SlideShare a Scribd company logo
1 of 4
Download to read offline
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 554
OPTIMAL SCHEDULING ALGORITHM FOR THROUGHPUT
MAXIMIZATION IN MULTIHOP WIRELESS NETWORKS
S. Daisy Rani1
, B.Sivasankar2
1
PG Scholar, Department of Computer Science and Engineering, Anna University, Sardar Raja College of Engineering,
Tirunelveli, Tamil Nadu, India
2
Assistant Professor, Department of Computer Science and Engineering, Anna University, Sardar Raja College of
Engineering, Tirunelveli, Tamil Nadu, India
Abstract
In this paper, focus on designing a scheduling scheme for achieve maximum throughput. Although, it does not require per-flow or per-
destination information and also, this paper consider the problem of link scheduling in Multihop Wireless Networks under general
interference constraints. The main goal is to achieve maximum throughput and better delay performance at low complexity.
Previously, we use Max Weight Scheduling Algorithm (Per-Hop Queue and Per-Link Queue Scheduling) for Throughput
maximization. These algorithms does not require per-flow information but it need local hop count information and use simple data
Queue for each link in the network. Some time occurring buffer overflow (that is data queue overflow) because each link maintain
simple data Queue. Our proposed scheme overcomes this problem and produces better delay performance and throughput at low
complexity. Our proposed scheme combines MaxWeightScheduling and Greedy Algorithm, which reduce buffer overflow and achieve
maximum throughput at low complexity. The performance of the proposed scheme is analyzed by various setting NS2 simulation.
Prove that proposed scheme is optimal one and produce efficient throughput at low complexity.
Keywords: Max Weight Scheduling, Throughput, Scheduling, Per-Hop Queue Scheduling, Per-Link Queue Scheduling,
Greedy Algorithm, hop count information, buffer overflow, without per-flow information.
-----------------------------------------------------------------------***----------------------------------------------------------------------
1. INTRODUCTION
Link Scheduling is the major problem in Multihop Wireless
Networks. In existing system use MaxWeight Scheduler for
maximizing throughput without per-flow or per-destination
information. The MaxWeight Scheduler includes queue based
algorithms as follows, one is per-Hop Queue based
MaxWeight Scheduler, another one is per-Link Queue based
MaxWeight Scheduler. These algorithms do not require any
per-flow information and do not exchange queue length
information among neighboring nodes[1]. These algorithms
maintain simple queue structure in every node. The major
drawback is buffer over flow. To solve this problem using
Greedy algorithm.
The remainder of the paper is organized as follows. In Section
2, we present a detailed description of our system model. In
Section 3, we prove throughput optimality of HQ-MWS. We
show throughput optimality of PLQ-MWS and FLQ-MWS in
Section 4. We show that better Throughput of Greedy
techniques in Section 5. In Section 6, we combine Max
Weight Scheduling and Greedy Techniques. Furthermore, we
evaluate different scheduling schemes through simulations in
Section 7. Finally, we conclude our paper in Section 8.
2. SYSTEM MODEL
We consider a multihop wireless network described by a
directed graph G=(V,E), where V denotes the set of nodes and
E denotes the set of links. Nodes are wireless
transmitters/receivers, and links are wireless channels between
two nodes if they can directly communicate with each other.
Let b(l) and e(l) denote the transmitting node and receiving
node of link l = (b(l),e(l)) ε E , respectively. Note that we
distinguish links (i,j) and (j,i). We assume a time-slotted
system with a single frequency channel. Let cl denote the link
capacity of link l , i.e., link l can transmit at most cl packets
during a time-slot if none of the links that interfere with l is
transmitting at the same time. We assume unit capacity links,
i.e.cl =1 for all l ε E. A flow is a stream of packets from a
source node to a destination node. Packets are injected at the
source and traverse multiple links to the destination via
multihop communications. Let S denote the set of flows in the
network.
3. SCHEDULING WITH PER-HOP QUEUES
In this scheduling, first discover routes between source and
destination nodes. Then, to determine the hop count values
for every routes. After that, select the small hop count value
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 555
path for transmitting data packets to their corresponding
