SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Downloaden Sie, um offline zu lesen
G. Guru Charan et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 6( Version 2), June 2014, pp.20-25
www.ijera.com 20 | P a g e
Wireless Mesh Networks Path Planning, Power Control and
Optimal Solutions
G. Guru Charan1
, K. Yadaiah2
, G. Sailaja3
1
(Department of ECE, St. Martins Engineering College, R.R Dist, Hyderabad)
2
(Department of ECE, St. Martins Engineering College, R.R Dist, Hyderabad)
3
(Department of ECE, Chebrolu Engineering College, Guntur Dist, Guntur)
ABSTRACT
Wireless mesh networks are considerd as a potential attractive alternative to provide Broadband acces to users.
In this paper we address the following two questions: (i) Given a set of nodes with arbitrary locations, and a set
of data rows, what is the max-min achievable throughput? And (ii) How should the network be configured to
achieve the optimum? Given a set of nodes with arbitrary locations, and a set of data rows specified as source-
destination pairs, what is the maximum achievable throughput, under certain constraints on the radio parameters
in particular, on transmit power. How should the network be configured to achieve this maximum? Specifically,
by configuration, we mean the complete choice of the set of links (i.e., topology), the routes, link schedules, and
transmit powers and modulation schemes for each link.
Keywords- Greedy pricing, optimal solutions, Path planning, Power control, Throughput,
I. INTRODUCTION
Characterizing the capacity of a wireless network
has turned out to be a difficult problem of
communication over a wireless medium. Beginning
with wireless mesh networks a popular approach has
been to characterize the asymptotic scaling of
capacity in the number of nodes. By asking for
bounds only in an order sense, it has been possible to
derive the trend of capacity scaling, even in the
information theoretic sense. However, although the
knowledge of a capacity scaling law is quite valuable,
it lends no insights into actual numbers for network
capacity based on current technologies, or into the
impact of macroscopic parameters such as transmits
power budget and the availability of modulation
schemes, on the network capacity. There has also
been some work on optimally operating a wireless
network; for example, in a routing and power control
policy to stabilize the network is devised and in a
power transmission strategy to minimize the power
cost subject to average rate constraint is found.
Owing to their focus on the algorithmic perspective,
these works also do not shed any light into the
network capacity, and an optimal configuration of a
given wireless network to achieve it. This is the
problem we seek to address in this thesis.
1.2 Motivation
We consider the above questions from a
networking standpoint, and pose them as an
optimization problem to determine jointly optimal
row routes, link activation schedules and physical
layer parameters. We obtain some interesting insights
into the interplay of the achievable throughput,
routing and transmit power and modulation schemes.
Determining the achievable throughput is
computationally hard in general, however, using a
smart technique we obtain numerical results for
different scenarios of interest. We believe that our
optimization based framework can also be used as a
tool, for planning and capacity provisioning of
wireless networks.
II. WIRELESS MESH NETWORKS
In this work, our notion of the maximum
throughput is the max-min low rate, i.e., the
maximum of the minimum end to end row
throughputs that can be achieved in the network. This
is an appropriate notion of capacity from a
networking perspective since it may represent the
aggregate bandwidth demands of subscriber stations
in an IEEE 802.16-like access network, or the
sampling rate at which sensors produce information
about their environment, in a sensor network. We
assume point-to-point links which can operate in
accordance with their perceived signal-to-
interference-and-noise ratio (SINR). We also assume
that transmissions are co-ordinate (possibly, though
not necessarily, by a central controller) so as to be
conflict-free through activation schedules.
RESEARCH ARTICLE OPEN ACCESS
G. Guru Charan et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 6( Version 2), June 2014, pp.20-25
www.ijera.com 21 | P a g e
Fig 2.1. A WMN with uplink and downlink flows
Thus, our bounds reject the intrinsic limits posed
by the underlying conflict structure of parallel
transmissions, as dictated by the SINR calculations.
The second question we answer is the following.
We assume that the wireless nodes have an
arbitrary set of transmit power levels, and an arbitrary
set of modulation and coding strategies. All wireless
links are considered to be operated at some required
bit-error-rate (BER). A transmission on a wireless
link is said to succeed, if the SINR perceived by the
link remains greater than an SINR threshold which
depends on the transmit power, modulation and
coding, and the requisite BER. We show that this
requirement results into a conflict set for each
wireless link. For a given link, the corresponding
conflict set is a collection of subsets of links, such
that at least one link from each subset cannot be
activated simultaneously with the given link (in the
sense of satisfying the BER requirement).
To resolve Q1 and Q2 we take a constructive
approach, i.e., we explicitly construct a network that
has the maximum throughput. Since the problem is to
construct a throughput optimal network, the idea is to
pose it as a problem of optimal resource allocation
and routing on a .dummy network. Specified by the
complete graph on given wireless nodes.
We discuss two static optimization formulations
for this problem. They are complementary in the
sense that one throws light on the routing perspective
while the other on the scheduling perspective. It can
be shown that determining the maximum throughput
is a computationally hard problem in general.
However, using a smart enumerative technique, for
specific instances of the problem computations can
be greatly reduced. We provide results for different
scenarios of interest such as a sensor network on a
grid, and a mesh of nodes deployed in hexagonal
cells.
A static optimization setting similar to ours has
been discussed in [3], [4]. In [4], the authors focus on
a low SINR regime with the link capacities being
linear functions of the perceived SINR. In our work,
we consider modulation and coding schemes as
determining the link capacities, rather than
approximations of the Shannon capacity function. In
[3], the authors use a conflict graph formulation to
model the schedulability relationships between the
wireless links. Our results are based on a more
general conflict set formulation, and while they
certainly support those in [3], they further provide
important insights into the impact of macroscopic
parameters such as transmit power budget and
availability of modulation schemes, on the
throughput performance. Further, the upper bounds
on throughput derived in [3] are rather loose and
consider only the cliques formed by singleton conflict
set members. Under these assumptions, the problem
of resource allocation and routing can be cast simply
as an optimal routing problem. The idea is to replace
a link say, between nodes i and j, by multiple
.artificial links. Each one corresponding to one
combination of transmits power levels and
modulation coding schemes available at i . Thus,
optimal selection of power and modulation is
translated into optimal selection of links. Some basic
notation is in order. N denotes the number of given
static wireless nodes; their set is denoted by N. L
denotes the set of all possible links among these
nodes; L includes all artificial links as discussed
above. Cardinality of L is denoted by L. Links are
assumed to be directed; l 2 L is also represented as
(lo; ld), where lo and ld denote the originating and
the destination nodes resp. LOi (resp. LIi) denotes the
set of links outgoing from node i (resp. incoming to
i). Let Pl denote the transmission power on link l and
zl the corresponding modulation-coding scheme.
The characteristics of WMNs are explained as
follows:
 Multi-hop wireless network. An objective to
develop WMNs is to extend the coverage range
of current wireless networks without sacrificing
the channel capacity. Another objective is to
provide non-line-of-sight (NLOS) connectivity
among the users without direct line-of-sight
(LOS) links. To meet these requirements, the
mesh-style multi-hopping is indispensable,
which achieves higher throughput without
sacrificing effective radio range via shorter link
distances, less interference between the nodes,
and more efficient frequency re-use.
 Support for ad hoc networking, and capability of
self-forming, self-healing, and self-organization.
WMNs enhance network performance, because
of flexible network architecture, easy
deployment and configuration, fault tolerance,
and mesh connectivity, i.e., multipoint-to-
multipoint communications. Due to these
features, WMNs have low upfront investment
requirement, and the network can grow gradually
as needed.
 Mobility dependence on the type of mesh nodes.
Mesh routers usually have minimal mobility,
while mesh clients can be stationary or mobile
nodes.
G. Guru Charan et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 6( Version 2), June 2014, pp.20-25
www.ijera.com 22 | P a g e
 Multiple types of network access. In WMNs,
both backhaul access to the Internet and peer to
peer (P2P) communications are supported. In
addition, the integration of WMNs with other
wireless networks and providing services to end-
users of these networks
can be accomplished through WMNs.
 Dependence of power-consumption constraints
on the type of mesh nodes. Mesh routers usually
do not have strict constraints on power
consumption. However, mesh clients may
require power efficient protocols. Mobility.
Since ad hoc networks provide routing using the
end-user devices, the network topology and
connectivity depend on the movement of users.
This imposes additional challenges on routing
protocols as well as on network configuration
and deployment.
2.2. Analysis on min-hop network:
Now let us look at Figure 3 and Figure 4 which
depicts the optimal routing under different choices of
transmits power and modulation and coding scheme.
The range of a sensor node in the configuration in
Figure 3 is 16 m which is twice the grid side, and in
Figure 4 it is 12:7 m which is more than the grid
diagonal. Note that in both the cases, the optimal
routes are not minimum hop, for all the nodes. Within
the region indicated by the dotted line in both the
figures, the nodes use minimum hop paths, although
in Figure 3 some sensors split their data along
multiple paths not all of which are minimum hop.
Also, observe that the nodes along the diagonal,
beyond the dotted line, route their data along the
periphery of the network. This is an illustration of
what may be termed interference-avoiding routing.
Fig 2.1 Mini-hop network
2.2.2 Analysis on multi-hop network:
Fig 2.2 Multi-hop network
This example is identical. However, there are
only two data rows (indicated as red-straight edges
and blue-curved edges). The red row originates at the
bottom left corner node, and is destined to the red
node adjacent to the top right corner. Likewise, for
the blue row.
The optimal routes which achieve the max-
min throughput for the two data rows are indicated by
the red and blue links in Figure 5. The dotted links
carry less than 15% of the total traffic, and more than
80% of the total traffic is carried along the periphery
over the solid links. In this case, the range of each
node is 11:3 m which is equal to the grid diagonal.
However, the routing uses only two diagonal links,
and is far from minimum hop. Although some data is
