SlideShare a Scribd company logo
1 of 10
Download to read offline
International journal on applications of graph theory in wireless ad hoc networks and sensor networks
                                 (GRAPH-HOC) Vol.5, No.1, March 2013




     A Professional QoS Provisioning In The Intra
     Cluster Packet Level Resource Allowance For
               Wireless Mesh Networks

                           K.Senthamil Selvan1 and B. LakshmiDhevi2
     1
         Department of Electronics and Communication Engineering, Research Scholar,
                                St.Peter’s University, Chennai
                                   senthamilkselva@gmail.com
                    2
                        Department of Computer Science Engineering, Chennai
                                    lakshmidhevi.b@gmail.com



ABSTRACT

 Wireless mesh networking has transpired as a gifted technology for potential broadband wireless access.
In a communication network, wireless mesh network plays a vital role in transmission and are structured in
a mesh topology. The coordination of mesh routers and mesh clients forms the wireless mesh networks
which are routed through the gateways. Wireless mesh networks uses IEEE 802.11 standards and has its
wide applications broadband home networking and enterprise networking deployment such as Microsoft
wireless mesh and MIT etc. A professional Qos provisioning in intra cluster packet level resource
allocation for WMN approach takes power allocation, sub carrier allocation and packet scheduling. This
approach combines the merits of a Karush-Kuhn-Tucker (KKT) algorithm and a genetic algorithm (GA)
based approach. The KKT algorithm uses uniform power allocation over all the subcarriers, based on the
optimal allocation criterion. The genetic algorithm is used to generate useful solutions to optimization and
search problems and it is also used for search problems. By combining the intrinsic worth of both the
approaches, it facilitates effective QOS provisioning at the packet level. It is concluded that, this approach
achieves a preferred stability between system implementation and computational convolution.

KEYWORDS
Wireless Mesh Network (WMN), Karush-Kuhn-Tucker (KKT), Genetic algorithm (GA), Quality of
Service(QoS), Clustering.


1. INTRODUCTION
In the networking paradigm, wireless mesh networks brought tremendous changes and is
applicable universally. WMNs are structured in a mesh topology. The coordination of mesh
routers and mesh clients forms the wireless mesh networks which are routed through the
gateways. Our everyday practice of laptop and cell phones act as the mesh clients and mesh
routers forwards the signals appropriately through gateways. Wireless mesh networking has
been attracting significant attention from industry and academia. WMN affords the internet
DOI : 10.5121/jgraphoc.2013.5101                                                                            1
International journal on applications of graph theory in wireless ad hoc networks and sensor networks
                                (GRAPH-HOC) Vol.5, No.1, March 2013
access with a low cost for all applications. Most of the researchers formulated an absolute work
on cross layer information for resource allowance and data scheduling. In [1], adaptive
subcarrier, bit and power allocation was investigated to minimize the total transmit power of an
OFDM system with fixed data rate. An optimal joint subcarrier and power allocation algorithm
was proposed in [5], to maximize the system capacity with fixed power and delay constraints. In
[7], resource allocation is performed based on a utility function which reflects the quality of
service (QoS). In [6], power allocation of a multimedia CDMA cellular network is determined
by maximizing the weighted sum capacity. In [22], an urgency and efficiency based packet
scheduling scheme was employed for OFDM systems, based on a utility function of the




                                                                                    Mesh router domain




                                                                                    Mesh client domain




                                        Figure1. Wireless Mesh Network

head-of-line (HOL) packet delay and channel quality. In [24], the genetic algorithm was
employed for resource allocation and scheduling by maximizing the weighted sum capacity,
where the weights are determined at the MAC layer according to the traffic delays. Our proposed
approach concentrates on resource allowance for all the nodes available in clusters. Many
technological advances in communication networks offers the services such as conference
calling, voice mail and video conferencing etc in MAC layer which necessitates the packet
scheduling.

