policy that is to be adopted in an IEEE802.16 network is being strongly associated with the scheduling mechanisms used. CAC restricts the access to the network to prevent congestion or service degradation for the users those are already being accepted. It also prevents the system before being overloaded. Fig 3.Call Admission Control 4. SIMULATION AND RESULTS This section discusses the performance evaluation of the proposed algorithm. The simulations were conducted using MATlab. Fig 4: Intra class scheduling of UGS users 0 0.5 1 1.5 2 2.5 3 1 2 3 4 5 ugsBVal
  • 8. International Journal of Computational Science and Information Technology (IJCSITY) Vol.2, No.2, May 2014 62 Fig 5 .Intra class scheduling of nrtPS users Fig 5.Intra class scheduling of rtPS users Fig 6. Intra class scheduling of ertPS users 0 0.5 1 1.5 2 1 2 3 4 5 nrtpsBVal 0 0.5 1 1.5 2 2.5 1 2 3 4 5 rtPSBVal 0 0.5 1 1.5 2 2.5 1 2 3 4 5 ertpsBVal
  • 9. International Journal of Computational Science and Information Technology (IJCSITY) Vol.2, No.2, May 2014 63 Fig 7. Intra class scheduling of BE users This result shows that intra class scheduling is done among all the five types of service classes by comparing the corresponding the utilisation and fairness of each packets .Fig 4 shows that UGS packets are ordered within the UGS class itself i.e.intraclass scheduling. Likewise nrtPS,rtPS,ertPS and BE traffic is ordered which is shown in Fig 5, 6, 7 respectively Fig 8. Fixed bandwidth allocation We can infer from the fig.8 that only higher priority is getting the service leaving behind the lower priorities, thus higher priority starve the bandwidth of lower priority. This cause the starvation problem. 0 0.2 0.4 0.6 0.8 1 1.2 1.4 1.6 1 2 3 4 5 beBVal 0 1 2 3 4 5 6 7 8 9 ugs ugs ugs ertps ertps ertps rtps rtps rtps nrtps nrtps nrtps be be be Series1
  • 10. International Journal of Computational Science and Information Technology (IJCSITY) Vol.2, No.2, May 2014 64 Fig 9 : Inter class scheduling A traffic seperation in both inter and intra class levels is shown and the QoS suport is being guaranteed by both real time and non real time application.Thus if the bandwidth available is less than the requested by the higher priority, then the lower priority will be served in order to provide a fair solution for the lower priorities. Fig 9 shows that lower priority applications are not completely suffering from starvation problem. 5. CONCLUSION In this paper we proposed a framework which supports all kinds of service flows and provide a fair share of bandwidth by using several strategies such as multilevel queuing discipline, QoS differentiation and unused bandwidth reallocation, thus the network performence is being improved .This result indicate that eventhough the low priority flows or not completely starved, the higher priority applications are consuming a considerable portion of the bandwidth .thus the simulatuion result shows that the the utilization has been increased which directly affects the reduction of the call blocking property. 6. REFERENCE [1] Comparitive study of different scheduling algorithms for WiMAX MAC scheduler design.Gajanan M. Galshetwar, Prof. AmuthaJayakumar , Yashika Mittal [2] An Enhanced Scheduling Scheme for QoS in mobile WiMAX networks. D.DavidNeelaPon Kumar, Jithin Kumar, K. Arun Kumar, K.Murugesan [3] Comparison Of Different Scheduling Algorithms For WiMAX base station. JaniLakkakori, AlexandarSayenko, JaniMoilanen. Las Vegas, Nevada: IEEE Wireless Communication and Networking Conference WCNC, 2008, Vol. 08. 1525-3511. [4] A.Belghith, “Pricing Based Schedulers for WiMAX “, in Proc. IEEE Int Conf. Wireless Mobile Computer, Netw. Communication WIMOB , Oct 12-14, 2009, pp.202-207 [5] IEEE 802.16 Standard (2004), “IEEE Standard For Local and Metropolitan Area Networks – Part 16: Air Interface for Fixed Broadband Wireless Access Systems”. [6] Robert Holte, Al Mok, Louis Rosier, Igor Tulcjinsky and Donald Varvel, “The Pinwheel: A Real Time Scheduling Problem”. Proc of the 22nd Hawaii International Conference on System Science, 1989, pp 693-702. [7] K .Wongthavarawat and A.Ganz, “ Packet Scheduling for QoS Support in IEEE802.16 broadband wireless access systems,” Int. J. Commun. Syst., vol. 16, no. 1,pp. 81-96, Feb.2003. 0 0.5 1 1.5 2 2.5 3 ugs rtps ugs nrtps be rtps ertps ugs rtps be nrtps ertps rtps rtps be ugs rtps ertps be Series1
  • 11. International Journal of Computational Science and Information Technology (IJCSITY) Vol.2, No.2, May 2014 65 [8] J.Chen, W.Jiao, and Q.Guo, “Providing integrated QoS control for IEEE 802.16 broadband wireless access systems ,” in Proc. VTC,Dallas,TX,2005, vol. 2, pp. 1254-1258, [9] Chin-Chang Li, Shiano-Li Tsao, Mengchengchen, Yaeli Sun, Yueh-Min Huang, Proportional Delay Differentation Service Based on Weighted Fair Queuing. [10] Kun Pang Xiaokang Lin JunliXuedaoGu Nat, Dynamic WFQ scheduling for real-time traffic in wireless ATM links, CommunicationTechnology Proceedings, 2000 Authors B.Sridevi, Assistant Professor of ECE Department of Velammal College of Engineering & Technology, Madurai, obtained her B.E., degree from A.C.C.E.T Karaikudi, Madurai Kamaraj University, Madurai and M.E. degree from Anna University, Chennai. She has 2 years of Industrial experience, 10 years of Teaching,and Research experience. Pursuing Ph.D. in Anna University, Tirunelveli in Networking. She published many research papers in International journals, national and international conferences. Her area of research includes Network Security, Wireless Networks. V. S. Primiya, pursuing Bachelor of engineering in Velammal College of Engineering and Technology, Madurai-625009. Her area of interest is wireless networks R.AnanthaPriya, pursuing Bachelor of engineering in Velammal College of Engineering and Technology, Madurai-625009. Her area of interest is wireless networks