routed along common paths and links, the bulk of the
data is routed so that the rows .avoid each other.
2.3 The multi-hop advantage:
In a mesh network with diverging flows, the
maximum achievable throughput can be obtained by
using a much lower transmit power at the gateway
using multi hop communication than with single-hop
communication.
III. IMPLEMENTATION
The thesis model the network n of nodes (the
mesh routers and the gate way ) and a set l of directed
links with mod N=n and mod l=l each node has a
location (xi,yi) we denote by l the set of links
incident to a node i.a link il is identified not only by
its origin destination pair but also its physical
parameters which are defined .a f denotes set of flows
and let mod f=f a flow f is identified not only by its
origin destination pair (fs,fd) and has a rate lambda.
We present models for the scheduling, rate
adaptation, and power control problem whose
solution can be used to configure the network. Note
that, in all cases, we restrict ourselves to conflict-free
scheduling Each link is I belongs l identified by four
physical parameters O(l),d(l) the origin and the
destination nodes of l. a link is sometimes denoted (I
,j)when ever Pt: transmit power, Ct: the link rate per
second.
G. Guru Charan et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 6( Version 2), June 2014, pp.20-25
www.ijera.com 23 | P a g e
3.1 Additive interference model:
It’s used to extends the physical interference
model.
The maximum throughput attained when
In this formulation, we have and. The
maximization is explicitly taken with respect to the
maximum flow and link load allocation We call this
problem JP-Primal. It is a standard but very large
linear program (LP) and its difficulty lies in the
computation of the incidence matrix which grows
exponentially with the problem size.
The maximum throughput is attained by
Perceptive behavior is a class of mechanisms that
empowers wireless devices to exchange information
during normal packet delivery and to coordinate and
communicate with other nearby devices, even though
some of these devices may be outside of direct
communication range.
3.2 Reactive routing:
We design, develop and test several components
of reactive routing in wireless multi-hop networks.
Our research leads to significant improvement and
has made deployment of ad hoc networks more
feasible. Our initial focus was development of an Ad
hoc On-demand Distance Vector (AODV) routing
daemon. Our implementation is known as AODV-
UCSB. While developing the implementation, we
identified several ambiguities and errors in the
protocol specification. Our insight significantly
influenced the contents and structure of the AODV
Experimental RFC.
IV. TOOLS FOR EXACT SOLUTIONS
This means solving a very large LP with a
coefficient matrix that grows exponentially with the
size of the network. We now present two efficient
algorithms that solve JP exactly. we construct the
matrix using an efficient enumeration of the ISets.
4.1 Solution by the simplex algorithm:
We propose here an efficient algorithm that
constructs all possible ISets but no more. The
complexity of this method is only as opposed to in
[2], where is the maximum ISet size and typically .
We describe it using a recursive depth-first
algorithm, but we have also implemented an iterative
breadth-first version. While the recursive form is
simpler to program and is well suited for enumerating
all ISets, the iterative form is better suited for
enumerating only the maximal ISets. The algorithm is
based on the following proposition that is trivial to
prove.
Proposition 1:
If is an independent set, then any subset of is
also an independent set.
The algorithm builds ISets of increasing sizes
and stops when this is no longer possible. This is
done using an enumeration tree as follows. The root
node is at depth 0. A node at depth contains an ISet
of links and a list of links that are candidate for
addition to this ISet. We assume that is implemented
as an ordered data structure indexed by increasing
link number. Consequently, means that appears later
than in and returns the link whose index number is
the largest in .We define two functions. The first one
is prune , which returns a reduced candidate list of
links constructed as described in Fig. 1. The
condition on line 5 for adding a link to an ISet has
two parts. The first is used to avoid enumerating
ISets more than once, and the second tests the set
G. Guru Charan et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 6( Version 2), June 2014, pp.20-25
www.ijera.com 24 | P a g e
against the appropriate interference model defined in
Section III-B.
The first condition is due to the fact that the ISets
are built in a precise order. At a given depth in the
tree, the tree nodes contain ISets of links and are built
left to right with the link numbers in an increasing
lexicographic order. Suppose that and that. Since
there is already a node to the left of the current node
containing the ISet , there is no need to add to .The
other function akeSons is a simple recursive
procedure that builds all the children of a node for a
given candidate list . It should be clear that a child of
is an ISet that differs from by one link. The set of
ISets is accumulated at each node until the whole
collection is built up. Finally, the algorithm is
initialized with the root node empty, and the first
candidate list is the set of all links.
4.2 Solution by column generation:
Even with the most efficient enumeration
technique, the approach of Section IV-A will
eventually become infeasible due to the large size of
set . On the other hand, we know that only a few
ISets will be active in the optimal solution by the
following proposition.
Proposition 2:
The number of nonzero elements of , i.e.,the
number of ISets that are effectively used, in a basic
solution of JP-Primal is at most . This follows
directly from Carathéodory’s theorem. This suggests
that we use column generation to solve the problem,
thus voiding the explicit generations of . If we write
the constraints in standard matrix form, the column
corresponding to constraints (4) and some variable
has the form . These are used for pricing the ISets as
follows.
1.3 Exact Pricing:
Column generation is basically the revised
simplex algorithm with a particular pricing
echnique. The technique uses only a subset of
columns , which is called the Restricted Master
Problem (RMP). At a given iteration, we have, for
the RMP, a basic feasible solution, and as well as the
current estimate of the dual variables , , and The first
step of the next simplex iteration is to price the
offbasis columns. The reduced cost of an off-basis
column is given by the standard formula since the
cost coefficient of the off-basis variable in the
objective function is zero. When the objective is to
maximize, the standard pivoting rule of the simplex is
to choose the column with the largest reduced cost.
The stopping rule is also simple: If there is no off-
basis column with a strictly positive reduced cost, the
current solution is optimal. This means that the
pricing requires the solution of the following
Maximum Weight ISet (MWIS) problem with as the
link weights subject to constraints (1) and (2). It can
be easily shown that it is an NP-hard problem. If we
want an optimal solution, we must make sure that
there is no off-basis column with a strictly positive
reduced cost at the last simplex iteration. This in turn
means that we have to solve the MWISpricing
subproblem to optimality. It will then become very
difficult to compute large networks by a
straightforward column-generation technique. This is
why we propose another method called greedy
pricing, which has been proven to be very fast at
delivering exact solutions.
1.4 Greedy Pricing:
We can reduce the amount of computation if we
use a greedy pricing rule at each iteration. This is
based on the fact that choosing any column with a
positive reduced cost may potentially produce a new
solution with a higher value of the objective. We can
also speed up the calculation by solving the pricing
subproblem over a set of links with positive reduced
costs only. The reason is that if there exists a solution
to the MWIS problem where some links with zero
reduced costs appear in the solution, then there is an
optimal solution made up of only the links with
strictly positive reduced costs. This follows from
Proposition 1.
The algorithm to find a new column for the RMP
with a positive reduced cost uses two functions,
denoted as greedy and enuoracle. They take a link set
as the input and return an ISet with a positive reduced
cost, if such a set exists, or an empty set. In a basic
implementation of greedy, the algorithm simply
orders the links in decreasing weights.
V. RESULTS
G. Guru Charan et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 6( Version 2), June 2014, pp.20-25
www.ijera.com 25 | P a g e
VI. FUTURE SCOPE
Considering the scheduling routing and rate of
adaption maximum throughput is attained
considering out chip (channel) signals. The wireless
mesh networks of minimum interference and
maximum throughput is to be achieved .
REFERENCES
[1] IEEE 802.16 Standard Group, [Online].
Available: http://www. ieee802. org/16/
[2] A. Karnik, A. Iyer, and C. Rosenberg,
“Throughput-optimal configuration of
wireless networks,” IEEE/ACM Trans. Netw.,
vol. 16, no. 5, pp. 1161–1174, Oct. 2008.
[3] C. Joo, X. Lin, and N. Shroff,
“Understanding the capacity region of the
greedy maximal scheduling algorithm in
multi-hop wireless networks,” in Proc. IEEE
INFOCOM, 2008, pp. 1103–1111.
[4] M. Johansson and L. Xiao, “Cross-layer
optimization of wirelessnetworks using
nonlinear column generation,” IEEE Trans.
Wireless Commun., vol. 5, no. 2, pp. 435–
445, Feb. 2006.
[5] M. Alicherry, R. Bhatia, and L. Li. Joint
Channel Assignment and Routing for
Throughput Optimization in Multi-Radio
Wireless Mesh Networks. In Proc of the 11th
ACM MobiCom, 2005.
[6] P. Dujkic and S. Valaee. Link Scheduling for
Minimum Delay in Spatial Re-use TDMA. In
Proc. of the 26th IEEE INFOCOM, 2007.
[7] K. Fall and K. Varadhan, editors. The ns
Manual. The VINT Project, UC Berkeley,
LBL, USC/ISI, and Xerox PARC, 2008.
Availiable from http://nsnam.isi.edu/nsnam/
index.php/User Information.
[8] R. Gallager. A Minimum Delay Routing
Algorithm using Distributed Computation.
IEEE Trans. on Communications, 25(1):73–
85, 1977.
[9] M.R. Garey and D.S. Johnson. Computers
and Intractability: A Guide to the Theory of
NP-Completeness. Freeman, New York,
1979.
[10] P. Gupta and P.R. Kumar. The capacity of
wireless networks. IEEE Trans. on
Information Theory, 46(2):388–404, 2000.
Author’s Profile
Mr. G. GURU CHARAN received
M.Tech (ECE) from JNTUH
Hyderabad, and B.Tech (ECE) from
JNTUH Hyderabad. He is working as
Assistant Professor in the Dept. of
Electronics and communication
Engineering, St.Martins Engineering College, R.R
Dist, AP and India. His area of research is Wireless
Communication & VLSI Technology. He has 4+
years of experience in teaching.
Mr. K.YADAIAH, pursuing PhD in
JNTUH under the guidance of Dr.
B.L. RAJU, Principal ACE
Engineering College. Post
Graduated in Electronics and
communication Engineering
(M.Tech) From JNTUCE, Kakinada in Nov-2003
and Graduated in ECE (B.Tech) from JNTU,
Hyderabad in 2001. He is working as An Associate
Professor and Head, Department of ECE in
St.Martins Engineering College, R.R Dist, AP and
India. He has 11+ years of Teaching Experience. His
Research area in Ph.D is Energy Efficient Routing in
MANETS & Wireless Sensor Networks.
Mr. G.SAILAJA received M.Tech
(Embedded systems) from JNTUK
Kakinada, and B.Tech (EIE) from
JNTUH Hyderabad. He is working as
Assistant Professor in the Dept. of
Electronics and communication
Engineering, Chebrolu Engineering College,
Guntur Dist, AP and India. His area of research is
Embedded Systems & VLSI Technology. He has
4+ years of experience in teaching.