destination. Data packets are reach destination successfully.
From the Fig 1, Per-Hop Queue Scheduling first discovers the
route between source to destination and also determines the
length of the queue. Higher Priority to small queue length link
and forward the data packets to corresponding destination
through that link.
Fig -1: Procedure for Scheduling with Per-Hop Queues
4. SCHEDULING WITH PER-LINK QUEUES
4.1 LQ-MWS with Priority Discipline
In this section we discuss about per-Link queue scheduling
with priority discipline. This algorithm working based on the
hop count value that is, number of hop present in between
source node to destination node. It gives higher priority to less
hop count value path.
Fig -2: Procedure for LQ-MWS With Priority Discipline
From the Fig 2, Per-Link Queue Scheduling with Priority
discipline first discovers the routes between source to
destination and also determine the hop count value that is,
number of hop between source to destination. Path selection is
based on hop count information. Forward the data packets to
corresponding destination.
4.2 LQ-MWS with FIFO Discipline:
In this section we discuss about per-Link queue scheduling
with FIFO discipline. This algorithm does not requires hop
count information that is, number of hop present in between
source node to destination node and per-flow information.
Fig -3: Procedure for LQ-MWS With FIFO Discipline
From the Fig 3, Per-Link Queue Scheduling with FIFO
discipline first discovers the route between source to
destination. Forward the data packets to corresponding
destination through activate link.
5. GREEDY TECHNIQUE
In this section we discuss about Greedy Technique. In Greedy
manner, the current node always forwards a data packet to its
neighbour nodes that is closest to the destination node. The
other name of Greedy Maximal Scheduling (GMS) is Longest-
Queue-First (LQF) Scheduling. It is another natural low-
complexity alternative to MWS which has been observed to
achieve very good throughput and delay performance in a
variety of wireless network. It satisfies the local-pooling
condition for achieve.
Fig -4: Procedure for Greedy Technique
Achieve Throughput
Forwarding Packets
Local Pooling
condition
Route discovery
Achieve Throughput
Forwarding Packets
Queue length determination
Route discovery
Achieve Throughput
Forwarding Packets
Path selection
Route discovery and
determine hop count value
Achieve Throughput
Forwarding Packets
Route discovery
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 556
From the Fig 4, Greedy Technique first discovers the route
between source to destination. To generate Local pooling
condition and satisfied it. Forward the data packets to
corresponding destination through that link.
6. COMBINED SCHEDULING SCHEMES
In this Section, we discuss about combined scheduling scheme
that is, Per-Hop Queue and Per-Link Queue scheduling
combined with Greedy algorithm. In these Queue based
Scheduling schemes has buffer overflow performance and
high complexity. So, to combine greedy techniques with these
Queue based Scheduling we achieve small buffer overflow
performance and more throughput at low complexity.
This combined scheduling scheme has the following
advantages. They are,
 Small buffer overflow
 Does not requires per-flow information
 Reduce complexity
 Better delay performance
 And maximum throughput
From the Fig 5, Combined scheduling schemes first discovers
the route between source to destination. To determines the
length of the queue and shortest path between source to
destination. Forward the data packets to corresponding
destination through that shortest path i.e optimum path.
Fig -5: Procedure for Combined Scheduling scheme
7 SIMULATION RESULT
To shows Fig 6: Grid network topology with 16 nodes. Each
and every node adjacent to their neighboring node. In this
simulation, source and destination nodes are fixed one. To
apply various scheduling scheme for analysis their throughput
performance. Applying Per-Hop Queue, Per-Link Queue
scheduling, Greedy Algorithm and Combined scheduling i.e.
Queue based Scheduling with Greedy algorithm.
Fig -6: Grid Network Topology
For example, the node 9 has the following adjacent
neighboring nodes. they are node 5, node 8, node 10, node13.
Fig -7: Graph Analysis for Various Scheduling schemes
All the scheduling schemes are analyzed by this graph (Fig-7).
In this graph, X-axis represents the Time and Y-axis
represents the delivered data Packets. The blue color curve
represents the Per-Hop Queue Scheduling scheme
performance. The red color curve represents the Per-Link
Queue scheduling schemes. The Greedy Algorithm is