 *This paper consists of the following sections. In the section [II] we have report how we
designed the related work for an efficient intra clusters packet resources using QOS wireless
networks .We report the system model in the section [III], and in the section [IV] The
Performance model with the conclusion and the references in the section [V],[VII].*



                                                                                                          2
International journal on applications of graph theory in wireless ad hoc networks and sensor networks
                                 (GRAPH-HOC) Vol.5, No.1, March 2013

2. RELATED WORK

In the preceding work, packet scheduling is not addressed properly. The QoS provisioning is
often neglected in the MAC layer. To improve the capability of orthogonal frequency division
multiplexing systems the cross layer was deliberated in the networks. This work is also different
in the following aspects. First, we consider an OFDM system where each user has multiple
heterogeneous traffic queues at the same time. Second, we propose a packet dependent (PD)
scheduling scheme, which determines the packet transmission order by assigning different
weights to different packets, and therefore is more efficient than the conventional queue
dependent scheduling [20][8] where all packets in a queue have the same weight. The packet
weights in PD scheduling are determined based on the delay, packet size and QoS priority level
of the packets. Third, our resource allocation is user based, by maximizing the weighted sum
capacity of users rather than queues, and therefore requires a lower complexity than the
conventional queue based resource allocation. The weight for each user is obtained by summing
the weights of selected packets for that user.

Regarding the problem of power-subcarrier-time resource allocation with QoS assurance, a KKT-
driven resource allocation algorithm is proposed in [10], effectively provisioning QoS at the
packet level (e.g., packet dropping rates).This simple KKT-driven algorithm is shown to
outperform a random scheme. KKT-driven approach considers all three resource dimensions
(i.e., power, subcarrier, and time) individually in succession. Thus, the throughput performance
can be quite far from optimal. Genetic algorithms (GAs) are commonly used as search algorithms
for near-optimal solutions [12]. GA-based resource allocation can incorporate all three resource
dimensions simultaneously, potentially achieving better throughput performance and
provisioning QoS more effectively. Yet, GAs are usually computationally expensive due to a
long convergence time.

3.SYSTEM MODEL

 In this work, WMN is considered and it is a package of more clusters. Each and every node in
the communication networks are connected together. Grouping of similar nodes in to clusters are
called clustering and this technique is employed. By similarity the nodes can be split up into
small groups which are referred to as clusters for effective data combination. For all the clusters
available in the networks, must have a cluster head

for directing the other nodes to perform the data communication effectively. This cluster head
must have adequate resources and it was elected by the neighboring nodes. By employing the
clustering mechanism, the networks can provide bandwidth, stability and scalability. The nodes
in the cluster may vary or it may be constant according to the traffic load increase or decrease.
The cluster head plays an important role and this offers the resource allowance for all the lively
nodes in the cluster. Also it affords the timing information to all the clusters available in the
network. Further this time is divided into frames. Every frame in the nodes consists of a beacon
slot, control slot and data slots in a serial manner which is shown in figure 2.



                                                                                                           3
International journal on applications of graph theory in wireless ad hoc networks and sensor networks
                                 (GRAPH-HOC) Vol.5, No.1, March 2013


                                        Figure 2. Frame structure


  Beacon slot           Control slot           Data 1         Data 2        Data 3      ……..       Data n


Each and every slot in the frame can have their own functionality. The beacon slot in the frame
provides timing and node cluster sequence which are needed for transmission in the data slots.
The control slot in the frame

reveals the needed information of resource allowance technique to the beacon slot for all the
clusters in the network. A mesh router can be a sender, relay or receiver at different times. The
mesh routers act as an Omni-directional transceiver.




                                     Figure 3. An Intra-cluster WMN

Orthogonal frequency division multiplexing (OFDM), which divides a broadband channel into a
set of orthogonal narrowband subcarriers, allows for a wide range of resource management
approaches, and therefore is regarded as a promising technology for future wireless
communications. With the help of multi-channel OFDM technology, each router can choose a set
of subcarriers for DATA transmissions and/or receptions. In order to focus on intra-cluster
resource allocation, we make the following assumptions for presentation clarity. The first focus
is on Qos satisfaction in the networking attributes such as cell loss ratio, cell transfer delay, cell
delay variation and cell error ratio. The second focus is on clustering mechanism for effective
packet scheduling.