Weitere ähnliche Inhalte

Was ist angesagt?

IEEE 2015 NS2 Projects
IEEE 2015 NS2 ProjectsIEEE 2015 NS2 Projects
IEEE 2015 NS2 ProjectsVijay Karan
 
Modified q aware scheduling algorithm for improved fairness in 802.16 j networks
Modified q aware scheduling algorithm for improved fairness in 802.16 j networksModified q aware scheduling algorithm for improved fairness in 802.16 j networks
Modified q aware scheduling algorithm for improved fairness in 802.16 j networksIJCNCJournal
 
IEEE 2015 NS2 Projects
IEEE 2015 NS2 ProjectsIEEE 2015 NS2 Projects
IEEE 2015 NS2 ProjectsVijay Karan
 
Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...
Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...
Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...Yayah Zakaria
 
Defeating jamming with the power of silence a gametheoretic analysis
Defeating jamming with the power of silence a gametheoretic analysisDefeating jamming with the power of silence a gametheoretic analysis
Defeating jamming with the power of silence a gametheoretic analysisranjith kumar
 
M phil-computer-science-networking-projects
M phil-computer-science-networking-projectsM phil-computer-science-networking-projects
M phil-computer-science-networking-projectsVijay Karan
 
M.Phil Computer Science Mobile Computing Projects
M.Phil Computer Science Mobile Computing ProjectsM.Phil Computer Science Mobile Computing Projects
M.Phil Computer Science Mobile Computing ProjectsVijay Karan
 
QoS Oriented Coding For Mobility Constraint in Wireless Networks
QoS Oriented Coding For Mobility Constraint in Wireless NetworksQoS Oriented Coding For Mobility Constraint in Wireless Networks
QoS Oriented Coding For Mobility Constraint in Wireless Networksiosrjce
 
Ieee transactions 2018 on wireless communications Title and Abstract
Ieee transactions 2018 on wireless communications Title and AbstractIeee transactions 2018 on wireless communications Title and Abstract
Ieee transactions 2018 on wireless communications Title and Abstracttsysglobalsolutions
 