represented by green color. Finally, violet color indicates the
combine scheduling scheme.
From the graph analysis, the combined scheduling scheme has
more throughputs compared to all algorithms. The combined
scheduling achieves more throughput and good delay
performance at low complexity.
0
100
200
300
400
500
600
700
10 20 30 40 50 60
Per-hop
Per-Link
Greedy
combined
Time
Packets
0
4
8
12
1
5
13
3
3
9
2
6
10
0
0
014
7
15
11
3
Achieve Throughput
Forwarding Packets
Shortest Path
Route discovery
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 557
8. CONCLUSIONS
In this paper developed combined scheduling policies per-
hop/per-link queue with Greedy algorithm. This combine
scheduling algorithm achieve maximum throughput without
per-flow information and good delay performance at low
complexity. It reduce buffer overflow that is queue overflow
for improve throughput efficiency. This greedy algorithm
satisfies the local pooling condition for improve the
throughput. Further, to generate sufficient local pooling
condition for achieve 100% throughput.
REFERENCES
[1]. B. Ji, C. Joo, and N. B. Shroff, “Throughput-optimal
scheduling in multi-hop wireless networks without per-flow
information,”IEEE/ACM Transactions On Networking, Vol.
21, No. 2, pp.634-647APRIL 2013.
[2]. Arun Sridharan, C. Emre Koksal, and Elif Uysal-
Biyikoglu,” A Greedy Link Scheduler for Wireless Networks
with Gaussian Multiple Access and Broadcast
Channels”conference paper
[3]. Bo Ji, Gagan R. Gupta, Xiaojun Lin, and Ness B. Shroff,”
Performance of Low-Complexity Greedy Scheduling Policies
in Multi-Channel Wireless Networks: Optimal Throughput
and Near-Optimal Delay” conference paper 2013.
[4]. J. Ni, B. Tan, and R. Srikant, “Q-CSMA: Queue-length
based CSMA/CA algorithms for achieving maximum
throughput and low delay in wireless networks,” 2009
[Online]. Available: http://arxiv.org/PS_cache/arxiv
/pdf/0901/0901.2333v4.pdf
[5]. G. Sharma, R. R. Mazumdar, and N. B. Shroff, “On the
complexity of scheduling in wireless networks,” in Proc.
MobiCom, 2006, pp. 227–238.
[6]. L. Bui, R. Srikant, and A. Stolyar, “A novel architecture
for reduction of delay and queueing structure complexity in
the back-pressure algorithm,”IEEE/ACM Trans. Netw., vol.
19, no. 6, pp. 1597–1609, Dec. 2011.
[7]. S. Liu, E. Ekici, and L. Ying, “Scheduling in multihop
wireless networks without back-pressure,” in Proc. Allerton,
2010, pp. 686–690.
[8]. M. Bramson, “Stability of queueing networks,” Probab.
Surveys, vol. 5, no. 1, pp. 169–345, 2008.
[9]. B. Ji, C. Joo, and N. B. Shroff, “Throughput-optimal
scheduling in multi-hop wireless networks without per-flow
information,” 2012 [Online]. Available:
http://arxiv.org/abs/1101.4211
[10]. A. Rybko and A. Stolyar, “Ergodicity of stochastic
processes describing the operation of open queueing
networks,” Problems Inf. Transmission, vol. 28, pp. 199–220,
1992.
[11]. S. Lu and P. Kumar, “Distributedscheduling based on
due dates and buffer priorities,” IEEE Trans. Autom. Control,
vol. 36, no. 12, pp. 1406–1416, Dec. 1991.
[12]. H. Chen and H. Zhang, “Stability of multiclass queueing
networks under priority service disciplines,” Oper. Res., vol.
48, no. 1, pp. 26–37, 2000.
[13]. H. Chen and H. Ye, “Piecewise linear Lyapunov function
for the stability of multiclass priority fluid networks,” IEEE
Trans. Autom. Control, vol. 47, no. 4, pp. 564–575, Apr. 2002.
[14]. H. Chen and D. Yao, “Stable priority disciplines for
multiclass networks,” in Stochastic Networks: Stability and
Rare Events, P. Glasserman, K. Sigman, and D. Yao, Eds.
New York: Springer-Verlag, 1996, ch. 2, pp. 27–39.
[15]. Changhee Joo and Ness B. Shroff, “Local Greedy
Approximation for Scheduling in Multihop Wireless
Networks” IEEE Transactions On Mobile Computing, Vol.
11, No. 3, MARCH 2012,pp 414-426.
[16]. Antonis Dimakis And Jean Walrand, “Sufficient
Conditions For Stability Of Longest Queue First Scheduling:
Second Order Properties Using Fluid Limits”, Applied
Probability Trust (29 May 2005).
BIOGRAPHIES
Ms. S. Daisy Rani, received her B.E degree
in Computer Science and Engineering from
Anna University, Chennai. She is currently
doing ME-Computer and Communication at
Anna university, Chennai. She has done her
project in Multihop Wireless Networks for
Analyzing Delay Performance. Her area of interest is
Multihop Wireless Networks.
Mr. B. Sivasankar received his B.E. in
Computer Science and Engineering from
Madurai Kamaraj university, Madurai and
M.Tech in Computer and Information
Technology from MS university,
Tirunelveli. His research interest includes
Wireless Networks and Software Engineering.