                                                                                                           4
International journal on applications of graph theory in wireless ad hoc networks and sensor networks
                                 (GRAPH-HOC) Vol.5, No.1, March 2013

4. PROBLEM FORMULATION
In our problem formulation, we take the instantaneous rate requirements of different traffic types
(e.g., voice, video, and data) in the current frame, if any, into account. Let X, Y, and Z denote the
number of active links in a cluster, the number of subcarriers available in a cluster, and the
number of timeslots (i.e., DATA slots) in a frame, respectively. Consider the following resource
allocation optimization problem which is the selection of the best element and is given below. In
an optimization problem solving, we must calculate the maximizing function and minimizing
function by systematical computation approach function.




                                                         >=Rdm , Vm

                                                              , Vm,l

Here, Um is the utility function of the X link. Rx(a, p) represents the actual aggregate
transmission rate of the frame allocating the Y subcarriers to all the active links in the cluster.
The transmit power over all the sub carriers in the transmitter link should be indicated by p. The
maximum power constraint of the transmitter and the channel gain should be indicated for all the
links. By using the resources allocated, the particular content of data should be transmitted
without any loss and noise interruption.

5. COMBINED KKT-GA RESOURCE ALLOCATION
Karush-Kuhn-Tuker algorithm first uses uniform power allocation over all the subcarriers,
allocates subcarriers based on the optimal subcarrier allocation criterion, re-allocates the
subcarriers until all the system constraints are met, and finally performs water- filling     for
power re-allocation. In a multi-carrier communication system, each channel can carry a signal
under noise condition considering maximizing the transmission rate and minimizing the total
power consumption. The KKT algorithm finds the solution for optimization problems
constrained to one or more inequalities. This algorithm follows some necessary conditions while
finding the solution: (i) Feasibility (ii) Direction which improves objective (iii) Complementary
slackness (iv) Positive Lagrange multipliers. The time complexity of the Cheng’s KKT-driven
algorithm is on the order of O (LMN). Despite low complexity, this approach is only
suboptimal, because it considers three resource dimensions (i.e., power, subcarrier, and time)
individually in succession .In our project this algorithm is used for allocation process for the
optimal allocation of a node to the server (cluster header) based on the above three resource
dimensions power, subcarrier, time.

The genetic algorithm (GA) is a search heuristic that mimics the process of natural evolution.
This heuristic is routinely used to generate useful solutions to optimization and search problems.
In our project genetic algorithm is used for selection process and fitness function evaluation. A
typical genetic algorithm describes the genetic representation of the solution and it represents the
                                                                                                           5
International journal on applications of graph theory in wireless ad hoc networks and sensor networks
                                 (GRAPH-HOC) Vol.5, No.1, March 2013
string of bits which describes the characteristics of the genetic illustration. A fitness function
evaluates the strings of the solution by fixing the fitness functionality value. By employing
reproducing and breeding, we can obtain the best elucidation. So that avoiding the unwanted or
useless solution in further.

Genetic algorithms are a type of trial-and-error search technique that is guided by principles of
Darwinian evolution. The genetic algorithm follows the concept of living organisms in natural
evolution, but considering the string values following selection, mutation and reproduction. GAs
start with a pool of randomly-generated candidate solutions which are then tested and scored
with respect to their utility. Solutions are then bred by probabilistically selecting high quality
parents and recombining their genetic representations to produce offspring solutions. Offspring
are typically subjected to a small amount of random mutation. The process of following
selection, mutation and recombination must be enforced continuously till obtaining the
acceptable solution. Genetic algorithms has its wide applications in variety of areas such as
micro-biology, medicine and in almost all authorities.

Parallelized versions of genetic algorithms (GAs) are popular primarily for three reasons: the GA
is an inherently parallel algorithm, typical GA applications are very compute intensive, and
powerful computing platforms, especially Beowulf-style computing clusters, are becoming more
affordable and easier to implement. In addition, the low communication bandwidth required
allows the use of inexpensive networking hardware such as standard office Ethernet.

