Simulation of a WiMAX network to evaluate the performance of MAC IEEE 802.16 during the IR phase of Network Entry and Initialization

被引:0
|
作者
Namratha, M. [1 ]
Pradeep [1 ]
Manu, G., V [2 ,3 ]
机构
[1] PESIT, Dept Informat Sci, Software Engn, Bangalore, Karnataka, India
[2] SJCIT, Comp Sci, Chikkabalapur, India
[3] Calsoft Labs, Testing, Bangalore, Karnataka, India
关键词
Backoff delay; Circular topology; Linear topology; Markov Model; Pervasive computing; Ubiquitous computing; WiMAX;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Pervasive Computing is also called as Ubiquitous Computing, which means "being present everywhere at once" or "constantly encountered". The main idea behind making these pervasive computing systems is that these systems improve living by performing computations on their own, without having to be monitored by anyone. These systems are targeted to become invisible to the user i.e., they perform their tasks without the user's knowledge. To achieve this environment, the underlying requirement is a Network. One of the biggest constraints in achieving this environment is the "Last Mile" problem. It refers to the last leg of delivering connectivity from a communications provider to a customer. In recent years there has been increasing interest shown in wireless technologies for subscriber access, as an alternative to traditional twisted-pair local loop. WiMAX, Worldwide Interoperability for Microwave Access, is a Telecommunications technology that provides wireless transmission of data and is based on the IEEE 802.16 standard (also called Broadband Wireless Access). 802.16 uses paired radio channels Up Link Channel (UL) and Down Link Channel (DL) for establishing a communication between Base Station (BS) and Subscriber Station (SS). When a SS wants to establish connectivity with a BS it goes through the Network Entry and Initialization procedure of which Initial Ranging (IR) is a very important part. IR is the process of acquiring the correct timing offset and power adjustments such that the SS's transmissions are aligned to maintain the UL connection with the BS. All the SS's of a BS will compete for the contention slots for their network entry. Whenever the SS has to transmit the request packets it performs the Truncated Binary Exponential Backoff procedure. This method is the contention resolution procedure used in IEEE 802.16 networks. Our focus here was to simulate a WiMAX network so as to evaluate the performance of MAC IEEE 802.16 during the IR phase of Network Entry and Initialization. We have used Network Simulator-2 (NS-2) for our simulation purposes. We are using WiMAX "patch" which simulates the PHY and the MAC features of a WiMAX network. We have evaluated the performance of MAC IEEE 802.16 for various topologies.
引用
收藏
页码:110 / 120
页数:11
相关论文
共 50 条
  • [41] A NETWORK ENTRY PROTOCOL AND AN OFDMA SYMBOL ALLOCATION SCHEME FOR NON-TRANSPARENT RELAY STATIONS IN IEEE 802.16j MMR NETWORKS
    Kwon, Bongkyoung
    Chang, Yusun
    Copeland, John A.
    2008 IEEE MILITARY COMMUNICATIONS CONFERENCE: MILCOM 2008, VOLS 1-7, 2008, : 3350 - 3355
  • [42] Proposed Overhead Fibre-WiMAX IEEE 802.16e hybrid Network Framework Deployment for Last-mile Connectivity and Access: Botswana.
    Mokeresete, Malebogo
    Esiefarienrhe, Bukohwo Michael
    INTERNATIONAL CONFERENCE ON ELECTRICAL, COMPUTER AND ENERGY TECHNOLOGIES (ICECET 2021), 2021, : 949 - 954
  • [43] A simulation study of the PLC-MAC performance using network simulator-2
    Kim, Min-Soo
    Son, Dong-Min
    Ko, Young-Bae
    Kim, Young-Hyun
    IEEE ISPLC: 2008 IEEE INTERNATIONAL SYMPOSIUM ON POWER LINE COMMUNICATIONS AND ITS APPLICATIONS, 2008, : 99 - +
  • [44] An Opportunistic Packet Scheduling Algorithm for Load Balancing (LoBO) in IEEE 802.16j Multi-hop Relay-Enhanced Mobile WiMAX Network
    Tae W. Kim
    Chung G. Kang
    Wireless Personal Communications, 2015, 84 : 1227 - 1241
  • [45] An Opportunistic Packet Scheduling Algorithm for Load Balancing (LoBO) in IEEE 802.16j Multi-hop Relay-Enhanced Mobile WiMAX Network
    Kim, Tae W.
    Kang, Chung G.
    WIRELESS PERSONAL COMMUNICATIONS, 2015, 84 (02) : 1227 - 1241
  • [46] Improving TCP Performance in Wireless Network during Vertical Handoff from WiFi to WiMAX
    Abirami, K.
    Priya, S. Sathya
    Murugan, K.
    2013 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS AND NETWORKING TECHNOLOGIES (ICCCNT), 2013,
  • [47] Modeling and Analysis MAC Layer Performance for IEEE 802.11s Wireless Mesh Network in Smart Grid
    Deng, Xiaoheng
    He, Lifang
    Gui, Jinsong
    Peng, Qionglin
    He, Tingting
    2015 INTERNATIONAL CONFERENCE ON IDENTIFICATION, INFORMATION, AND KNOWLEDGE IN THE INTERNET OF THINGS (IIKI), 2015, : 280 - 283
  • [48] Performance Assessment of IR-UWB Body Area Network (BAN) Based on IEEE 802.15.6 Standard
    Liu, Huiliang
    Sarrazin, Julien
    Deshours, Frederique
    Mavridis, Theodoros
    Petrillo, Luca
    Liu, Zewen
    De Doncker, Philippe
    Benlarbi-Delai, Aziz
    IEEE ANTENNAS AND WIRELESS PROPAGATION LETTERS, 2016, 15 : 1645 - 1648
  • [49] Performance evaluation of modified IEEE 802.11 MAC for multi-channel multi-hop ad hoc network
    Li, JD
    Haas, ZJ
    Sheng, M
    Chen, YH
    AINA 2003: 17TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, 2003, : 312 - 317
  • [50] Performance Study on Energy Consumption and QoS of Wireless Sensor Network under different MAC Layer Protocols: IEEE802.15.4 and IEEE802.11
    Margono, F. I.
    Zolkefpeli, M. A. M.
    Shaaya, S. A.
    2009 IEEE STUDENT CONFERENCE ON RESEARCH AND DEVELOPMENT: SCORED 2009, PROCEEDINGS, 2009, : 65 - 68