SlideShare a Scribd company logo
ACEEE Int. J. on Network Security, Vol. 01, No. 03, Dec 2010




      Performance Analysis and Development of an
           Efficient Routing Scheme for IEEE
            802.16/WiMAX Mesh Networks
                            Rijvi Ahmed; A.H.M. Nazir Hossain; M.M. Shahriar Maswood
       Department of Electronics & Communication Engineering, Khulna University of Engineering & Technology
                    Khulna- 9203, Bangladesh. nazir_kuetcec05@yahoo.com, r_shaon@yahoo.com


Abstract— A collision-free centralized scheduling algorithm                                II. BACKGROUND
for IEEE 802.16          WiMAX provides a mechanism for
creations multi-hop mesh and high-quality wireless                         Performances of wireless mesh networks can be
multimedia services which can be developed as a high speed            improved by employing spatial reuse with concurrent
broad band wireless network. In centralized scheduling for            transmission. A vast amount of research has been
IEEE 802.16 mesh networks, all packets should be                      conducted in routing and scheduling in wireless networks.
transported through the BS (Base station).The links to or             Jun wong, Weijia Jia, Liuseng Huamg et al [4] proposed an
from the BS becomes the system’s bottleneck and the
                                                                      efficient centralized scheduling algorithm for IEEE 802.16
throughput is heavily impacted by the interference. To solve
this problem, we evaluated the proposed algorithm with five
                                                                      mesh radio networks. They used TDMA concept. In a time
selection criteria of scheduling through extensive simulations        slot, those nodes will transmit which are not interfered by
and the experimental results are instrumental for improving           each others. They proposed four node selection criteria –
the performance of IEEE 802.16 based WMNs in terms of link            nearest, farthest, minimum interference and random. In our
scheduling. We compared the effect of two routing and one             paper, we mentioned this algorithm as R_A_1. According
scheduling algorithm on the scheduling length. The result             to this routing algorithm, when a new node joins to the
shows that best algorithm has improved the system                     network it will select a node of minimum node id from the
performance in the aspects of scheduling length, transmission         neighbors of that node. But through this, more time slots
range, and channel utilization ratio.
                                                                      may be needed to transmit/receive 1 packet to/from BS. To
Keywords- IEEE 802.16, Mesh Network, WiMAX, Multi-hop                 solve this problem, Hung-Yu, Samrat Ganguly and Rauf
Routing, Mesh mode.                                                   Izmailov Wei proposed maximum weighted nodeselection
                                                                      and minimum blocking metrics routing algorithm in their
                                                                      scheduling algorithm. We mentioned this routing algorithm
                     I.   INTRODUCTION                                as R_A_2 in this paper later. But, some problem remains
    The IEEE 802.16 standard, commonly known as                       still like ambiguity problem & Imperfect route selection.
WiMAX, was published to construct the last-mile wireless              We have proposed our algorithm to solve this type of
broadband access (WBA) in metropolitan area networks                  problems which is indicated as R_A_3.
and provides better performance comparable to other
traditional cable, DSL, or T1networks. In this paper, we                                  III. PROPOSED ALGORITHM
consider the problem of routing and scheduling packets                    We proposed a routing algorithm which removes the
based on centralized scheme. In WiMAX mesh centralized                problems of R_A_2. The ambiguity problem is removed by
routing and scheduling, the BS determines the routes of all           two steps. If there are more than one neighbor nodes with
SSs and also decides the transmission sequence in data                minimum blocking metrics, then select a node among them
subframes. The scheduling algorithm, along with the policy            which have minimum hops to/from BS & if there are also
of routing tree construction decides the system                       more than one node with minimum hops no from/to BS,
performance. System performance is evaluated by the                   then select the node of minimum node id among them. To
parameter scheduling length (where lower scheduling                   remove imperfect node selection problem it is needed to
length indicates higher performance). So the problem is               update all previous node’s route when a new node is
that how to reduce the scheduling length by designing                 inserted. When a new node joins in the networks, then all
efficient routing and scheduling protocol. In centralized             the nodes are arranged in a list in ascending order to their
operation we find no scope in scheduling. Therefore the               distance from BS and all nodes will be set as
problem is to develop an efficient routing algorithm for              unselected/unrouted nodes. Each node will be scanned
centralized mesh mode of operation. In our simulation we              from list and their route (i.e. parent) will be selected
consider only uplink transmission and it can be easily                according to blocking metric concept (as R_A_2). That
converted to downlink transmission. In simulation we don’t            means, the node will find the selected nodes from its
consider the condition of link failure; because our proposed          neighbors and select one of them who has minimum
algorithm is not aware of link failure. Moreover this                 blocking metric as its parent
routing algorithm is proposed only for fixed nodes. So                                R_A_3
there is scope to work on routing of centralized mesh                 1. Set BS as selected/routed node
network for mobile nodes with considering link failure.               Do step 2 to step 4 for each new node when it is inserted:

© 2010 ACEEE                                                     12
DOI: 01.IJNS.01.03.50
ACEEE Int. J. on Network Security, Vol. 01, No. 03, Dec 2010



2. Sorting all nodes in ascending order according to                           transmission range of all nodes to 7 units & minimum
distance from BS.                                                              separation between nodes 3 unit with variable node no
3. Reset all nodes as unselected/unrouted node.                                whereas in fig-2, we have varied transmission range of the
4. Scanning SSs in ascending order of distance from BS                         nodes in a particular area. From fig.1, it is clear that no. of
and find route of all SSs like below (do step ‘a’ to ‘f’ for                   scheduling length increases more for R_A_3 than R_A_1
each SS):                                                                      & R_A_2 with the increment of the no. of nodes  
   a. Find neighbors and then selected nodes from                              .
                                                                                                                            R_A_1
neighbors.
                                                                                                                            R_A_2
   b. Find the node with minimum blocking metrics from




                                                                                    Scheduling length
                                                                                                                120
                                                                                                                            R_A_3
selected nodes.
   c. Select the node with minimum hop, if there is more                                                         80
than one node in step 'b'.
   d. Select a node with minimum id, if there is more than
one node in step 'c'.                                                                                            40
                                                                                                                       40   60          80            100     120
   e. Set the node in step’d’ as parents of scanned SS.
                                                                                                                                     Nodes number
   f. Set the scanned SS as routed/selected node.
    For R_A_2, route time for n no. of node is nt, where t is                    Fig. 1. Comparison among R_A_1, R_A_2 & R_A_3 in the Fig-1: .
average route calculation time, when a new node is                             Comparison among R_A_1, R_A_2 & R_A_3 in the aspect of scheduling
inserted. But, for R_A_3, Route calculation time of i-th                                             length varying node no
node = s + i × t ≅ i × t ;
    For      n     nodes,      total       route    calculation                                                                                             R_A_1
time =(s +t) +(s +2 ) +(s +3 ) +..........(s +(n−1t) +(s +nt
                    t       t          +          )         )                                                                                               R_A_2


                                                                                            Scheduling length
                                                                                                                52.4
                                                                                                                                                            R_A_3
             n × ( n + 1)
= n×s +                   ×t .
                  2                                                                                             50.7

         Route time for n - th node (R_A_3)   n×t
     ∴                                      =     =n
         Route time for n - th node (R_A_2)    t
                                                                                                                 49

                                                         n × (n + 1)
                                                                                                                       4         8               12           16

                                                 n×s +               ×t                                                              Transmission range
         Total route time of n nodes (R_A_3)                  2
                                             =
         Total route time of n nodes (R_A_2)              n∗t                      Fig. 2. Comparison among R_A_1, R_A_2 & R_A_3 in the aspect of
                              n +1                                                            scheduling length varying transmission range
                            ≅
                               2                                                   From fig-2, it is clear that when transmission range
    Here route calculation time of n-th node using R_A_3 is                    increases then scheduling length for all routing algorithm
n times than R_A_2. So it may be seemed that, calculation                      becomes closer and for a large value of transmission range
time is a problem for R_A_3, especially when node number                       it becomes same. This is because when the transmission
(n) is very large. But interestingly notice that, total route                  range is too large then all the nodes stay in the transmission
calculation time of n nodes using R_A_3 is (n+1)/2 times                       range of BS and hence the network operates like PMP
than R_A_2. Therefore the ratio of calculation time has                        (point to multi point mode) mode. Then the scheduling
significantly decreased for total route calculation.                           length becomes equal to nodes number, because in PMP
Moreover routing algorithm does not run all times; rather it                   modes at each time slot only one node directly transmit
only runs when a new node joins or when changes occur in                       to/from BS. 
the network topology. So, more calculation time is not a
major problem.                                                                                                                   V. SUMMARY
           IV. PERFORMANCE EVALUATION                                              We proposed a collision-free centralized scheduling
                                                                               algorithm for IEEE 802.16 based WMNs. This scheduling
    Our simulation is based on centralized scheduling and                      scheme takes fairness, channel utilization and transmission
one directional transmission. The length of scheduling is                      delay into consideration. In the proposed algorithm, the
the most important performance measure of a                                    selection policy for scheduled links will impact the
scheduling/routing algorithm and it is considered in most of                   algorithm’s performance. We use the length of scheduling,
the existing literatures. From our simulation first we find                    and transmission range to evaluate the performance of the
which scheduling criterion is best. We have developed a                        proposed scheduling algorithm. Our future work will
simulation model using C programming language. Using                           mainly focus on the problem of link failure and dynamic
this model any routing or scheduling algorithm can be run                      route construction.
on a network topology and gives the output in terms of
scheduling metric, CUR, scheduling length. It gives the 
visualized output of the network. Finally we will show that
how network performance vary (using R_A_3, R_A_2 &
R_A_1) according to no. of nodes & transmission range
between nodes. In fig-1, we have considered the