In our work, we have the center of attention to perform the data communication without any
packet data loss and sustains the system implementation in the best manner. The time complexity
of Combined-KKT-GA is low, resulting in a preferred candidate for practical implementation.
We propose to combine the Cheng’s KKT driven and GA-based resource allocation schemes as
follows.

1) Obtain a resource allocation solution using the Cheng’s KKT-driven approach.
2) Obtain a resource allocation solution using the GA based approach.
3) Choose the better solution out of the above two solutions.

                            Figure 4. KKT-GA algorithm combined flowchart




                                                                                                           6
International journal on applications of graph theory in wireless ad hoc networks and sensor networks
                                 (GRAPH-HOC) Vol.5, No.1, March 2013

Therefore, on average, the performances of this novel approach. Combined-KKT- GA is
expected to be lower bounded and upper bounded by that of the Cheng’s KKT-driven scheme
and that of the GA-based scheme, respectively.

6. PERFORMANCE EVALUATION
We consider a cluster with a number of wireless nodes randomly located in a 1km x 1km
coverage area. We assume that the routing is predetermined so that the transmission source and
destination pair of an incoming packet is known in advance In Figure. 6, there is an obvious
performance gap between the system throughputs obtained from all the approaches and the data
capacity. This gap is recognized to the low traffic load and resource reservation. We observe that
both the system throughput and resource utilization for the proposed algorithms are improved
when the traffic load increases. The proposed Combined-KKTGA approach can effectively
provision QoS for real-time traffic and achieve satisfactory system throughput performance. This
novel approach is also of low computational complexity, leading to a viable candidate for
practical implementation




   Figure 5. System throughputs of the proposed scheme (Combined-KKT-GA), the GA-based scheme, the
                          Cheng’s KKT-driven scheme for the number of links M.


7. RESULTS
In a wireless communication mesh network, devoted links are used that gives the assurance of
holding their own information and avoids the traffic tribulations and this mesh network is robust
on the whole networks. This WMN provides the system performance, accuracy of data without
any packet data loss and deliver data in a timely manner. When the data communication occurs
between the client nodes, the server must be initiated in prior and intimates the client to sends the
data which is shown in figure 7.Now the client is ready to transfer the files, on receiving the
server ip address which is shown in figure 8. So the file transmission can be done in the client
window by mentioning the appropriate file name which is shown in figure 9.The data must be
received by the destination with-in a second and the file contents are transferred accurately
without any significant delay.

                                                                                                           7
International journal on applications of graph theory in wireless ad hoc networks and sensor networks
                              (GRAPH-HOC) Vol.5, No.1, March 2013


                             Figure6. The sever started message box




                     Figure 7. Output response given by the server message box




                                    Figure 8. Client side window




                                                                                                        8
International journal on applications of graph theory in wireless ad hoc networks and sensor networks
                                (GRAPH-HOC) Vol.5, No.1, March 2013

             Figure 9. After specifying file name, the client transfers content to the server




                                Figure 10. The Destination side window




8. CONCLUSION
In this work, by combining the intrinsic worth of KKT algorithm and genetic algorithm that
facilitates professional QOS provisioning in the intra cluster packet level. This combined
algorithm is proposed for the joint power subcarrier- time intra-cluster resource allocation
problem in WMNs. This proposed approach provides reliability, privacy, security that makes
fault identification and fault isolation easily. It is concluded that, this approach achieves a
preferred stability between system implementation and computational convolution.