More Related Content

What's hot

MuMHR: Multi-path, Multi-hop Hierarchical Routing
MuMHR: Multi-path, Multi-hop Hierarchical RoutingMuMHR: Multi-path, Multi-hop Hierarchical Routing
MuMHR: Multi-path, Multi-hop Hierarchical Routing
M H
 

What's hot (20)

Modeling and Performance Evaluation TAODV Routing Protocol Using Stochastic P...
Modeling and Performance Evaluation TAODV Routing Protocol Using Stochastic P...Modeling and Performance Evaluation TAODV Routing Protocol Using Stochastic P...
Modeling and Performance Evaluation TAODV Routing Protocol Using Stochastic P...
 
Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...
Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...
Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...
 
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKSLOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
 
cost effective resource allocation of overlay routing relay nodes
cost effective resource allocation of overlay routing relay nodescost effective resource allocation of overlay routing relay nodes
cost effective resource allocation of overlay routing relay nodes
 
Optimizing IP Networks for Uncertain Demands Using Outbound Traffic Constraints
Optimizing IP Networks for Uncertain Demands Using Outbound Traffic ConstraintsOptimizing IP Networks for Uncertain Demands Using Outbound Traffic Constraints
Optimizing IP Networks for Uncertain Demands Using Outbound Traffic Constraints
 
Fuzzy-controlled Scheduling of Real Time Data Packets (FSRP) in Mobile Ad Hoc...
Fuzzy-controlled Scheduling of Real Time Data Packets (FSRP) in Mobile Ad Hoc...Fuzzy-controlled Scheduling of Real Time Data Packets (FSRP) in Mobile Ad Hoc...
Fuzzy-controlled Scheduling of Real Time Data Packets (FSRP) in Mobile Ad Hoc...
 
Stochastic analysis of random ad hoc networks with maximum entropy deployments
Stochastic analysis of random ad hoc networks with maximum entropy deploymentsStochastic analysis of random ad hoc networks with maximum entropy deployments
Stochastic analysis of random ad hoc networks with maximum entropy deployments
 
Bn36386389
Bn36386389Bn36386389
Bn36386389
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Analysis of data transmission in wireless lan for 802.11 e2 et
Analysis of data transmission in wireless lan for 802.11 e2 etAnalysis of data transmission in wireless lan for 802.11 e2 et
Analysis of data transmission in wireless lan for 802.11 e2 et
 
Analysis of data transmission in wireless lan for 802.11
Analysis of data transmission in wireless lan for 802.11Analysis of data transmission in wireless lan for 802.11
Analysis of data transmission in wireless lan for 802.11
 
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
 
Flbra fuzzy logic based routing algorithm for indoor wireless sensor networks
Flbra fuzzy logic based routing algorithm for indoor wireless sensor networksFlbra fuzzy logic based routing algorithm for indoor wireless sensor networks
Flbra fuzzy logic based routing algorithm for indoor wireless sensor networks
 
MuMHR: Multi-path, Multi-hop Hierarchical Routing
MuMHR: Multi-path, Multi-hop Hierarchical RoutingMuMHR: Multi-path, Multi-hop Hierarchical Routing
MuMHR: Multi-path, Multi-hop Hierarchical Routing
 
A New Efficient Cache Replacement Strategy for Named Data Networking
A New Efficient Cache Replacement Strategy for Named Data NetworkingA New Efficient Cache Replacement Strategy for Named Data Networking
A New Efficient Cache Replacement Strategy for Named Data Networking
 
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETSAN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
 
Paper id 42201621
Paper id 42201621Paper id 42201621
Paper id 42201621
 
Simulation of Route Optimization with load balancing Using AntNet System
Simulation of Route Optimization with load balancing Using AntNet SystemSimulation of Route Optimization with load balancing Using AntNet System
Simulation of Route Optimization with load balancing Using AntNet System
 
An optimistic sector oriented approach to mitigate broadcast storm problem in...
An optimistic sector oriented approach to mitigate broadcast storm problem in...An optimistic sector oriented approach to mitigate broadcast storm problem in...
An optimistic sector oriented approach to mitigate broadcast storm problem in...
 
Consistent Data Release in MANET Using Light Weight Verification Algorithm wi...
Consistent Data Release in MANET Using Light Weight Verification Algorithm wi...Consistent Data Release in MANET Using Light Weight Verification Algorithm wi...
Consistent Data Release in MANET Using Light Weight Verification Algorithm wi...
 

Viewers also liked

Business environment is affect the business activi
Business environment is affect the business activiBusiness environment is affect the business activi
Business environment is affect the business activi
kirushna kumar
 

Viewers also liked (17)

Designing and installation of low cost optimized wind monitoring system
Designing and installation of low cost optimized wind monitoring systemDesigning and installation of low cost optimized wind monitoring system
Designing and installation of low cost optimized wind monitoring system
 
Performance aiding of motorcycles using hybrid technology
Performance aiding of motorcycles using hybrid technologyPerformance aiding of motorcycles using hybrid technology
Performance aiding of motorcycles using hybrid technology
 
Chương 5
Chương 5Chương 5
Chương 5
 
zarflar
zarflarzarflar
zarflar
 
The University of Faisalabad Prospectus 2014
The University of Faisalabad Prospectus 2014The University of Faisalabad Prospectus 2014
The University of Faisalabad Prospectus 2014
 
8003154730 faq
8003154730 faq8003154730 faq
8003154730 faq
 
Glossary
GlossaryGlossary
Glossary
 
Fatih Kalaycı
Fatih KalaycıFatih Kalaycı
Fatih Kalaycı
 
Citizen journalism_by_Sumit Banik
Citizen journalism_by_Sumit BanikCitizen journalism_by_Sumit Banik
Citizen journalism_by_Sumit Banik
 
present perfect orf "is/are"
present perfect orf "is/are"present perfect orf "is/are"
present perfect orf "is/are"
 
Sofware libre guardar melll
Sofware libre guardar melllSofware libre guardar melll
Sofware libre guardar melll
 
Tech CJM
Tech CJMTech CJM
Tech CJM
 
A comprehensive study of major techniques of multi level frequent pattern min...
A comprehensive study of major techniques of multi level frequent pattern min...A comprehensive study of major techniques of multi level frequent pattern min...
A comprehensive study of major techniques of multi level frequent pattern min...
 