© 2010 ACEEE                                                              13
DOI: 01.IJNS.01.03.50
ACEEE Int. J. on Network Security, Vol. 01, No. 03, Dec 2010



                       REFERENCES                                        in IEEE 802.16 mesh mode”, in: Proc. of the Sixth ACM
                                                                         International Symposium on Mobile Ad Hoc Networking and
[1] P. Kyasanur, N.H. Vaidya, “Routing and interface assignment          Computing (MOBIHOC 2005), May 2005, pp. 78–89.
in multi-channel multi-interface wireless networks”, in: Proc. of        [5] H. Shetiya and V. Sharma, “Algorithms for routing and
the 2005 IEEE Wireless Communications and Networking                     centralized scheduling to provide qos in ieee 802.16 mesh
Conference (WCNC 2005), March 2005, pp. 2051–2056.                       networks,” in WMuNeP’05, 2005, pp. 140–149.
[2] A. Raniwala, T.-C. Chiueh, “Architecture and algorithms for          [6] H. Wei, S. Ganguly, R. Izmailov, and Z. J. Hass,
an IEEE 802.11-based multi-channel wireless mesh network”, in:           “Interference-aware ieee 802.16 wimax mesh networks,” in
Proc. of the 24th Annual Joint Conference of the IEEE Computer           VTC’05, 2005, pp. 3102–3106.
and Communications Societies (INFOCOM 2005), March 2005,                 [7] D. Aguayo, J. Bicket, S. Biswas, G. Judd, R. Morris, “Link-
pp. 2223–2234.                                                           level measurements from an 802.11b mesh network”, in: Proc. of
[3] V. Gambiroza, B. Sadeghi, E. Knightly, “End-to-end                   the 2004 ACM Annual Conference of the Special Interest Group
performance and fairness in multihop wireless backhaul                   on Data Communication (SIGCOMM), August 2004, pp. 121–
networks”, in: Proc. of the 10th ACM Annual International                132.
Conference on Mobile Computing and Networking (MOBICOM                   [8] H. Lim, C. Lim, and J. C. Hou, “A coordinate-based
2004), Sep. 2004, pp. 287–301.                                           approach for exploiting temporal-spatial diversity in wireless
[4] M. Cao, W.C. Ma, Q. Zhang, X.D. Wang, W.W. Zhu,                      mesh networks,” in MobiCom’06, 2006, pp. 14–25.
“Modeling and performance analysis of the distributed scheduler




© 2010 ACEEE                                                        14
DOI: 01.IJNS.01.03.50

More Related Content

What's hot (20)

PDF
Use of NS-2 to Simulate MANET Routing Algorithms
Giancarlo Romeo
 
PDF
Research Inventy : International Journal of Engineering and Science
researchinventy
 
PDF
Cv31424430
IJMER
 
PDF
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
 
PDF
AODV protocol
Raj Sikarwar
 
DOCX
Networks notes
Lakshmi Sarvani Videla
 
PDF
Automatic cluster formation and assigning address for wireless sensor net
IAEME Publication
 
PDF
Physical layer network coding
Nguyen Tan
 
PPTX
Adhoc routing protocols
DharunMagil
 
PDF
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
cscpconf
 
PDF
On the Performance Analysis of Multi-antenna Relaying System over Rayleigh Fa...
IDES Editor
 
PDF
Ac24204209
IJERA Editor
 
PDF
Na2522282231
IJERA Editor
 
DOCX
Expt no.3
rahul kbp
 
PDF
Final Report(Routing_Misbehavior)
Ambreen Zafar
 
PDF
Iterative network channel decoding with cooperative space-time transmission
ijasuc
 
PDF
Enhancing Downlink Performance in Wireless Networks by Simultaneous Multiple ...
ambitlick
 
PDF
Data Communication & Computer Networks:Digital Signal Encoding
Dr Rajiv Srivastava
 
PDF
Network coding
Hạt Giống Nhập
 
Use of NS-2 to Simulate MANET Routing Algorithms
Giancarlo Romeo
 
Research Inventy : International Journal of Engineering and Science
researchinventy
 
Cv31424430
IJMER
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
 
AODV protocol
Raj Sikarwar
 
Networks notes
Lakshmi Sarvani Videla
 
Automatic cluster formation and assigning address for wireless sensor net
IAEME Publication
 
Physical layer network coding
Nguyen Tan
 
Adhoc routing protocols
DharunMagil
 
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
cscpconf
 
On the Performance Analysis of Multi-antenna Relaying System over Rayleigh Fa...
IDES Editor
 