                                                                                                          9
International journal on applications of graph theory in wireless ad hoc networks and sensor networks
                                    (GRAPH-HOC) Vol.5, No.1, March 2013
9. REFERENCES
[1]  C. Y. Wong, R. S. Cheng, K. B. Lataief, and R. D. Murch, “Multiuser OFDM with adaptive
     subcarrier, bit, and power allocation," IEEE J.Select. Areas Commun. vol. 17, no. 10, pp. 1747-1758,
     Oct. 1999.
[2] D. S. W. Hui, V. K. N. Lau, and W. H. Lam, “Cross-layer design for OFDMA wireless systems with
     heterogeneous delay requirements,”IEEE Trans. Wireless Commun., vol. 6, pp. 2872–2880, Aug.
     2007.
[3] G. C. Song, “Cross-layer resource allocation and scheduling in wireless multicarrier networks,” Ph.D.
     dissertation, Georgia Institute of Technology, 2005.
[4] H. T. Cheng, H. Jiang, and W. Zhuang, “Distributed medium access control for wireless mesh
     networks," Wireless Commun. Mobile Computing, vol. 6, no. 6, pp. 845-864, Sept. 2006.
[5] H. T. Cheng and W. Zhuang, “Pareto optimal resource management for wireless mesh networks with
     QoS assurance: joint node clustering and subcarrier allocation," IEEE Trans. Wireless commun., in
     press.
[6] H. Yin and H. Liu, “An efficient multiuser loading algorithm for OFDM based broadband wireless
     systems," in Proc.IEEE Globecom’00, vol. 1, 2000, pp. 103-107.
[7] L. Gao and S. Cui, “Efficient subcarrier, power, and rate allocation with fairness consideration for
     OFDMA uplink,"IEEE Trans. WirelessCommun., vol. 7, no. 5, pp. 1507-1511, May 2008.
[8] M. Andrews, K. Kumar an, K. Ramanan, A. Stolyar, P. Whiting, and. Vijayakumar, “Providing
     quality of service Over a shared wireless link,” IEEE Commun. Mag., vol. 2, pp. 150–154, Feb. 2001.
[9] M. Mitchell, An Introduction to Genetic Algorithms. Cambridge, MA:The MIT Press, 1998.
[10] Y. Yu and W. Zhou, “Resource allocation for OFDMA system based on genetic algorithm,” in Proc.
     IEEE IWCLD’2007, vol. 10, Tai’an, China,Sep. 2007, pp. 65–69.

BIOGRAPHIES

K.Senthamil Selvan has completed his B.E. in the faculty of ECE and M.E. in the area of
Applied Electronics. He is currently a research scholar in the department of Electronics and
Communication Engineering at St. Peter’s University, Avadi, Chennai. He is an Assistant
Professor in the dept. of ECE at Dhanalakshmi College of Engineering, Chennai. He shows
interest in the areas of Wireless Communication, Embedded system design and Image
processing.

B.Lakshmi Dhevi has completed her B.E. in the faculty of Computer Science and
Engineering (CSE), M.E. in the area of Computer Science and Engineering. She shows
interest in the areas of Wireless sensor networks, Cloud Computing and Image processing.




                                                                                                              10

More Related Content

What's hot

Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se...
Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se...Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se...
Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se...M H
 
Congestion control, routing, and scheduling 2015
Congestion control, routing, and scheduling 2015Congestion control, routing, and scheduling 2015
Congestion control, routing, and scheduling 2015parry prabhu
 
A cross layer optimized reliable multicast routing protocol in wireless mesh ...
A cross layer optimized reliable multicast routing protocol in wireless mesh ...A cross layer optimized reliable multicast routing protocol in wireless mesh ...
A cross layer optimized reliable multicast routing protocol in wireless mesh ...ijdpsjournal
 
Java and .net IEEE 2012
Java and .net IEEE 2012Java and .net IEEE 2012
Java and .net IEEE 2012Vipin Jacob
 
A new clustering technique based on replication for MANET routing protocols
A new clustering technique based on replication for MANET routing protocolsA new clustering technique based on replication for MANET routing protocols
A new clustering technique based on replication for MANET routing protocolsTELKOMNIKA JOURNAL
 
MULTI-CLUSTER MULTI-CHANNEL SCHEDULING (MMS) ALGORITHM FOR MAXIMUM DATA COLLE...
MULTI-CLUSTER MULTI-CHANNEL SCHEDULING (MMS) ALGORITHM FOR MAXIMUM DATA COLLE...MULTI-CLUSTER MULTI-CHANNEL SCHEDULING (MMS) ALGORITHM FOR MAXIMUM DATA COLLE...
MULTI-CLUSTER MULTI-CHANNEL SCHEDULING (MMS) ALGORITHM FOR MAXIMUM DATA COLLE...IJCNCJournal
 