Energy Efficient Optimal Paths Using PDORP-LC
Energy Efficient Optimal Paths Using PDORP-LCEnergy Efficient Optimal Paths Using PDORP-LC
Energy Efficient Optimal Paths Using PDORP-LCpaperpublications3
 
Java and .net IEEE 2012
Java and .net IEEE 2012Java and .net IEEE 2012
Java and .net IEEE 2012Vipin Jacob
 
An Adaptive Cluster Head Election Algorithm for Heterogeneous Mobile Ad-hoc N...
An Adaptive Cluster Head Election Algorithm for Heterogeneous Mobile Ad-hoc N...An Adaptive Cluster Head Election Algorithm for Heterogeneous Mobile Ad-hoc N...
An Adaptive Cluster Head Election Algorithm for Heterogeneous Mobile Ad-hoc N...IJLT EMAS
 
A smart clustering based approach to
A smart clustering based approach toA smart clustering based approach to
A smart clustering based approach toIJCNCJournal
 
M phil-computer-science-network-security-projects
M phil-computer-science-network-security-projectsM phil-computer-science-network-security-projects
M phil-computer-science-network-security-projectsVijay Karan
 
M phil-computer-science-wireless-communication-projects
M phil-computer-science-wireless-communication-projectsM phil-computer-science-wireless-communication-projects
M phil-computer-science-wireless-communication-projectsVijay Karan
 
Attaining Augmented Overhaul and Profit Maximization in Cognitive Wireless In...
Attaining Augmented Overhaul and Profit Maximization in Cognitive Wireless In...Attaining Augmented Overhaul and Profit Maximization in Cognitive Wireless In...
Attaining Augmented Overhaul and Profit Maximization in Cognitive Wireless In...paperpublications3
 
5113jgraph01
5113jgraph015113jgraph01
5113jgraph01graphhoc
 

Was ist angesagt? (19)

IEEE 2015 NS2 Projects
IEEE 2015 NS2 ProjectsIEEE 2015 NS2 Projects
IEEE 2015 NS2 Projects
 
Modified q aware scheduling algorithm for improved fairness in 802.16 j networks
Modified q aware scheduling algorithm for improved fairness in 802.16 j networksModified q aware scheduling algorithm for improved fairness in 802.16 j networks
Modified q aware scheduling algorithm for improved fairness in 802.16 j networks
 
IEEE 2015 NS2 Projects
IEEE 2015 NS2 ProjectsIEEE 2015 NS2 Projects
IEEE 2015 NS2 Projects
 
Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...
Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...
Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...
 
Defeating jamming with the power of silence a gametheoretic analysis
Defeating jamming with the power of silence a gametheoretic analysisDefeating jamming with the power of silence a gametheoretic analysis
Defeating jamming with the power of silence a gametheoretic analysis
 
M phil-computer-science-networking-projects
M phil-computer-science-networking-projectsM phil-computer-science-networking-projects
M phil-computer-science-networking-projects
 
M.Phil Computer Science Mobile Computing Projects
M.Phil Computer Science Mobile Computing ProjectsM.Phil Computer Science Mobile Computing Projects
M.Phil Computer Science Mobile Computing Projects
 
QoS Oriented Coding For Mobility Constraint in Wireless Networks
QoS Oriented Coding For Mobility Constraint in Wireless NetworksQoS Oriented Coding For Mobility Constraint in Wireless Networks
QoS Oriented Coding For Mobility Constraint in Wireless Networks
 
Ieee transactions 2018 on wireless communications Title and Abstract
Ieee transactions 2018 on wireless communications Title and AbstractIeee transactions 2018 on wireless communications Title and Abstract
Ieee transactions 2018 on wireless communications Title and Abstract
 
Energy Efficient Optimal Paths Using PDORP-LC
Energy Efficient Optimal Paths Using PDORP-LCEnergy Efficient Optimal Paths Using PDORP-LC
Energy Efficient Optimal Paths Using PDORP-LC
 
Java and .net IEEE 2012
Java and .net IEEE 2012Java and .net IEEE 2012
Java and .net IEEE 2012
 
An Adaptive Cluster Head Election Algorithm for Heterogeneous Mobile Ad-hoc N...
An Adaptive Cluster Head Election Algorithm for Heterogeneous Mobile Ad-hoc N...An Adaptive Cluster Head Election Algorithm for Heterogeneous Mobile Ad-hoc N...
An Adaptive Cluster Head Election Algorithm for Heterogeneous Mobile Ad-hoc N...
 
A smart clustering based approach to
A smart clustering based approach toA smart clustering based approach to
A smart clustering based approach to
 
M phil-computer-science-network-security-projects
M phil-computer-science-network-security-projectsM phil-computer-science-network-security-projects
M phil-computer-science-network-security-projects
 
Ns2 2015 2016 titles abstract
Ns2 2015 2016 titles abstractNs2 2015 2016 titles abstract
Ns2 2015 2016 titles abstract
 
M phil-computer-science-wireless-communication-projects
M phil-computer-science-wireless-communication-projectsM phil-computer-science-wireless-communication-projects
M phil-computer-science-wireless-communication-projects
 
Attaining Augmented Overhaul and Profit Maximization in Cognitive Wireless In...
Attaining Augmented Overhaul and Profit Maximization in Cognitive Wireless In...Attaining Augmented Overhaul and Profit Maximization in Cognitive Wireless In...
Attaining Augmented Overhaul and Profit Maximization in Cognitive Wireless In...
 
5113jgraph01
5113jgraph015113jgraph01
5113jgraph01
 
Ns2 2015 2016 titles abstract
Ns2 2015 2016 titles abstractNs2 2015 2016 titles abstract
Ns2 2015 2016 titles abstract
 

Andere mochten auch

situacion mundial
situacion mundialsituacion mundial
situacion mundialguest2637b
 
Mind Map # GETTING TO YES
Mind Map # GETTING TO YESMind Map # GETTING TO YES
Mind Map # GETTING TO YESmonsadako
 
Mercado de trabalho java
Mercado de trabalho javaMercado de trabalho java
Mercado de trabalho javaDiego Pacheco
 
A arca do fim do mundo
A arca do fim do mundoA arca do fim do mundo
A arca do fim do mundovaltermn
 
O amor em silêncio
O amor em silêncioO amor em silêncio
O amor em silênciovaltermn
 
Musical Instruments around the World 3 (India)
Musical Instruments around the World 3 (India)Musical Instruments around the World 3 (India)
Musical Instruments around the World 3 (India)Cachi Chien
 
E O Mundo Como Está Indo
E O Mundo Como Está IndoE O Mundo Como Está Indo
E O Mundo Como Está Indocassiopucminas
 
El bergueda.pps mm
El bergueda.pps mmEl bergueda.pps mm
El bergueda.pps mmvilamajor
 
Dia de la madre
Dia de la madreDia de la madre
Dia de la madremeulaliafg
 
20090415B Kaizen Boas Práticas Em Serviços
20090415B Kaizen Boas Práticas Em Serviços20090415B Kaizen Boas Práticas Em Serviços
20090415B Kaizen Boas Práticas Em ServiçosRoberto C. Mayer
 
Processo de decisão do consumidor - como pessoas reais compram
Processo de decisão do consumidor - como pessoas reais compramProcesso de decisão do consumidor - como pessoas reais compram
Processo de decisão do consumidor - como pessoas reais compramCairo Cananea
 
Neve e cores se misturam
Neve e cores se misturamNeve e cores se misturam
Neve e cores se misturamvaltermn
 