Business environment is affect the business activi
Business environment is affect the business activiBusiness environment is affect the business activi
Business environment is affect the business activi
 
Angels in america
Angels in americaAngels in america
Angels in america
 
Art bank presentation-cards_cross
Art bank presentation-cards_crossArt bank presentation-cards_cross
Art bank presentation-cards_cross
 
Nhìn ra thế giới để tìm kiếm cơ hội làm giàu cho người việt nam
Nhìn ra thế giới để tìm kiếm cơ hội làm giàu cho người việt namNhìn ra thế giới để tìm kiếm cơ hội làm giàu cho người việt nam
Nhìn ra thế giới để tìm kiếm cơ hội làm giàu cho người việt nam
 

Similar to Optimal scheduling algorithm for throughput maximization in multihop wireless networks

An Adaptive Routing Algorithm for Communication Networks using Back Pressure...
An Adaptive Routing Algorithm for Communication Networks  using Back Pressure...An Adaptive Routing Algorithm for Communication Networks  using Back Pressure...
An Adaptive Routing Algorithm for Communication Networks using Back Pressure...
IJMER
 
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)
graphhoc
 
A novel routing technique for mobile ad hoc networks (manet)
A novel routing technique for mobile ad hoc networks (manet)A novel routing technique for mobile ad hoc networks (manet)
A novel routing technique for mobile ad hoc networks (manet)
ijngnjournal
 

Similar to Optimal scheduling algorithm for throughput maximization in multihop wireless networks (20)

“Optimizing the data transmission between multiple nodes during link failure ...
“Optimizing the data transmission between multiple nodes during link failure ...“Optimizing the data transmission between multiple nodes during link failure ...
“Optimizing the data transmission between multiple nodes during link failure ...
 
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
 
Concept of node usage probability from complex networks and its applications ...
Concept of node usage probability from complex networks and its applications ...Concept of node usage probability from complex networks and its applications ...
Concept of node usage probability from complex networks and its applications ...
 
Discovering adaptive wireless sensor network using
Discovering adaptive wireless sensor network using Discovering adaptive wireless sensor network using
Discovering adaptive wireless sensor network using
 
Discovering adaptive wireless sensor network using β synchronizer
Discovering adaptive wireless sensor network using β synchronizerDiscovering adaptive wireless sensor network using β synchronizer
Discovering adaptive wireless sensor network using β synchronizer
 
A comparative study in wireless sensor networks
A comparative study in wireless sensor networksA comparative study in wireless sensor networks
A comparative study in wireless sensor networks
 
Ijtra130510
Ijtra130510Ijtra130510
Ijtra130510
 
Review on Clustering and Data Aggregation in Wireless Sensor Network
Review on Clustering and Data Aggregation in Wireless Sensor NetworkReview on Clustering and Data Aggregation in Wireless Sensor Network
Review on Clustering and Data Aggregation in Wireless Sensor Network
 
An Adaptive Routing Algorithm for Communication Networks using Back Pressure...
An Adaptive Routing Algorithm for Communication Networks  using Back Pressure...An Adaptive Routing Algorithm for Communication Networks  using Back Pressure...
An Adaptive Routing Algorithm for Communication Networks using Back Pressure...
 
Hierarchical Routing Protocols in Wireless Sensor Networks: A Survey and its ...
Hierarchical Routing Protocols in Wireless Sensor Networks: A Survey and its ...Hierarchical Routing Protocols in Wireless Sensor Networks: A Survey and its ...
Hierarchical Routing Protocols in Wireless Sensor Networks: A Survey and its ...
 
A scalable and power efficient solution for routing in mobile ad hoc network ...
A scalable and power efficient solution for routing in mobile ad hoc network ...A scalable and power efficient solution for routing in mobile ad hoc network ...
A scalable and power efficient solution for routing in mobile ad hoc network ...
 
Comparison of energy efficient data transmission approaches for flat wireless...
Comparison of energy efficient data transmission approaches for flat wireless...Comparison of energy efficient data transmission approaches for flat wireless...
Comparison of energy efficient data transmission approaches for flat wireless...
 