Ac24204209
IJERA Editor
 
Na2522282231
IJERA Editor
 
Expt no.3
rahul kbp
 
Final Report(Routing_Misbehavior)
Ambreen Zafar
 
Iterative network channel decoding with cooperative space-time transmission
ijasuc
 
Enhancing Downlink Performance in Wireless Networks by Simultaneous Multiple ...
ambitlick
 
Data Communication & Computer Networks:Digital Signal Encoding
Dr Rajiv Srivastava
 
Network coding
Hạt Giống Nhập
 

Viewers also liked (19)

PDF
Automated Colorization of Grayscale Images Using Texture Descriptors
IDES Editor
 
PDF
Secure Scan Design Using Redundant Scan Register
IDES Editor
 
PDF
Modelling of Crosstalk and Delay for Distributed RLCG On-Chip Interconnects F...
IDES Editor
 
PDF
Design and Performance Evaluation of an Efficient Home Agent Reliability Prot...
IDES Editor
 
PDF
Simultaneous Generation Expansion Planning and Natural Gas Expansion Planning
IDES Editor
 
PDF
Preemptive Job Scheduling with Priorities and Starvation Avoidance CUM Throug...
IDES Editor
 
PDF
Real Time Speaker Identification System – Design, Implementation and Validation
IDES Editor
 
PDF
A Novel Approach to Digital Gate Design
IDES Editor
 
PDF
On Data Mining in Inverse Scattering Problems: Neural Networks Applied to GPR...
IDES Editor
 
PDF
Multidimensional scaling algorithm and its current applications in wireless l...
IDES Editor
 
PDF
AM-RF partially overlapped channels separation by Volterra integral equations
IDES Editor
 
PDF
A HVS based Perceptual Quality Estimation Measure for Color Images
IDES Editor
 
PDF
Interoperability of Reconfiguring System on FPGA Using a Design Entry of Hard...
IDES Editor
 
PDF
Capacity Evaluation of a High Altitude Platform Diversity System Equipped wit...
IDES Editor
 
PDF
Object Detection and tracking in Video Sequences
IDES Editor
 
PDF
Detection of suspected nodes in MANET
IDES Editor
 
PDF
Development of Switch Mode Dc Converter Using MATLAB/ dSPACE
IDES Editor
 
PDF
Enhancing Privacy of Confidential Data using K Anonymization
IDES Editor
 
PDF
Space Vector Pulse Width Modulation Schemes for Two-Level Voltage Source Inve...
IDES Editor
 
Automated Colorization of Grayscale Images Using Texture Descriptors
IDES Editor
 
Secure Scan Design Using Redundant Scan Register
IDES Editor
 
Modelling of Crosstalk and Delay for Distributed RLCG On-Chip Interconnects F...
IDES Editor
 
Design and Performance Evaluation of an Efficient Home Agent Reliability Prot...
IDES Editor
 
Simultaneous Generation Expansion Planning and Natural Gas Expansion Planning
IDES Editor
 
Preemptive Job Scheduling with Priorities and Starvation Avoidance CUM Throug...
IDES Editor
 
Real Time Speaker Identification System – Design, Implementation and Validation
IDES Editor
 
A Novel Approach to Digital Gate Design
IDES Editor
 
On Data Mining in Inverse Scattering Problems: Neural Networks Applied to GPR...
IDES Editor
 
Multidimensional scaling algorithm and its current applications in wireless l...
IDES Editor
 
AM-RF partially overlapped channels separation by Volterra integral equations
IDES Editor
 
A HVS based Perceptual Quality Estimation Measure for Color Images
IDES Editor
 
Interoperability of Reconfiguring System on FPGA Using a Design Entry of Hard...
IDES Editor
 
Capacity Evaluation of a High Altitude Platform Diversity System Equipped wit...
IDES Editor
 
Object Detection and tracking in Video Sequences
IDES Editor
 
Detection of suspected nodes in MANET
IDES Editor
 
Development of Switch Mode Dc Converter Using MATLAB/ dSPACE
IDES Editor
 
Enhancing Privacy of Confidential Data using K Anonymization
IDES Editor
 
Space Vector Pulse Width Modulation Schemes for Two-Level Voltage Source Inve...
IDES Editor
 
Ad

Similar to Performance Analysis and Development of an Efficient Routing Scheme for IEEE 802.16/WiMAX Mesh Networks (20)

PDF
Gk2411581160
IJERA Editor
 
PDF
47 50
Editor IJARCET
 
PDF
47 50
Editor IJARCET
 
PPTX
Ad hoc routing
its
 
PPT
Route1
Saeed
 
PPTX
Fault tolerant energy aware data dissemination protocol in WSN
Prajwal Panchmahalkar
 
PDF
A Survey On Secure Cooperative Bait Detection Approach For...
Jennifer Perry
 
PDF
IRJET- Survey on Adaptive Routing Algorithms
IRJET Journal
 
PPTX
Communication costs in parallel machines
Syed Zaid Irshad
 
PDF
A New Approach to Improve the Efficiency of Distributed Scheduling in IEEE 80...
IDES Editor
 
PDF
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...
Sigma web solutions pvt. ltd.
 