Connectivity aware and adaptive multipath routing algorithm for mobile adhoc ...
Connectivity aware and adaptive multipath routing algorithm for mobile adhoc ...Connectivity aware and adaptive multipath routing algorithm for mobile adhoc ...
Connectivity aware and adaptive multipath routing algorithm for mobile adhoc ...ijwmn
 
An Adaptive Cluster Head Election Algorithm for Heterogeneous Mobile Ad-hoc N...
An Adaptive Cluster Head Election Algorithm for Heterogeneous Mobile Ad-hoc N...An Adaptive Cluster Head Election Algorithm for Heterogeneous Mobile Ad-hoc N...
An Adaptive Cluster Head Election Algorithm for Heterogeneous Mobile Ad-hoc N...IJLT EMAS
 
MULTICASTING BASED ENHANCED PROACTIVE SOURCE ROUTING IN MANETS
MULTICASTING BASED ENHANCED PROACTIVE SOURCE ROUTING IN MANETSMULTICASTING BASED ENHANCED PROACTIVE SOURCE ROUTING IN MANETS
MULTICASTING BASED ENHANCED PROACTIVE SOURCE ROUTING IN MANETSIJCNCJournal
 
Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...
Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...
Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...Yayah Zakaria
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...Editor IJCATR
 
A Survey Paper on Cluster Head Selection Techniques for Mobile Ad-Hoc Network
A Survey Paper on Cluster Head Selection Techniques for Mobile Ad-Hoc NetworkA Survey Paper on Cluster Head Selection Techniques for Mobile Ad-Hoc Network
A Survey Paper on Cluster Head Selection Techniques for Mobile Ad-Hoc NetworkIOSR Journals
 
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSNDistributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSNpaperpublications3
 
IMPROVING PACKET DELIVERY RATIO WITH ENHANCED CONFIDENTIALITY IN MANET
IMPROVING PACKET DELIVERY RATIO WITH ENHANCED CONFIDENTIALITY IN MANETIMPROVING PACKET DELIVERY RATIO WITH ENHANCED CONFIDENTIALITY IN MANET
IMPROVING PACKET DELIVERY RATIO WITH ENHANCED CONFIDENTIALITY IN MANETijcsa
 
A STUDY ON RECEIVER BASED MULTICAST FOR WIRELESS SENSOR NETWORKS
A STUDY ON RECEIVER BASED MULTICAST FOR WIRELESS SENSOR NETWORKSA STUDY ON RECEIVER BASED MULTICAST FOR WIRELESS SENSOR NETWORKS
A STUDY ON RECEIVER BASED MULTICAST FOR WIRELESS SENSOR NETWORKSpharmaindexing
 

What's hot (15)

Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se...
Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se...Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se...
Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se...
 
Congestion control, routing, and scheduling 2015
Congestion control, routing, and scheduling 2015Congestion control, routing, and scheduling 2015
Congestion control, routing, and scheduling 2015
 
A cross layer optimized reliable multicast routing protocol in wireless mesh ...
A cross layer optimized reliable multicast routing protocol in wireless mesh ...A cross layer optimized reliable multicast routing protocol in wireless mesh ...
A cross layer optimized reliable multicast routing protocol in wireless mesh ...
 
Java and .net IEEE 2012
Java and .net IEEE 2012Java and .net IEEE 2012
Java and .net IEEE 2012
 
A new clustering technique based on replication for MANET routing protocols
A new clustering technique based on replication for MANET routing protocolsA new clustering technique based on replication for MANET routing protocols
A new clustering technique based on replication for MANET routing protocols
 
MULTI-CLUSTER MULTI-CHANNEL SCHEDULING (MMS) ALGORITHM FOR MAXIMUM DATA COLLE...
MULTI-CLUSTER MULTI-CHANNEL SCHEDULING (MMS) ALGORITHM FOR MAXIMUM DATA COLLE...MULTI-CLUSTER MULTI-CHANNEL SCHEDULING (MMS) ALGORITHM FOR MAXIMUM DATA COLLE...
MULTI-CLUSTER MULTI-CHANNEL SCHEDULING (MMS) ALGORITHM FOR MAXIMUM DATA COLLE...
 