COMPARISON OF ENERGY EFFICIENT DATA RANSMISSION APPROACHES FOR FLAT WIRELESS ...
COMPARISON OF ENERGY EFFICIENT DATA RANSMISSION APPROACHES FOR FLAT WIRELESS ...COMPARISON OF ENERGY EFFICIENT DATA RANSMISSION APPROACHES FOR FLAT WIRELESS ...
COMPARISON OF ENERGY EFFICIENT DATA RANSMISSION APPROACHES FOR FLAT WIRELESS ...
 
Opportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetOpportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in Manet
 
Tree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETsTree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETs
 
Energy Efficient PEGASIS Routing Protocol in Wireless Sensor Network
Energy Efficient PEGASIS Routing Protocol in Wireless Sensor NetworkEnergy Efficient PEGASIS Routing Protocol in Wireless Sensor Network
Energy Efficient PEGASIS Routing Protocol in Wireless Sensor Network
 
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)
 
A novel routing technique for mobile ad hoc networks (manet)
A novel routing technique for mobile ad hoc networks (manet)A novel routing technique for mobile ad hoc networks (manet)
A novel routing technique for mobile ad hoc networks (manet)
 
Aa35152156
Aa35152156Aa35152156
Aa35152156
 
Aa35152156
Aa35152156Aa35152156
Aa35152156
 

More from eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
eSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
eSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
eSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
eSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
eSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
eSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
eSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
eSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
eSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
eSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
eSAT Publishing House
 

More from eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 

Recently uploaded

VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
amitlee9823
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 

Recently uploaded (20)

Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfUnit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdf
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 

Optimal scheduling algorithm for throughput maximization in multihop wireless networks