Meio ambiente e reciclagem apresentações por s imone helen drumond
Meio ambiente e reciclagem apresentações por s imone helen drumondMeio ambiente e reciclagem apresentações por s imone helen drumond
Meio ambiente e reciclagem apresentações por s imone helen drumondSimoneHelenDrumond
 

Andere mochten auch (20)

situacion mundial
situacion mundialsituacion mundial
situacion mundial
 
Yoga at Work
Yoga at WorkYoga at Work
Yoga at Work
 
Assign1
Assign1Assign1
Assign1
 
Überblick Solr
Überblick SolrÜberblick Solr
Überblick Solr
 
Mind Map # GETTING TO YES
Mind Map # GETTING TO YESMind Map # GETTING TO YES
Mind Map # GETTING TO YES
 
Mercado de trabalho java
Mercado de trabalho javaMercado de trabalho java
Mercado de trabalho java
 
Aa 1-sbk
Aa 1-sbkAa 1-sbk
Aa 1-sbk
 
IBOPE Media book
IBOPE Media bookIBOPE Media book
IBOPE Media book
 
A arca do fim do mundo
A arca do fim do mundoA arca do fim do mundo
A arca do fim do mundo
 
O amor em silêncio
O amor em silêncioO amor em silêncio
O amor em silêncio
 
Musical Instruments around the World 3 (India)
Musical Instruments around the World 3 (India)Musical Instruments around the World 3 (India)
Musical Instruments around the World 3 (India)
 
Informe 324
Informe 324Informe 324
Informe 324
 
E O Mundo Como Está Indo
E O Mundo Como Está IndoE O Mundo Como Está Indo
E O Mundo Como Está Indo
 
El bergueda.pps mm
El bergueda.pps mmEl bergueda.pps mm
El bergueda.pps mm
 
Dia de la madre
Dia de la madreDia de la madre
Dia de la madre
 
20090415B Kaizen Boas Práticas Em Serviços
20090415B Kaizen Boas Práticas Em Serviços20090415B Kaizen Boas Práticas Em Serviços
20090415B Kaizen Boas Práticas Em Serviços
 
Processo de decisão do consumidor - como pessoas reais compram
Processo de decisão do consumidor - como pessoas reais compramProcesso de decisão do consumidor - como pessoas reais compram
Processo de decisão do consumidor - como pessoas reais compram
 
Neve e cores se misturam
Neve e cores se misturamNeve e cores se misturam
Neve e cores se misturam
 
A Pesca En España
A Pesca En EspañaA Pesca En España
A Pesca En España
 
Meio ambiente e reciclagem apresentações por s imone helen drumond
Meio ambiente e reciclagem apresentações por s imone helen drumondMeio ambiente e reciclagem apresentações por s imone helen drumond
Meio ambiente e reciclagem apresentações por s imone helen drumond
 

Ähnlich wie C046022025

DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN...
DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN...DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN...
DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN...cscpconf
 
Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...
Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...
Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...IJECEIAES
 
Energy Behavior in Ad Hoc Network Minimizing the Number of Hops and Maintaini...
Energy Behavior in Ad Hoc Network Minimizing the Number of Hops and Maintaini...Energy Behavior in Ad Hoc Network Minimizing the Number of Hops and Maintaini...
Energy Behavior in Ad Hoc Network Minimizing the Number of Hops and Maintaini...CSCJournals
 
論文-A Novel Cross-layer Mesh Router Placement Scheme for Wireless Mesh Networks
論文-A Novel Cross-layer Mesh Router Placement Scheme for Wireless Mesh Networks論文-A Novel Cross-layer Mesh Router Placement Scheme for Wireless Mesh Networks
論文-A Novel Cross-layer Mesh Router Placement Scheme for Wireless Mesh NetworksHarvey Chang
 
A NODE DEPLOYMENT MODEL WITH VARIABLE TRANSMISSION DISTANCE FOR WIRELESS SENS...
A NODE DEPLOYMENT MODEL WITH VARIABLE TRANSMISSION DISTANCE FOR WIRELESS SENS...A NODE DEPLOYMENT MODEL WITH VARIABLE TRANSMISSION DISTANCE FOR WIRELESS SENS...
A NODE DEPLOYMENT MODEL WITH VARIABLE TRANSMISSION DISTANCE FOR WIRELESS SENS...ijwmn
 
DYNAMIC HYBRID CHANNEL (WMN) FOR BANDWIDTH GUARANTEES IN AD_HOC NETWORKS
DYNAMIC HYBRID CHANNEL (WMN) FOR BANDWIDTH GUARANTEES IN AD_HOC NETWORKSDYNAMIC HYBRID CHANNEL (WMN) FOR BANDWIDTH GUARANTEES IN AD_HOC NETWORKS
DYNAMIC HYBRID CHANNEL (WMN) FOR BANDWIDTH GUARANTEES IN AD_HOC NETWORKSpharmaindexing
 
A Professional QoS Provisioning in the Intra Cluster Packet Level Resource Al...
A Professional QoS Provisioning in the Intra Cluster Packet Level Resource Al...A Professional QoS Provisioning in the Intra Cluster Packet Level Resource Al...
A Professional QoS Provisioning in the Intra Cluster Packet Level Resource Al...GiselleginaGloria
 
Crosslayertermpaper
CrosslayertermpaperCrosslayertermpaper
CrosslayertermpaperB.T.L.I.T
 
IRJET- Chaos based Secured Communication in Energy Efficient Wireless Sensor...
IRJET-	 Chaos based Secured Communication in Energy Efficient Wireless Sensor...IRJET-	 Chaos based Secured Communication in Energy Efficient Wireless Sensor...
IRJET- Chaos based Secured Communication in Energy Efficient Wireless Sensor...IRJET Journal
 
A Novel Weighted Clustering Based Approach for Improving the Wireless Sensor ...
A Novel Weighted Clustering Based Approach for Improving the Wireless Sensor ...A Novel Weighted Clustering Based Approach for Improving the Wireless Sensor ...
A Novel Weighted Clustering Based Approach for Improving the Wireless Sensor ...IJERA Editor
 
Topology Management for Mobile Ad Hoc Networks Scenario
Topology Management for Mobile Ad Hoc Networks ScenarioTopology Management for Mobile Ad Hoc Networks Scenario
Topology Management for Mobile Ad Hoc Networks ScenarioIJERA Editor
 
Design and implementation of grid based clustering in WSN using dynamic sink ...
Design and implementation of grid based clustering in WSN using dynamic sink ...Design and implementation of grid based clustering in WSN using dynamic sink ...
Design and implementation of grid based clustering in WSN using dynamic sink ...journalBEEI
 
LINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORK
LINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORKLINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORK
LINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORKijwmn
 
LINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORK
LINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORKLINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORK
LINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORKijwmn
 
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...graphhoc
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...Editor IJCATR
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...Editor IJCATR
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...Editor IJCATR
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...Editor IJCATR
 

Ähnlich wie C046022025 (20)

DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN...
DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN...DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN...
DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN...
 
Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...
Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...
Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...
 
Energy Behavior in Ad Hoc Network Minimizing the Number of Hops and Maintaini...
Energy Behavior in Ad Hoc Network Minimizing the Number of Hops and Maintaini...Energy Behavior in Ad Hoc Network Minimizing the Number of Hops and Maintaini...
Energy Behavior in Ad Hoc Network Minimizing the Number of Hops and Maintaini...
 