Connectivity aware and adaptive multipath routing algorithm for mobile adhoc ...
Connectivity aware and adaptive multipath routing algorithm for mobile adhoc ...Connectivity aware and adaptive multipath routing algorithm for mobile adhoc ...
Connectivity aware and adaptive multipath routing algorithm for mobile adhoc ...
 
An Adaptive Cluster Head Election Algorithm for Heterogeneous Mobile Ad-hoc N...
An Adaptive Cluster Head Election Algorithm for Heterogeneous Mobile Ad-hoc N...An Adaptive Cluster Head Election Algorithm for Heterogeneous Mobile Ad-hoc N...
An Adaptive Cluster Head Election Algorithm for Heterogeneous Mobile Ad-hoc N...
 
MULTICASTING BASED ENHANCED PROACTIVE SOURCE ROUTING IN MANETS
MULTICASTING BASED ENHANCED PROACTIVE SOURCE ROUTING IN MANETSMULTICASTING BASED ENHANCED PROACTIVE SOURCE ROUTING IN MANETS
MULTICASTING BASED ENHANCED PROACTIVE SOURCE ROUTING IN MANETS
 
Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...
Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...
Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
 
A Survey Paper on Cluster Head Selection Techniques for Mobile Ad-Hoc Network
A Survey Paper on Cluster Head Selection Techniques for Mobile Ad-Hoc NetworkA Survey Paper on Cluster Head Selection Techniques for Mobile Ad-Hoc Network
A Survey Paper on Cluster Head Selection Techniques for Mobile Ad-Hoc Network
 
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSNDistributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
 
IMPROVING PACKET DELIVERY RATIO WITH ENHANCED CONFIDENTIALITY IN MANET
IMPROVING PACKET DELIVERY RATIO WITH ENHANCED CONFIDENTIALITY IN MANETIMPROVING PACKET DELIVERY RATIO WITH ENHANCED CONFIDENTIALITY IN MANET
IMPROVING PACKET DELIVERY RATIO WITH ENHANCED CONFIDENTIALITY IN MANET
 
A STUDY ON RECEIVER BASED MULTICAST FOR WIRELESS SENSOR NETWORKS
A STUDY ON RECEIVER BASED MULTICAST FOR WIRELESS SENSOR NETWORKSA STUDY ON RECEIVER BASED MULTICAST FOR WIRELESS SENSOR NETWORKS
A STUDY ON RECEIVER BASED MULTICAST FOR WIRELESS SENSOR NETWORKS
 

Viewers also liked

11 days with 6 days hiking through Jordan
11 days with 6 days hiking through Jordan11 days with 6 days hiking through Jordan
11 days with 6 days hiking through JordanJezra Travel
 
Dead sea wellness offer
Dead sea wellness offerDead sea wellness offer
Dead sea wellness offerJezra Travel
 
Biblical jordan pilgrimage tour of the holy sites
Biblical jordan   pilgrimage tour of the holy sitesBiblical jordan   pilgrimage tour of the holy sites
Biblical jordan pilgrimage tour of the holy sitesJezra Travel
 
Capture jordan photography tour with amer & jezra travel Jordan
Capture jordan   photography tour with amer & jezra travel JordanCapture jordan   photography tour with amer & jezra travel Jordan
Capture jordan photography tour with amer & jezra travel JordanJezra Travel
 
Jerusalem & bethlehem extension
Jerusalem & bethlehem extensionJerusalem & bethlehem extension
Jerusalem & bethlehem extensionJezra Travel
 
Wild water wadi tour Jordan
Wild water wadi tour JordanWild water wadi tour Jordan
Wild water wadi tour JordanJezra Travel
 