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 554 OPTIMAL SCHEDULING ALGORITHM FOR THROUGHPUT MAXIMIZATION IN MULTIHOP WIRELESS NETWORKS S. Daisy Rani1 , B.Sivasankar2 1 PG Scholar, Department of Computer Science and Engineering, Anna University, Sardar Raja College of Engineering, Tirunelveli, Tamil Nadu, India 2 Assistant Professor, Department of Computer Science and Engineering, Anna University, Sardar Raja College of Engineering, Tirunelveli, Tamil Nadu, India Abstract In this paper, focus on designing a scheduling scheme for achieve maximum throughput. Although, it does not require per-flow or per- destination information and also, this paper consider the problem of link scheduling in Multihop Wireless Networks under general interference constraints. The main goal is to achieve maximum throughput and better delay performance at low complexity. Previously, we use Max Weight Scheduling Algorithm (Per-Hop Queue and Per-Link Queue Scheduling) for Throughput maximization. These algorithms does not require per-flow information but it need local hop count information and use simple data Queue for each link in the network. Some time occurring buffer overflow (that is data queue overflow) because each link maintain simple data Queue. Our proposed scheme overcomes this problem and produces better delay performance and throughput at low complexity. Our proposed scheme combines MaxWeightScheduling and Greedy Algorithm, which reduce buffer overflow and achieve maximum throughput at low complexity. The performance of the proposed scheme is analyzed by various setting NS2 simulation. Prove that proposed scheme is optimal one and produce efficient throughput at low complexity. Keywords: Max Weight Scheduling, Throughput, Scheduling, Per-Hop Queue Scheduling, Per-Link Queue Scheduling, Greedy Algorithm, hop count information, buffer overflow, without per-flow information. -----------------------------------------------------------------------***---------------------------------------------------------------------- 1. INTRODUCTION Link Scheduling is the major problem in Multihop Wireless Networks. In existing system use MaxWeight Scheduler for maximizing throughput without per-flow or per-destination information. The MaxWeight Scheduler includes queue based algorithms as follows, one is per-Hop Queue based MaxWeight Scheduler, another one is per-Link Queue based MaxWeight Scheduler. These algorithms do not require any per-flow information and do not exchange queue length information among neighboring nodes[1]. These algorithms maintain simple queue structure in every node. The major drawback is buffer over flow. To solve this problem using Greedy algorithm. The remainder of the paper is organized as follows. In Section 2, we present a detailed description of our system model. In Section 3, we prove throughput optimality of HQ-MWS. We show throughput optimality of PLQ-MWS and FLQ-MWS in Section 4. We show that better Throughput of Greedy techniques in Section 5. In Section 6, we combine Max Weight Scheduling and Greedy Techniques. Furthermore, we evaluate different scheduling schemes through simulations in Section 7. Finally, we conclude our paper in Section 8. 2. SYSTEM MODEL We consider a multihop wireless network described by a directed graph G=(V,E), where V denotes the set of nodes and E denotes the set of links. Nodes are wireless transmitters/receivers, and links are wireless channels between two nodes if they can directly communicate with each other. Let b(l) and e(l) denote the transmitting node and receiving node of link l = (b(l),e(l)) ε E , respectively. Note that we distinguish links (i,j) and (j,i). We assume a time-slotted system with a single frequency channel. Let cl denote the link capacity of link l , i.e., link l can transmit at most cl packets during a time-slot if none of the links that interfere with l is transmitting at the same time. We assume unit capacity links, i.e.cl =1 for all l ε E. A flow is a stream of packets from a source node to a destination node. Packets are injected at the source and traverse multiple links to the destination via multihop communications. Let S denote the set of flows in the network. 3. SCHEDULING WITH PER-HOP QUEUES In this scheduling, first discover routes between source and destination nodes. Then, to determine the hop count values for every routes. After that, select the small hop count value
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 555 path for transmitting data packets to their corresponding destination. Data packets are reach destination successfully. From the Fig 1, Per-Hop Queue Scheduling first discovers the route between source to destination and also determines the length of the queue. Higher Priority to small queue length link and forward the data packets to corresponding destination through that link. Fig -1: Procedure for Scheduling with Per-Hop Queues 4. SCHEDULING WITH PER-LINK QUEUES 4.1 LQ-MWS with Priority Discipline In this section we discuss about per-Link queue scheduling with priority discipline. This algorithm working based on the hop count value that is, number of hop present in between source node to destination node. It gives higher priority to less hop count value path. Fig -2: Procedure for LQ-MWS With Priority Discipline From the Fig 2, Per-Link Queue Scheduling with Priority discipline first discovers the routes between source to destination and also determine the hop count value that is, number of hop between source to destination. Path selection is based on hop count information. Forward the data packets to corresponding destination. 4.2 LQ-MWS with FIFO Discipline: In this section we discuss about per-Link queue scheduling with FIFO discipline. This algorithm does not requires hop count information that is, number of hop present in between source node to destination node and per-flow information. Fig -3: Procedure for LQ-MWS With FIFO Discipline From the Fig 3, Per-Link Queue Scheduling with FIFO discipline first discovers the route between source to destination. Forward the data packets to corresponding destination through activate link. 5. GREEDY TECHNIQUE In this section we discuss about Greedy Technique. In Greedy manner, the current node always forwards a data packet to its neighbour nodes that is closest to the destination node. The other name of Greedy Maximal Scheduling (GMS) is Longest- Queue-First (LQF) Scheduling. It is another natural low- complexity alternative to MWS which has been observed to achieve very good throughput and delay performance in a variety of wireless network. It satisfies the local-pooling condition for achieve. Fig -4: Procedure for Greedy Technique Achieve Throughput Forwarding Packets Local Pooling condition Route discovery Achieve Throughput Forwarding Packets Queue length determination Route discovery Achieve Throughput Forwarding Packets Path selection Route discovery and determine hop count value Achieve Throughput Forwarding Packets Route discovery