PDF
ALGORITHMS FOR PACKET ROUTING IN SWITCHING NETWORKS WITH RECONFIGURATION OVER...
csandit
 
PPTX
An optimization in antnet routing algorithm
Vinay Kumar
 
PPTX
Lecture 06 - Chapter 4 - Communications in Networks
National College of Business Administration & Economics ( NCBA&E)
 
PDF
Efficient load aware routing scheme
ambitlick
 
PDF
ENHANCEMENT OF TRANSMISSION RANGE ASSIGNMENT FOR CLUSTERED WIRELESS SENSOR NE...
IJCNCJournal
 
PDF
A comparative study on multicast routing using dijkstra’s, prims and ant colo...
IAEME Publication
 
PDF
A comparative study on multicast routing using dijkstra’s
iaemedu
 
PDF
10.1.1.61.7321
Hard Chester
 
PDF
10.1.1.61.7321
Hard Chester
 
Gk2411581160
IJERA Editor
 
Ad hoc routing
its
 
Route1
Saeed
 
Fault tolerant energy aware data dissemination protocol in WSN
Prajwal Panchmahalkar
 
A Survey On Secure Cooperative Bait Detection Approach For...
Jennifer Perry
 
IRJET- Survey on Adaptive Routing Algorithms
IRJET Journal
 
Communication costs in parallel machines
Syed Zaid Irshad
 
A New Approach to Improve the Efficiency of Distributed Scheduling in IEEE 80...
IDES Editor
 
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...
Sigma web solutions pvt. ltd.
 
ALGORITHMS FOR PACKET ROUTING IN SWITCHING NETWORKS WITH RECONFIGURATION OVER...
csandit
 
An optimization in antnet routing algorithm
Vinay Kumar
 
Lecture 06 - Chapter 4 - Communications in Networks
National College of Business Administration & Economics ( NCBA&E)
 
Efficient load aware routing scheme
ambitlick
 
ENHANCEMENT OF TRANSMISSION RANGE ASSIGNMENT FOR CLUSTERED WIRELESS SENSOR NE...
IJCNCJournal
 
A comparative study on multicast routing using dijkstra’s, prims and ant colo...
IAEME Publication
 
A comparative study on multicast routing using dijkstra’s
iaemedu
 
10.1.1.61.7321
Hard Chester
 
10.1.1.61.7321
Hard Chester
 
Ad

More from IDES Editor (20)

PDF
Power System State Estimation - A Review
IDES Editor
 
PDF
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
IDES Editor
 
PDF
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
IDES Editor
 
PDF
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
IDES Editor
 
PDF
Line Losses in the 14-Bus Power System Network using UPFC
IDES Editor
 
PDF
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
IDES Editor
 
PDF
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
IDES Editor
 
PDF
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
IDES Editor
 
PDF
Selfish Node Isolation & Incentivation using Progressive Thresholds
IDES Editor
 
PDF
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
IDES Editor
 
PDF
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
IDES Editor
 
PDF
Cloud Security and Data Integrity with Client Accountability Framework
IDES Editor
 
PDF
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
IDES Editor
 
PDF
Enhancing Data Storage Security in Cloud Computing Through Steganography
IDES Editor
 
PDF
Low Energy Routing for WSN’s
IDES Editor
 
PDF
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
IDES Editor
 
PDF
Rotman Lens Performance Analysis
IDES Editor
 
PDF
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
IDES Editor
 
PDF
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
IDES Editor
 
PDF
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
IDES Editor
 
Power System State Estimation - A Review
IDES Editor
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
IDES Editor
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
IDES Editor
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
IDES Editor
 
Line Losses in the 14-Bus Power System Network using UPFC
IDES Editor
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
IDES Editor
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
IDES Editor
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
IDES Editor
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
IDES Editor
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
IDES Editor
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
IDES Editor
 
Cloud Security and Data Integrity with Client Accountability Framework
IDES Editor
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
IDES Editor
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
IDES Editor
 
Low Energy Routing for WSN’s
IDES Editor
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
IDES Editor
 
Rotman Lens Performance Analysis
IDES Editor
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
IDES Editor
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
IDES Editor
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
IDES Editor
 

Recently uploaded (20)

PDF
New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
PDF
Using FME to Develop Self-Service CAD Applications for a Major UK Police Force
Safe Software
 
PDF
Log-Based Anomaly Detection: Enhancing System Reliability with Machine Learning
Mohammed BEKKOUCHE
 