論文-A Novel Cross-layer Mesh Router Placement Scheme for Wireless Mesh Networks
論文-A Novel Cross-layer Mesh Router Placement Scheme for Wireless Mesh Networks論文-A Novel Cross-layer Mesh Router Placement Scheme for Wireless Mesh Networks
論文-A Novel Cross-layer Mesh Router Placement Scheme for Wireless Mesh Networks
 
A NODE DEPLOYMENT MODEL WITH VARIABLE TRANSMISSION DISTANCE FOR WIRELESS SENS...
A NODE DEPLOYMENT MODEL WITH VARIABLE TRANSMISSION DISTANCE FOR WIRELESS SENS...A NODE DEPLOYMENT MODEL WITH VARIABLE TRANSMISSION DISTANCE FOR WIRELESS SENS...
A NODE DEPLOYMENT MODEL WITH VARIABLE TRANSMISSION DISTANCE FOR WIRELESS SENS...
 
DYNAMIC HYBRID CHANNEL (WMN) FOR BANDWIDTH GUARANTEES IN AD_HOC NETWORKS
DYNAMIC HYBRID CHANNEL (WMN) FOR BANDWIDTH GUARANTEES IN AD_HOC NETWORKSDYNAMIC HYBRID CHANNEL (WMN) FOR BANDWIDTH GUARANTEES IN AD_HOC NETWORKS
DYNAMIC HYBRID CHANNEL (WMN) FOR BANDWIDTH GUARANTEES IN AD_HOC NETWORKS
 
R33092099
R33092099R33092099
R33092099
 
A Professional QoS Provisioning in the Intra Cluster Packet Level Resource Al...
A Professional QoS Provisioning in the Intra Cluster Packet Level Resource Al...A Professional QoS Provisioning in the Intra Cluster Packet Level Resource Al...
A Professional QoS Provisioning in the Intra Cluster Packet Level Resource Al...
 
Crosslayertermpaper
CrosslayertermpaperCrosslayertermpaper
Crosslayertermpaper
 
IRJET- Chaos based Secured Communication in Energy Efficient Wireless Sensor...
IRJET-	 Chaos based Secured Communication in Energy Efficient Wireless Sensor...IRJET-	 Chaos based Secured Communication in Energy Efficient Wireless Sensor...
IRJET- Chaos based Secured Communication in Energy Efficient Wireless Sensor...
 
A Novel Weighted Clustering Based Approach for Improving the Wireless Sensor ...
A Novel Weighted Clustering Based Approach for Improving the Wireless Sensor ...A Novel Weighted Clustering Based Approach for Improving the Wireless Sensor ...
A Novel Weighted Clustering Based Approach for Improving the Wireless Sensor ...
 
Topology Management for Mobile Ad Hoc Networks Scenario
Topology Management for Mobile Ad Hoc Networks ScenarioTopology Management for Mobile Ad Hoc Networks Scenario
Topology Management for Mobile Ad Hoc Networks Scenario
 
Design and implementation of grid based clustering in WSN using dynamic sink ...
Design and implementation of grid based clustering in WSN using dynamic sink ...Design and implementation of grid based clustering in WSN using dynamic sink ...
Design and implementation of grid based clustering in WSN using dynamic sink ...
 
LINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORK
LINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORKLINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORK
LINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORK
 
LINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORK
LINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORKLINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORK
LINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORK
 
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
 

Kürzlich hochgeladen

WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 

Kürzlich hochgeladen (20)

WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 

C046022025

  • 1. G. Guru Charan et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 6( Version 2), June 2014, pp.20-25 www.ijera.com 20 | P a g e Wireless Mesh Networks Path Planning, Power Control and Optimal Solutions G. Guru Charan1 , K. Yadaiah2 , G. Sailaja3 1 (Department of ECE, St. Martins Engineering College, R.R Dist, Hyderabad) 2 (Department of ECE, St. Martins Engineering College, R.R Dist, Hyderabad) 3 (Department of ECE, Chebrolu Engineering College, Guntur Dist, Guntur) ABSTRACT Wireless mesh networks are considerd as a potential attractive alternative to provide Broadband acces to users. In this paper we address the following two questions: (i) Given a set of nodes with arbitrary locations, and a set of data rows, what is the max-min achievable throughput? And (ii) How should the network be configured to achieve the optimum? Given a set of nodes with arbitrary locations, and a set of data rows specified as source- destination pairs, what is the maximum achievable throughput, under certain constraints on the radio parameters in particular, on transmit power. How should the network be configured to achieve this maximum? Specifically, by configuration, we mean the complete choice of the set of links (i.e., topology), the routes, link schedules, and transmit powers and modulation schemes for each link. Keywords- Greedy pricing, optimal solutions, Path planning, Power control, Throughput, I. INTRODUCTION Characterizing the capacity of a wireless network has turned out to be a difficult problem of communication over a wireless medium. Beginning with wireless mesh networks a popular approach has been to characterize the asymptotic scaling of capacity in the number of nodes. By asking for bounds only in an order sense, it has been possible to derive the trend of capacity scaling, even in the information theoretic sense. However, although the knowledge of a capacity scaling law is quite valuable, it lends no insights into actual numbers for network capacity based on current technologies, or into the impact of macroscopic parameters such as transmits power budget and the availability of modulation schemes, on the network capacity. There has also been some work on optimally operating a wireless network; for example, in a routing and power control policy to stabilize the network is devised and in a power transmission strategy to minimize the power cost subject to average rate constraint is found. Owing to their focus on the algorithmic perspective, these works also do not shed any light into the network capacity, and an optimal configuration of a given wireless network to achieve it. This is the problem we seek to address in this thesis. 1.2 Motivation We consider the above questions from a networking standpoint, and pose them as an optimization problem to determine jointly optimal row routes, link activation schedules and physical layer parameters. We obtain some interesting insights into the interplay of the achievable throughput, routing and transmit power and modulation schemes. Determining the achievable throughput is computationally hard in general, however, using a smart technique we obtain numerical results for different scenarios of interest. We believe that our optimization based framework can also be used as a tool, for planning and capacity provisioning of wireless networks. II. WIRELESS MESH NETWORKS In this work, our notion of the maximum throughput is the max-min low rate, i.e., the maximum of the minimum end to end row throughputs that can be achieved in the network. This is an appropriate notion of capacity from a networking perspective since it may represent the aggregate bandwidth demands of subscriber stations in an IEEE 802.16-like access network, or the sampling rate at which sensors produce information about their environment, in a sensor network. We assume point-to-point links which can operate in accordance with their perceived signal-to- interference-and-noise ratio (SINR). We also assume that transmissions are co-ordinate (possibly, though not necessarily, by a central controller) so as to be conflict-free through activation schedules. RESEARCH ARTICLE OPEN ACCESS
  • 2. G. Guru Charan et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 6( Version 2), June 2014, pp.20-25 www.ijera.com 21 | P a g e Fig 2.1. A WMN with uplink and downlink flows Thus, our bounds reject the intrinsic limits posed by the underlying conflict structure of parallel transmissions, as dictated by the SINR calculations. The second question we answer is the following. We assume that the wireless nodes have an arbitrary set of transmit power levels, and an arbitrary set of modulation and coding strategies. All wireless links are considered to be operated at some required bit-error-rate (BER). A transmission on a wireless link is said to succeed, if the SINR perceived by the link remains greater than an SINR threshold which depends on the transmit power, modulation and coding, and the requisite BER. We show that this requirement results into a conflict set for each wireless link. For a given link, the corresponding conflict set is a collection of subsets of links, such that at least one link from each subset cannot be activated simultaneously with the given link (in the sense of satisfying the BER requirement). To resolve Q1 and Q2 we take a constructive approach, i.e., we explicitly construct a network that has the maximum throughput. Since the problem is to construct a throughput optimal network, the idea is to pose it as a problem of optimal resource allocation and routing on a .dummy network. Specified by the complete graph on given wireless nodes. We discuss two static optimization formulations for this problem. They are complementary in the sense that one throws light on the routing perspective while the other on the scheduling perspective. It can be shown that determining the maximum throughput is a computationally hard problem in general. However, using a smart enumerative technique, for specific instances of the problem computations can be greatly reduced. We provide results for different scenarios of interest such as a sensor network on a grid, and a mesh of nodes deployed in hexagonal cells. A static optimization setting similar to ours has been discussed in [3], [4]. In [4], the authors focus on a low SINR regime with the link capacities being linear functions of the perceived SINR. In our work, we consider modulation and coding schemes as determining the link capacities, rather than approximations of the Shannon capacity function. In [3], the authors use a conflict graph formulation to model the schedulability relationships between the wireless links. Our results are based on a more general conflict set formulation, and while they certainly support those in [3], they further provide important insights into the impact of macroscopic parameters such as transmit power budget and availability of modulation schemes, on the throughput performance. Further, the upper bounds on throughput derived in [3] are rather loose and consider only the cliques formed by singleton conflict set members. Under these assumptions, the problem of resource allocation and routing can be cast simply as an optimal routing problem. The idea is to replace a link say, between nodes i and j, by multiple .artificial links. Each one corresponding to one combination of transmits power levels and modulation coding schemes available at i . Thus, optimal selection of power and modulation is translated into optimal selection of links. Some basic notation is in order. N denotes the number of given static wireless nodes; their set is denoted by N. L denotes the set of all possible links among these nodes; L includes all artificial links as discussed above. Cardinality of L is denoted by L. Links are assumed to be directed; l 2 L is also represented as (lo; ld), where lo and ld denote the originating and the destination nodes resp. LOi (resp. LIi) denotes the set of links outgoing from node i (resp. incoming to i). Let Pl denote the transmission power on link l and zl the corresponding modulation-coding scheme. The characteristics of WMNs are explained as follows:  Multi-hop wireless network. An objective to develop WMNs is to extend the coverage range of current wireless networks without sacrificing the channel capacity. Another objective is to provide non-line-of-sight (NLOS) connectivity among the users without direct line-of-sight (LOS) links. To meet these requirements, the mesh-style multi-hopping is indispensable, which achieves higher throughput without sacrificing effective radio range via shorter link distances, less interference between the nodes, and more efficient frequency re-use.  Support for ad hoc networking, and capability of self-forming, self-healing, and self-organization. WMNs enhance network performance, because of flexible network architecture, easy deployment and configuration, fault tolerance, and mesh connectivity, i.e., multipoint-to- multipoint communications. Due to these features, WMNs have low upfront investment requirement, and the network can grow gradually as needed.  Mobility dependence on the type of mesh nodes. Mesh routers usually have minimal mobility, while mesh clients can be stationary or mobile nodes.
  • 3. G. Guru Charan et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 6( Version 2), June 2014, pp.20-25 www.ijera.com 22 | P a g e  Multiple types of network access. In WMNs, both backhaul access to the Internet and peer to peer (P2P) communications are supported. In addition, the integration of WMNs with other wireless networks and providing services to end- users of these networks can be accomplished through WMNs.  Dependence of power-consumption constraints on the type of mesh nodes. Mesh routers usually do not have strict constraints on power consumption. However, mesh clients may require power efficient protocols. Mobility. Since ad hoc networks provide routing using the end-user devices, the network topology and connectivity depend on the movement of users. This imposes additional challenges on routing protocols as well as on network configuration and deployment. 2.2. Analysis on min-hop network: Now let us look at Figure 3 and Figure 4 which depicts the optimal routing under different choices of transmits power and modulation and coding scheme. The range of a sensor node in the configuration in Figure 3 is 16 m which is twice the grid side, and in Figure 4 it is 12:7 m which is more than the grid diagonal. Note that in both the cases, the optimal routes are not minimum hop, for all the nodes. Within the region indicated by the dotted line in both the figures, the nodes use minimum hop paths, although in Figure 3 some sensors split their data along multiple paths not all of which are minimum hop. Also, observe that the nodes along the diagonal, beyond the dotted line, route their data along the periphery of the network. This is an illustration of what may be termed interference-avoiding routing. Fig 2.1 Mini-hop network 2.2.2 Analysis on multi-hop network: Fig 2.2 Multi-hop network This example is identical. However, there are only two data rows (indicated as red-straight edges and blue-curved edges). The red row originates at the bottom left corner node, and is destined to the red node adjacent to the top right corner. Likewise, for the blue row. The optimal routes which achieve the max- min throughput for the two data rows are indicated by the red and blue links in Figure 5. The dotted links carry less than 15% of the total traffic, and more than 80% of the total traffic is carried along the periphery over the solid links. In this case, the range of each node is 11:3 m which is equal to the grid diagonal. However, the routing uses only two diagonal links, and is far from minimum hop. Although some data is routed along common paths and links, the bulk of the data is routed so that the rows .avoid each other. 2.3 The multi-hop advantage: In a mesh network with diverging flows, the maximum achievable throughput can be obtained by using a much lower transmit power at the gateway using multi hop communication than with single-hop communication. III. IMPLEMENTATION The thesis model the network n of nodes (the mesh routers and the gate way ) and a set l of directed links with mod N=n and mod l=l each node has a location (xi,yi) we denote by l the set of links incident to a node i.a link il is identified not only by its origin destination pair but also its physical parameters which are defined .a f denotes set of flows and let mod f=f a flow f is identified not only by its origin destination pair (fs,fd) and has a rate lambda. We present models for the scheduling, rate adaptation, and power control problem whose solution can be used to configure the network. Note that, in all cases, we restrict ourselves to conflict-free scheduling Each link is I belongs l identified by four physical parameters O(l),d(l) the origin and the destination nodes of l. a link is sometimes denoted (I ,j)when ever Pt: transmit power, Ct: the link rate per second.