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 556 From the Fig 4, Greedy Technique first discovers the route between source to destination. To generate Local pooling condition and satisfied it. Forward the data packets to corresponding destination through that link. 6. COMBINED SCHEDULING SCHEMES In this Section, we discuss about combined scheduling scheme that is, Per-Hop Queue and Per-Link Queue scheduling combined with Greedy algorithm. In these Queue based Scheduling schemes has buffer overflow performance and high complexity. So, to combine greedy techniques with these Queue based Scheduling we achieve small buffer overflow performance and more throughput at low complexity. This combined scheduling scheme has the following advantages. They are,  Small buffer overflow  Does not requires per-flow information  Reduce complexity  Better delay performance  And maximum throughput From the Fig 5, Combined scheduling schemes first discovers the route between source to destination. To determines the length of the queue and shortest path between source to destination. Forward the data packets to corresponding destination through that shortest path i.e optimum path. Fig -5: Procedure for Combined Scheduling scheme 7 SIMULATION RESULT To shows Fig 6: Grid network topology with 16 nodes. Each and every node adjacent to their neighboring node. In this simulation, source and destination nodes are fixed one. To apply various scheduling scheme for analysis their throughput performance. Applying Per-Hop Queue, Per-Link Queue scheduling, Greedy Algorithm and Combined scheduling i.e. Queue based Scheduling with Greedy algorithm. Fig -6: Grid Network Topology For example, the node 9 has the following adjacent neighboring nodes. they are node 5, node 8, node 10, node13. Fig -7: Graph Analysis for Various Scheduling schemes All the scheduling schemes are analyzed by this graph (Fig-7). In this graph, X-axis represents the Time and Y-axis represents the delivered data Packets. The blue color curve represents the Per-Hop Queue Scheduling scheme performance. The red color curve represents the Per-Link Queue scheduling schemes. The Greedy Algorithm is represented by green color. Finally, violet color indicates the combine scheduling scheme. From the graph analysis, the combined scheduling scheme has more throughputs compared to all algorithms. The combined scheduling achieves more throughput and good delay performance at low complexity. 0 100 200 300 400 500 600 700 10 20 30 40 50 60 Per-hop Per-Link Greedy combined Time Packets 0 4 8 12 1 5 13 3 3 9 2 6 10 0 0 014 7 15 11 3 Achieve Throughput Forwarding Packets Shortest Path Route discovery
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 557 8. CONCLUSIONS In this paper developed combined scheduling policies per- hop/per-link queue with Greedy algorithm. This combine scheduling algorithm achieve maximum throughput without per-flow information and good delay performance at low complexity. It reduce buffer overflow that is queue overflow for improve throughput efficiency. This greedy algorithm satisfies the local pooling condition for improve the throughput. Further, to generate sufficient local pooling condition for achieve 100% throughput. REFERENCES [1]. B. Ji, C. Joo, and N. B. Shroff, “Throughput-optimal scheduling in multi-hop wireless networks without per-flow information,”IEEE/ACM Transactions On Networking, Vol. 21, No. 2, pp.634-647APRIL 2013. [2]. Arun Sridharan, C. Emre Koksal, and Elif Uysal- Biyikoglu,” A Greedy Link Scheduler for Wireless Networks with Gaussian Multiple Access and Broadcast Channels”conference paper [3]. Bo Ji, Gagan R. Gupta, Xiaojun Lin, and Ness B. Shroff,” Performance of Low-Complexity Greedy Scheduling Policies in Multi-Channel Wireless Networks: Optimal Throughput and Near-Optimal Delay” conference paper 2013. [4]. J. Ni, B. Tan, and R. Srikant, “Q-CSMA: Queue-length based CSMA/CA algorithms for achieving maximum throughput and low delay in wireless networks,” 2009 [Online]. Available: http://arxiv.org/PS_cache/arxiv /pdf/0901/0901.2333v4.pdf [5]. G. Sharma, R. R. Mazumdar, and N. B. Shroff, “On the complexity of scheduling in wireless networks,” in Proc. MobiCom, 2006, pp. 227–238. [6]. L. Bui, R. Srikant, and A. Stolyar, “A novel architecture for reduction of delay and queueing structure complexity in the back-pressure algorithm,”IEEE/ACM Trans. Netw., vol. 19, no. 6, pp. 1597–1609, Dec. 2011. [7]. S. Liu, E. Ekici, and L. Ying, “Scheduling in multihop wireless networks without back-pressure,” in Proc. Allerton, 2010, pp. 686–690. [8]. M. Bramson, “Stability of queueing networks,” Probab. Surveys, vol. 5, no. 1, pp. 169–345, 2008. [9]. B. Ji, C. Joo, and N. B. Shroff, “Throughput-optimal scheduling in multi-hop wireless networks without per-flow information,” 2012 [Online]. Available: http://arxiv.org/abs/1101.4211 [10]. A. Rybko and A. Stolyar, “Ergodicity of stochastic processes describing the operation of open queueing networks,” Problems Inf. Transmission, vol. 28, pp. 199–220, 1992. [11]. S. Lu and P. Kumar, “Distributedscheduling based on due dates and buffer priorities,” IEEE Trans. Autom. Control, vol. 36, no. 12, pp. 1406–1416, Dec. 1991. [12]. H. Chen and H. Zhang, “Stability of multiclass queueing networks under priority service disciplines,” Oper. Res., vol. 48, no. 1, pp. 26–37, 2000. [13]. H. Chen and H. Ye, “Piecewise linear Lyapunov function for the stability of multiclass priority fluid networks,” IEEE Trans. Autom. Control, vol. 47, no. 4, pp. 564–575, Apr. 2002. [14]. H. Chen and D. Yao, “Stable priority disciplines for multiclass networks,” in Stochastic Networks: Stability and Rare Events, P. Glasserman, K. Sigman, and D. Yao, Eds. New York: Springer-Verlag, 1996, ch. 2, pp. 27–39. [15]. Changhee Joo and Ness B. Shroff, “Local Greedy Approximation for Scheduling in Multihop Wireless Networks” IEEE Transactions On Mobile Computing, Vol. 11, No. 3, MARCH 2012,pp 414-426. [16]. Antonis Dimakis And Jean Walrand, “Sufficient Conditions For Stability Of Longest Queue First Scheduling: Second Order Properties Using Fluid Limits”, Applied Probability Trust (29 May 2005). BIOGRAPHIES Ms. S. Daisy Rani, received her B.E degree in Computer Science and Engineering from Anna University, Chennai. She is currently doing ME-Computer and Communication at Anna university, Chennai. She has done her project in Multihop Wireless Networks for Analyzing Delay Performance. Her area of interest is Multihop Wireless Networks. Mr. B. Sivasankar received his B.E. in Computer Science and Engineering from Madurai Kamaraj university, Madurai and M.Tech in Computer and Information Technology from MS university, Tirunelveli. His research interest includes Wireless Networks and Software Engineering.