PPTX
OpenID AuthZEN - Analyst Briefing July 2025
David Brossard
 
PDF
CIFDAQ Token Spotlight for 9th July 2025
CIFDAQ
 
PDF
DevBcn - Building 10x Organizations Using Modern Productivity Metrics
Justin Reock
 
PDF
Reverse Engineering of Security Products: Developing an Advanced Microsoft De...
nwbxhhcyjv
 
PPTX
WooCommerce Workshop: Bring Your Laptop
Laura Hartwig
 
PDF
Empower Inclusion Through Accessible Java Applications
Ana-Maria Mihalceanu
 
PPTX
Building Search Using OpenSearch: Limitations and Workarounds
Sease
 
PDF
Fl Studio 24.2.2 Build 4597 Crack for Windows Free Download 2025
faizk77g
 
PDF
SFWelly Summer 25 Release Highlights July 2025
Anna Loughnan Colquhoun
 
PDF
Achieving Consistent and Reliable AI Code Generation - Medusa AI
medusaaico
 
PPTX
Top iOS App Development Company in the USA for Innovative Apps
SynapseIndia
 
PDF
"AI Transformation: Directions and Challenges", Pavlo Shaternik
Fwdays
 
PDF
How Startups Are Growing Faster with App Developers in Australia.pdf
India App Developer
 
PDF
Jak MŚP w Europie Środkowo-Wschodniej odnajdują się w świecie AI
dominikamizerska1
 
PDF
SWEBOK Guide and Software Services Engineering Education
Hironori Washizaki
 
PDF
Building Real-Time Digital Twins with IBM Maximo & ArcGIS Indoors
Safe Software
 
PDF
Transcript: New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
Using FME to Develop Self-Service CAD Applications for a Major UK Police Force
Safe Software
 
Log-Based Anomaly Detection: Enhancing System Reliability with Machine Learning
Mohammed BEKKOUCHE
 
OpenID AuthZEN - Analyst Briefing July 2025
David Brossard
 
CIFDAQ Token Spotlight for 9th July 2025
CIFDAQ
 
DevBcn - Building 10x Organizations Using Modern Productivity Metrics
Justin Reock
 
Reverse Engineering of Security Products: Developing an Advanced Microsoft De...
nwbxhhcyjv
 
WooCommerce Workshop: Bring Your Laptop
Laura Hartwig
 
Empower Inclusion Through Accessible Java Applications
Ana-Maria Mihalceanu
 
Building Search Using OpenSearch: Limitations and Workarounds
Sease
 
Fl Studio 24.2.2 Build 4597 Crack for Windows Free Download 2025
faizk77g
 
SFWelly Summer 25 Release Highlights July 2025
Anna Loughnan Colquhoun
 
Achieving Consistent and Reliable AI Code Generation - Medusa AI
medusaaico
 
Top iOS App Development Company in the USA for Innovative Apps
SynapseIndia
 
"AI Transformation: Directions and Challenges", Pavlo Shaternik
Fwdays
 
How Startups Are Growing Faster with App Developers in Australia.pdf
India App Developer
 
Jak MŚP w Europie Środkowo-Wschodniej odnajdują się w świecie AI
dominikamizerska1
 
SWEBOK Guide and Software Services Engineering Education
Hironori Washizaki
 
Building Real-Time Digital Twins with IBM Maximo & ArcGIS Indoors
Safe Software
 
Transcript: New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 

Performance Analysis and Development of an Efficient Routing Scheme for IEEE 802.16/WiMAX Mesh Networks

