Simulation of a WiMAX network to evaluate the performance of MAC IEEE 802.16 during the IR phase of Network Entry and Initialization

被引:0
|
作者
Namratha, M. [1 ]
Pradeep [1 ]
Manu, G., V [2 ,3 ]
机构
[1] PESIT, Dept Informat Sci, Software Engn, Bangalore, Karnataka, India
[2] SJCIT, Comp Sci, Chikkabalapur, India
[3] Calsoft Labs, Testing, Bangalore, Karnataka, India
关键词
Backoff delay; Circular topology; Linear topology; Markov Model; Pervasive computing; Ubiquitous computing; WiMAX;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Pervasive Computing is also called as Ubiquitous Computing, which means "being present everywhere at once" or "constantly encountered". The main idea behind making these pervasive computing systems is that these systems improve living by performing computations on their own, without having to be monitored by anyone. These systems are targeted to become invisible to the user i.e., they perform their tasks without the user's knowledge. To achieve this environment, the underlying requirement is a Network. One of the biggest constraints in achieving this environment is the "Last Mile" problem. It refers to the last leg of delivering connectivity from a communications provider to a customer. In recent years there has been increasing interest shown in wireless technologies for subscriber access, as an alternative to traditional twisted-pair local loop. WiMAX, Worldwide Interoperability for Microwave Access, is a Telecommunications technology that provides wireless transmission of data and is based on the IEEE 802.16 standard (also called Broadband Wireless Access). 802.16 uses paired radio channels Up Link Channel (UL) and Down Link Channel (DL) for establishing a communication between Base Station (BS) and Subscriber Station (SS). When a SS wants to establish connectivity with a BS it goes through the Network Entry and Initialization procedure of which Initial Ranging (IR) is a very important part. IR is the process of acquiring the correct timing offset and power adjustments such that the SS's transmissions are aligned to maintain the UL connection with the BS. All the SS's of a BS will compete for the contention slots for their network entry. Whenever the SS has to transmit the request packets it performs the Truncated Binary Exponential Backoff procedure. This method is the contention resolution procedure used in IEEE 802.16 networks. Our focus here was to simulate a WiMAX network so as to evaluate the performance of MAC IEEE 802.16 during the IR phase of Network Entry and Initialization. We have used Network Simulator-2 (NS-2) for our simulation purposes. We are using WiMAX "patch" which simulates the PHY and the MAC features of a WiMAX network. We have evaluated the performance of MAC IEEE 802.16 for various topologies.
引用
收藏
页码:110 / 120
页数:11
相关论文
共 50 条
  • [1] Performance Measurement over Mobile WiMAX/IEEE 802.16e Network
    Kim, Dongmyoung
    Cai, Hua
    Na, Minsoo
    Choi, Sunghyun
    2008 IEEE INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND MULTIMEDIA NETWORKS, VOLS 1 AND 2, 2008, : 41 - +
  • [2] Slow and steady: Modelling and performance analysis of the network entry process in IEEE 802.16
    Hollick, Matthias
    Mogre, Parag S.
    Schott, Christian
    Steinmetz, Ralf
    2007 FIFTEENTH IEEE INTERNATIONAL WORKSHOP ON QUALITY OF SERVICE, 2007, : 126 - +
  • [3] Network Entry process Security in IEEE 802.16 Mesh mode
    Jabri, Mohamed-Amin
    Ben Azzouz, Lamia
    2008 1ST IFIP WIRELESS DAYS (WD), 2008, : 390 - +
  • [4] Enhanced Network Control for the Entry Process of IEEE 802.16 Mesh Networks
    Macedo, Y.
    Rangel, V.
    Gomez, J.
    Lopez-Guerrero, M.
    Aquino, R.
    ELEKTRONIKA IR ELEKTROTECHNIKA, 2012, 117 (01) : 43 - 48
  • [5] A Cooperative MAC for Distributed Space-Time Coding in an IEEE 802.16 Network
    Liu, Pei
    Nie, Chun
    Korakis, Thanasis
    Panwar, Shivendra
    2008 5TH INTERNATIONAL CONFERENCE ON BROADBAND COMMUNICATIONS, NETWORKS AND SYSTEMS (BROADNETS 2008), 2008, : 25 - 31
  • [6] Link-level simulation and performance estimation of WiMAX IEEE802.16e
    Zhou, Wen-an
    Xie, Bing
    Song, Jun-de
    2007 2ND INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND APPLICATIONS, VOLS 1 AND 2, 2007, : 703 - 707
  • [7] Facilitating the network entry and link establishment processes of IEEE 802.16 mesh networks
    Wang, Shie-Yuan
    Lin, Chih-Che
    Fang, Ku-Han
    Hsu, Teng-Wei
    2007 IEEE WIRELESS COMMUNICATIONS & NETWORKING CONFERENCE, VOLS 1-9, 2007, : 1844 - 1849
  • [8] Performance analysis of the IEEE 802.16 wireless metropolitan area network
    Cho, DH
    Song, JH
    Kim, MS
    Han, KJ
    DFMA '05: FIRST INTERNATIONAL CONFERENCE ON DISTRIBUTED FRAMEWORKS FOR MULTIMEDIA APPLICATIONS, PROCEEDINGS, 2004, : 130 - 137
  • [9] Simulation of IEEE 802.16j Mobile WiMAX Relay Network to Determine the Most Efficient Zone to Deploy Relay Station
    Bulbenkiene, V.
    Pareigis, V.
    Andziulis, A.
    Kurmis, M.
    Jakovlev, S.
    ELEKTRONIKA IR ELEKTROTECHNIKA, 2011, (06) : 81 - 84
  • [10] PERFORMANCE ANALYSIS OF BINARY EXPONENTIAL BACKOFF MAC PROTOCOL FOR COGNITIVE RADIO IN THE IEEE 802.16E/M NETWORK
    Jin, Shengzhu
    Choi, Bong Dae
    Eom, Doo Seop
    JOURNAL OF INDUSTRIAL AND MANAGEMENT OPTIMIZATION, 2017, 13 (03) : 1483 - 1494