Simulation of a WiMAX network to evaluate the performance of MAC IEEE 802.16 during the IR phase of Network Entry and Initialization

被引:0
|
作者
Namratha, M. [1 ]
Pradeep [1 ]
Manu, G., V [2 ,3 ]
机构
[1] PESIT, Dept Informat Sci, Software Engn, Bangalore, Karnataka, India
[2] SJCIT, Comp Sci, Chikkabalapur, India
[3] Calsoft Labs, Testing, Bangalore, Karnataka, India
关键词
Backoff delay; Circular topology; Linear topology; Markov Model; Pervasive computing; Ubiquitous computing; WiMAX;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Pervasive Computing is also called as Ubiquitous Computing, which means "being present everywhere at once" or "constantly encountered". The main idea behind making these pervasive computing systems is that these systems improve living by performing computations on their own, without having to be monitored by anyone. These systems are targeted to become invisible to the user i.e., they perform their tasks without the user's knowledge. To achieve this environment, the underlying requirement is a Network. One of the biggest constraints in achieving this environment is the "Last Mile" problem. It refers to the last leg of delivering connectivity from a communications provider to a customer. In recent years there has been increasing interest shown in wireless technologies for subscriber access, as an alternative to traditional twisted-pair local loop. WiMAX, Worldwide Interoperability for Microwave Access, is a Telecommunications technology that provides wireless transmission of data and is based on the IEEE 802.16 standard (also called Broadband Wireless Access). 802.16 uses paired radio channels Up Link Channel (UL) and Down Link Channel (DL) for establishing a communication between Base Station (BS) and Subscriber Station (SS). When a SS wants to establish connectivity with a BS it goes through the Network Entry and Initialization procedure of which Initial Ranging (IR) is a very important part. IR is the process of acquiring the correct timing offset and power adjustments such that the SS's transmissions are aligned to maintain the UL connection with the BS. All the SS's of a BS will compete for the contention slots for their network entry. Whenever the SS has to transmit the request packets it performs the Truncated Binary Exponential Backoff procedure. This method is the contention resolution procedure used in IEEE 802.16 networks. Our focus here was to simulate a WiMAX network so as to evaluate the performance of MAC IEEE 802.16 during the IR phase of Network Entry and Initialization. We have used Network Simulator-2 (NS-2) for our simulation purposes. We are using WiMAX "patch" which simulates the PHY and the MAC features of a WiMAX network. We have evaluated the performance of MAC IEEE 802.16 for various topologies.
引用
收藏
页码:110 / 120
页数:11
相关论文
共 50 条
  • [21] Analysis and performance evaluation of the OFDM-based metropolitan area network IEEE 802.16
    Hoymann, C
    COMPUTER NETWORKS, 2005, 49 (03) : 341 - 363
  • [22] Designing and Implementing an IEEE 802.16 Network Simulator for Performance Evaluation of Bandwidth Allocation Algorithms
    Lai, Yuan-Cheng
    Chen, Yen-Hung
    HPCC: 2009 11TH IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2009, : 432 - 437
  • [23] A Multiobjective Optimization Framework for IEEE 802.16e Network Design and Performance Analysis
    Gordejuela-Sanchez, Fernando
    Juttner, Alpar
    Zhang, Jie
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2009, 27 (02) : 202 - 216
  • [24] Accurate Modelling of OFDMA Transmission Technique Using IEEE 802.16m Recommendations for WiMAX Network Simulator Design
    Miozzo, Marco
    Bader, Faouzi
    MOBILE NETWORKS AND MANAGEMENT, 2010, 68 : 258 - 269
  • [25] Effects of threshold based relay selection algorithms on the performance of an IEEE 802.16j mobile multi-hop relay(MMR) WiMAX network
    Chaudhuri Manoj Kumar Swain
    Susmita Das
    Digital Communications and Networks, 2018, 4 (01) : 58 - 68
  • [26] Effects of threshold based relay selection algorithms on the performance of an IEEE 802.16j mobile multi-hop relay (MMR) WiMAX network
    Swain, Chaudhuri Manoj Kumar
    Das, Susmita
    DIGITAL COMMUNICATIONS AND NETWORKS, 2018, 4 (01) : 58 - 68
  • [27] Performance Modeling and Simulation Studies of MAC Protocols in Sensor Network Performance
    Sahota, Herman
    Kumar, Ratnesh
    Kamal, Ahmed
    2011 7TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2011, : 1871 - 1876
  • [28] The system design and performance analysis of WiMAX base station MAC based on intel network processor
    Wu, Ming
    Xie, Changsheng
    Wang, Qingdong
    INTERNATIONAL CONFERENCE ON NETWORKING, ARCHITECTURE, AND STORAGE, PROCEEDINGS, 2007, : 247 - +
  • [29] Performance evaluation of the ADSA in a vehicular network: MAC approach in IEEE 802.11p
    E. A. Feukeu
    K. Djouani
    A. Kurien
    Journal of Ambient Intelligence and Humanized Computing, 2015, 6 : 351 - 360
  • [30] Performance evaluation of the ADSA in a vehicular network: MAC approach in IEEE 802.11p
    Feukeu, E. A.
    Djouani, K.
    Kurien, A.
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2015, 6 (03) : 351 - 360