  • 1. ACEEE Int. J. on Network Security, Vol. 01, No. 03, Dec 2010 Performance Analysis and Development of an Efficient Routing Scheme for IEEE 802.16/WiMAX Mesh Networks Rijvi Ahmed; A.H.M. Nazir Hossain; M.M. Shahriar Maswood Department of Electronics & Communication Engineering, Khulna University of Engineering & Technology Khulna- 9203, Bangladesh. [email protected], [email protected] Abstract— A collision-free centralized scheduling algorithm II. BACKGROUND for IEEE 802.16 WiMAX provides a mechanism for creations multi-hop mesh and high-quality wireless Performances of wireless mesh networks can be multimedia services which can be developed as a high speed improved by employing spatial reuse with concurrent broad band wireless network. In centralized scheduling for transmission. A vast amount of research has been IEEE 802.16 mesh networks, all packets should be conducted in routing and scheduling in wireless networks. transported through the BS (Base station).The links to or Jun wong, Weijia Jia, Liuseng Huamg et al [4] proposed an from the BS becomes the system’s bottleneck and the efficient centralized scheduling algorithm for IEEE 802.16 throughput is heavily impacted by the interference. To solve this problem, we evaluated the proposed algorithm with five mesh radio networks. They used TDMA concept. In a time selection criteria of scheduling through extensive simulations slot, those nodes will transmit which are not interfered by and the experimental results are instrumental for improving each others. They proposed four node selection criteria – the performance of IEEE 802.16 based WMNs in terms of link nearest, farthest, minimum interference and random. In our scheduling. We compared the effect of two routing and one paper, we mentioned this algorithm as R_A_1. According scheduling algorithm on the scheduling length. The result to this routing algorithm, when a new node joins to the shows that best algorithm has improved the system network it will select a node of minimum node id from the performance in the aspects of scheduling length, transmission neighbors of that node. But through this, more time slots range, and channel utilization ratio. may be needed to transmit/receive 1 packet to/from BS. To Keywords- IEEE 802.16, Mesh Network, WiMAX, Multi-hop solve this problem, Hung-Yu, Samrat Ganguly and Rauf Routing, Mesh mode. Izmailov Wei proposed maximum weighted nodeselection and minimum blocking metrics routing algorithm in their scheduling algorithm. We mentioned this routing algorithm I. INTRODUCTION as R_A_2 in this paper later. But, some problem remains The IEEE 802.16 standard, commonly known as still like ambiguity problem & Imperfect route selection. WiMAX, was published to construct the last-mile wireless We have proposed our algorithm to solve this type of broadband access (WBA) in metropolitan area networks problems which is indicated as R_A_3. and provides better performance comparable to other traditional cable, DSL, or T1networks. In this paper, we III. PROPOSED ALGORITHM consider the problem of routing and scheduling packets We proposed a routing algorithm which removes the based on centralized scheme. In WiMAX mesh centralized problems of R_A_2. The ambiguity problem is removed by routing and scheduling, the BS determines the routes of all two steps. If there are more than one neighbor nodes with SSs and also decides the transmission sequence in data minimum blocking metrics, then select a node among them subframes. The scheduling algorithm, along with the policy which have minimum hops to/from BS & if there are also of routing tree construction decides the system more than one node with minimum hops no from/to BS, performance. System performance is evaluated by the then select the node of minimum node id among them. To parameter scheduling length (where lower scheduling remove imperfect node selection problem it is needed to length indicates higher performance). So the problem is update all previous node’s route when a new node is that how to reduce the scheduling length by designing inserted. When a new node joins in the networks, then all efficient routing and scheduling protocol. In centralized the nodes are arranged in a list in ascending order to their operation we find no scope in scheduling. Therefore the distance from BS and all nodes will be set as problem is to develop an efficient routing algorithm for unselected/unrouted nodes. Each node will be scanned centralized mesh mode of operation. In our simulation we from list and their route (i.e. parent) will be selected consider only uplink transmission and it can be easily according to blocking metric concept (as R_A_2). That converted to downlink transmission. In simulation we don’t means, the node will find the selected nodes from its consider the condition of link failure; because our proposed neighbors and select one of them who has minimum algorithm is not aware of link failure. Moreover this blocking metric as its parent routing algorithm is proposed only for fixed nodes. So R_A_3 there is scope to work on routing of centralized mesh 1. Set BS as selected/routed node network for mobile nodes with considering link failure. Do step 2 to step 4 for each new node when it is inserted: © 2010 ACEEE 12 DOI: 01.IJNS.01.03.50