  • 4. G. Guru Charan et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 6( Version 2), June 2014, pp.20-25 www.ijera.com 23 | P a g e 3.1 Additive interference model: It’s used to extends the physical interference model. The maximum throughput attained when In this formulation, we have and. The maximization is explicitly taken with respect to the maximum flow and link load allocation We call this problem JP-Primal. It is a standard but very large linear program (LP) and its difficulty lies in the computation of the incidence matrix which grows exponentially with the problem size. The maximum throughput is attained by Perceptive behavior is a class of mechanisms that empowers wireless devices to exchange information during normal packet delivery and to coordinate and communicate with other nearby devices, even though some of these devices may be outside of direct communication range. 3.2 Reactive routing: We design, develop and test several components of reactive routing in wireless multi-hop networks. Our research leads to significant improvement and has made deployment of ad hoc networks more feasible. Our initial focus was development of an Ad hoc On-demand Distance Vector (AODV) routing daemon. Our implementation is known as AODV- UCSB. While developing the implementation, we identified several ambiguities and errors in the protocol specification. Our insight significantly influenced the contents and structure of the AODV Experimental RFC. IV. TOOLS FOR EXACT SOLUTIONS This means solving a very large LP with a coefficient matrix that grows exponentially with the size of the network. We now present two efficient algorithms that solve JP exactly. we construct the matrix using an efficient enumeration of the ISets. 4.1 Solution by the simplex algorithm: We propose here an efficient algorithm that constructs all possible ISets but no more. The complexity of this method is only as opposed to in [2], where is the maximum ISet size and typically . We describe it using a recursive depth-first algorithm, but we have also implemented an iterative breadth-first version. While the recursive form is simpler to program and is well suited for enumerating all ISets, the iterative form is better suited for enumerating only the maximal ISets. The algorithm is based on the following proposition that is trivial to prove. Proposition 1: If is an independent set, then any subset of is also an independent set. The algorithm builds ISets of increasing sizes and stops when this is no longer possible. This is done using an enumeration tree as follows. The root node is at depth 0. A node at depth contains an ISet of links and a list of links that are candidate for addition to this ISet. We assume that is implemented as an ordered data structure indexed by increasing link number. Consequently, means that appears later than in and returns the link whose index number is the largest in .We define two functions. The first one is prune , which returns a reduced candidate list of links constructed as described in Fig. 1. The condition on line 5 for adding a link to an ISet has two parts. The first is used to avoid enumerating ISets more than once, and the second tests the set
  • 5. G. Guru Charan et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 6( Version 2), June 2014, pp.20-25 www.ijera.com 24 | P a g e against the appropriate interference model defined in Section III-B. The first condition is due to the fact that the ISets are built in a precise order. At a given depth in the tree, the tree nodes contain ISets of links and are built left to right with the link numbers in an increasing lexicographic order. Suppose that and that. Since there is already a node to the left of the current node containing the ISet , there is no need to add to .The other function akeSons is a simple recursive procedure that builds all the children of a node for a given candidate list . It should be clear that a child of is an ISet that differs from by one link. The set of ISets is accumulated at each node until the whole collection is built up. Finally, the algorithm is initialized with the root node empty, and the first candidate list is the set of all links. 4.2 Solution by column generation: Even with the most efficient enumeration technique, the approach of Section IV-A will eventually become infeasible due to the large size of set . On the other hand, we know that only a few ISets will be active in the optimal solution by the following proposition. Proposition 2: The number of nonzero elements of , i.e.,the number of ISets that are effectively used, in a basic solution of JP-Primal is at most . This follows directly from Carathéodory’s theorem. This suggests that we use column generation to solve the problem, thus voiding the explicit generations of . If we write the constraints in standard matrix form, the column corresponding to constraints (4) and some variable has the form . These are used for pricing the ISets as follows. 1.3 Exact Pricing: Column generation is basically the revised simplex algorithm with a particular pricing echnique. The technique uses only a subset of columns , which is called the Restricted Master Problem (RMP). At a given iteration, we have, for the RMP, a basic feasible solution, and as well as the current estimate of the dual variables , , and The first step of the next simplex iteration is to price the offbasis columns. The reduced cost of an off-basis column is given by the standard formula since the cost coefficient of the off-basis variable in the objective function is zero. When the objective is to maximize, the standard pivoting rule of the simplex is to choose the column with the largest reduced cost. The stopping rule is also simple: If there is no off- basis column with a strictly positive reduced cost, the current solution is optimal. This means that the pricing requires the solution of the following Maximum Weight ISet (MWIS) problem with as the link weights subject to constraints (1) and (2). It can be easily shown that it is an NP-hard problem. If we want an optimal solution, we must make sure that there is no off-basis column with a strictly positive reduced cost at the last simplex iteration. This in turn means that we have to solve the MWISpricing subproblem to optimality. It will then become very difficult to compute large networks by a straightforward column-generation technique. This is why we propose another method called greedy pricing, which has been proven to be very fast at delivering exact solutions. 1.4 Greedy Pricing: We can reduce the amount of computation if we use a greedy pricing rule at each iteration. This is based on the fact that choosing any column with a positive reduced cost may potentially produce a new solution with a higher value of the objective. We can also speed up the calculation by solving the pricing subproblem over a set of links with positive reduced costs only. The reason is that if there exists a solution to the MWIS problem where some links with zero reduced costs appear in the solution, then there is an optimal solution made up of only the links with strictly positive reduced costs. This follows from Proposition 1. The algorithm to find a new column for the RMP with a positive reduced cost uses two functions, denoted as greedy and enuoracle. They take a link set as the input and return an ISet with a positive reduced cost, if such a set exists, or an empty set. In a basic implementation of greedy, the algorithm simply orders the links in decreasing weights. V. RESULTS
  • 6. G. Guru Charan et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 6( Version 2), June 2014, pp.20-25 www.ijera.com 25 | P a g e VI. FUTURE SCOPE Considering the scheduling routing and rate of adaption maximum throughput is attained considering out chip (channel) signals. The wireless mesh networks of minimum interference and maximum throughput is to be achieved . REFERENCES [1] IEEE 802.16 Standard Group, [Online]. Available: http://www. ieee802. org/16/ [2] A. Karnik, A. Iyer, and C. Rosenberg, “Throughput-optimal configuration of wireless networks,” IEEE/ACM Trans. Netw., vol. 16, no. 5, pp. 1161–1174, Oct. 2008. [3] C. Joo, X. Lin, and N. Shroff, “Understanding the capacity region of the greedy maximal scheduling algorithm in multi-hop wireless networks,” in Proc. IEEE INFOCOM, 2008, pp. 1103–1111. [4] M. Johansson and L. Xiao, “Cross-layer optimization of wirelessnetworks using nonlinear column generation,” IEEE Trans. Wireless Commun., vol. 5, no. 2, pp. 435– 445, Feb. 2006. [5] M. Alicherry, R. Bhatia, and L. Li. Joint Channel Assignment and Routing for Throughput Optimization in Multi-Radio Wireless Mesh Networks. In Proc of the 11th ACM MobiCom, 2005. [6] P. Dujkic and S. Valaee. Link Scheduling for Minimum Delay in Spatial Re-use TDMA. In Proc. of the 26th IEEE INFOCOM, 2007. [7] K. Fall and K. Varadhan, editors. The ns Manual. The VINT Project, UC Berkeley, LBL, USC/ISI, and Xerox PARC, 2008. Availiable from http://nsnam.isi.edu/nsnam/ index.php/User Information. [8] R. Gallager. A Minimum Delay Routing Algorithm using Distributed Computation. IEEE Trans. on Communications, 25(1):73– 85, 1977. [9] M.R. Garey and D.S. Johnson. Computers and Intractability: A Guide to the Theory of NP-Completeness. Freeman, New York, 1979. [10] P. Gupta and P.R. Kumar. The capacity of wireless networks. IEEE Trans. on Information Theory, 46(2):388–404, 2000. Author’s Profile Mr. G. GURU CHARAN received M.Tech (ECE) from JNTUH Hyderabad, and B.Tech (ECE) from JNTUH Hyderabad. He is working as Assistant Professor in the Dept. of Electronics and communication Engineering, St.Martins Engineering College, R.R Dist, AP and India. His area of research is Wireless Communication & VLSI Technology. He has 4+ years of experience in teaching. Mr. K.YADAIAH, pursuing PhD in JNTUH under the guidance of Dr. B.L. RAJU, Principal ACE Engineering College. Post Graduated in Electronics and communication Engineering (M.Tech) From JNTUCE, Kakinada in Nov-2003 and Graduated in ECE (B.Tech) from JNTU, Hyderabad in 2001. He is working as An Associate Professor and Head, Department of ECE in St.Martins Engineering College, R.R Dist, AP and India. He has 11+ years of Teaching Experience. His Research area in Ph.D is Energy Efficient Routing in MANETS & Wireless Sensor Networks. Mr. G.SAILAJA received M.Tech (Embedded systems) from JNTUK Kakinada, and B.Tech (EIE) from JNTUH Hyderabad. He is working as Assistant Professor in the Dept. of Electronics and communication Engineering, Chebrolu Engineering College, Guntur Dist, AP and India. His area of research is Embedded Systems & VLSI Technology. He has 4+ years of experience in teaching.