  • 2. ACEEE Int. J. on Network Security, Vol. 01, No. 03, Dec 2010 2. Sorting all nodes in ascending order according to transmission range of all nodes to 7 units & minimum distance from BS. separation between nodes 3 unit with variable node no 3. Reset all nodes as unselected/unrouted node. whereas in fig-2, we have varied transmission range of the 4. Scanning SSs in ascending order of distance from BS nodes in a particular area. From fig.1, it is clear that no. of and find route of all SSs like below (do step ‘a’ to ‘f’ for scheduling length increases more for R_A_3 than R_A_1 each SS): & R_A_2 with the increment of the no. of nodes   a. Find neighbors and then selected nodes from . R_A_1 neighbors. R_A_2 b. Find the node with minimum blocking metrics from Scheduling length 120 R_A_3 selected nodes. c. Select the node with minimum hop, if there is more 80 than one node in step 'b'. d. Select a node with minimum id, if there is more than one node in step 'c'. 40 40 60 80 100 120 e. Set the node in step’d’ as parents of scanned SS. Nodes number f. Set the scanned SS as routed/selected node. For R_A_2, route time for n no. of node is nt, where t is Fig. 1. Comparison among R_A_1, R_A_2 & R_A_3 in the Fig-1: . average route calculation time, when a new node is Comparison among R_A_1, R_A_2 & R_A_3 in the aspect of scheduling inserted. But, for R_A_3, Route calculation time of i-th length varying node no node = s + i × t ≅ i × t ; For n nodes, total route calculation R_A_1 time =(s +t) +(s +2 ) +(s +3 ) +..........(s +(n−1t) +(s +nt t t + ) ) R_A_2 Scheduling length 52.4 R_A_3 n × ( n + 1) = n×s + ×t . 2 50.7 Route time for n - th node (R_A_3) n×t ∴ = =n Route time for n - th node (R_A_2) t 49 n × (n + 1) 4 8 12 16 n×s + ×t Transmission range Total route time of n nodes (R_A_3) 2 = Total route time of n nodes (R_A_2) n∗t Fig. 2. Comparison among R_A_1, R_A_2 & R_A_3 in the aspect of n +1 scheduling length varying transmission range ≅ 2 From fig-2, it is clear that when transmission range Here route calculation time of n-th node using R_A_3 is increases then scheduling length for all routing algorithm n times than R_A_2. So it may be seemed that, calculation becomes closer and for a large value of transmission range time is a problem for R_A_3, especially when node number it becomes same. This is because when the transmission (n) is very large. But interestingly notice that, total route range is too large then all the nodes stay in the transmission calculation time of n nodes using R_A_3 is (n+1)/2 times range of BS and hence the network operates like PMP than R_A_2. Therefore the ratio of calculation time has (point to multi point mode) mode. Then the scheduling significantly decreased for total route calculation. length becomes equal to nodes number, because in PMP Moreover routing algorithm does not run all times; rather it modes at each time slot only one node directly transmit only runs when a new node joins or when changes occur in to/from BS.  the network topology. So, more calculation time is not a major problem. V. SUMMARY IV. PERFORMANCE EVALUATION We proposed a collision-free centralized scheduling algorithm for IEEE 802.16 based WMNs. This scheduling Our simulation is based on centralized scheduling and scheme takes fairness, channel utilization and transmission one directional transmission. The length of scheduling is delay into consideration. In the proposed algorithm, the the most important performance measure of a selection policy for scheduled links will impact the scheduling/routing algorithm and it is considered in most of algorithm’s performance. We use the length of scheduling, the existing literatures. From our simulation first we find and transmission range to evaluate the performance of the which scheduling criterion is best. We have developed a proposed scheduling algorithm. Our future work will simulation model using C programming language. Using mainly focus on the problem of link failure and dynamic this model any routing or scheduling algorithm can be run route construction. on a network topology and gives the output in terms of scheduling metric, CUR, scheduling length. It gives the  visualized output of the network. Finally we will show that how network performance vary (using R_A_3, R_A_2 & R_A_1) according to no. of nodes & transmission range between nodes. In fig-1, we have considered the © 2010 ACEEE 13 DOI: 01.IJNS.01.03.50
  • 3. ACEEE Int. J. on Network Security, Vol. 01, No. 03, Dec 2010 REFERENCES in IEEE 802.16 mesh mode”, in: Proc. of the Sixth ACM International Symposium on Mobile Ad Hoc Networking and [1] P. Kyasanur, N.H. Vaidya, “Routing and interface assignment Computing (MOBIHOC 2005), May 2005, pp. 78–89. in multi-channel multi-interface wireless networks”, in: Proc. of [5] H. Shetiya and V. Sharma, “Algorithms for routing and the 2005 IEEE Wireless Communications and Networking centralized scheduling to provide qos in ieee 802.16 mesh Conference (WCNC 2005), March 2005, pp. 2051–2056. networks,” in WMuNeP’05, 2005, pp. 140–149. [2] A. Raniwala, T.-C. Chiueh, “Architecture and algorithms for [6] H. Wei, S. Ganguly, R. Izmailov, and Z. J. Hass, an IEEE 802.11-based multi-channel wireless mesh network”, in: “Interference-aware ieee 802.16 wimax mesh networks,” in Proc. of the 24th Annual Joint Conference of the IEEE Computer VTC’05, 2005, pp. 3102–3106. and Communications Societies (INFOCOM 2005), March 2005, [7] D. Aguayo, J. Bicket, S. Biswas, G. Judd, R. Morris, “Link- pp. 2223–2234. level measurements from an 802.11b mesh network”, in: Proc. of [3] V. Gambiroza, B. Sadeghi, E. Knightly, “End-to-end the 2004 ACM Annual Conference of the Special Interest Group performance and fairness in multihop wireless backhaul on Data Communication (SIGCOMM), August 2004, pp. 121– networks”, in: Proc. of the 10th ACM Annual International 132. Conference on Mobile Computing and Networking (MOBICOM [8] H. Lim, C. Lim, and J. C. Hou, “A coordinate-based 2004), Sep. 2004, pp. 287–301. approach for exploiting temporal-spatial diversity in wireless [4] M. Cao, W.C. Ma, Q. Zhang, X.D. Wang, W.W. Zhu, mesh networks,” in MobiCom’06, 2006, pp. 14–25. “Modeling and performance analysis of the distributed scheduler © 2010 ACEEE 14 DOI: 01.IJNS.01.03.50