Viewers also liked (7)

11 days with 6 days hiking through Jordan
11 days with 6 days hiking through Jordan11 days with 6 days hiking through Jordan
11 days with 6 days hiking through Jordan
 
Dead sea wellness offer
Dead sea wellness offerDead sea wellness offer
Dead sea wellness offer
 
Biblical jordan pilgrimage tour of the holy sites
Biblical jordan   pilgrimage tour of the holy sitesBiblical jordan   pilgrimage tour of the holy sites
Biblical jordan pilgrimage tour of the holy sites
 
Capture jordan photography tour with amer & jezra travel Jordan
Capture jordan   photography tour with amer & jezra travel JordanCapture jordan   photography tour with amer & jezra travel Jordan
Capture jordan photography tour with amer & jezra travel Jordan
 
Jerusalem & bethlehem extension
Jerusalem & bethlehem extensionJerusalem & bethlehem extension
Jerusalem & bethlehem extension
 
Wild water wadi tour Jordan
Wild water wadi tour JordanWild water wadi tour Jordan
Wild water wadi tour Jordan
 
Camel safari
Camel safariCamel safari
Camel safari
 

Similar to 5113jgraph01

A Professional QoS Provisioning in the Intra Cluster Packet Level Resource Al...
A Professional QoS Provisioning in the Intra Cluster Packet Level Resource Al...A Professional QoS Provisioning in the Intra Cluster Packet Level Resource Al...
A Professional QoS Provisioning in the Intra Cluster Packet Level Resource Al...GiselleginaGloria
 
DYNAMIC HYBRID CHANNEL (WMN) FOR BANDWIDTH GUARANTEES IN AD_HOC NETWORKS
DYNAMIC HYBRID CHANNEL (WMN) FOR BANDWIDTH GUARANTEES IN AD_HOC NETWORKSDYNAMIC HYBRID CHANNEL (WMN) FOR BANDWIDTH GUARANTEES IN AD_HOC NETWORKS
DYNAMIC HYBRID CHANNEL (WMN) FOR BANDWIDTH GUARANTEES IN AD_HOC NETWORKSpharmaindexing
 
TTACCA: TWO-HOP BASED TRAFFIC AWARE CONGESTION CONTROL ALGORITHM FOR WIRELESS...
TTACCA: TWO-HOP BASED TRAFFIC AWARE CONGESTION CONTROL ALGORITHM FOR WIRELESS...TTACCA: TWO-HOP BASED TRAFFIC AWARE CONGESTION CONTROL ALGORITHM FOR WIRELESS...
TTACCA: TWO-HOP BASED TRAFFIC AWARE CONGESTION CONTROL ALGORITHM FOR WIRELESS...cscpconf
 
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...IOSR Journals
 
A comparative analysis on qos multicast routing protocols in MANETs
A comparative analysis on qos multicast routing protocols in MANETsA comparative analysis on qos multicast routing protocols in MANETs
A comparative analysis on qos multicast routing protocols in MANETsIOSR Journals
 
Efficient energy, cost reduction, and QoS based routing protocol for wireless...
Efficient energy, cost reduction, and QoS based routing protocol for wireless...Efficient energy, cost reduction, and QoS based routing protocol for wireless...
Efficient energy, cost reduction, and QoS based routing protocol for wireless...IJECEIAES
 
Modified q aware scheduling algorithm for improved fairness in 802.16 j networks
Modified q aware scheduling algorithm for improved fairness in 802.16 j networksModified q aware scheduling algorithm for improved fairness in 802.16 j networks
Modified q aware scheduling algorithm for improved fairness in 802.16 j networksIJCNCJournal
 
GREEDY CLUSTER BASED ROUTING FOR WIRELESS SENSOR NETWORKS
GREEDY CLUSTER BASED ROUTING FOR WIRELESS SENSOR NETWORKSGREEDY CLUSTER BASED ROUTING FOR WIRELESS SENSOR NETWORKS
GREEDY CLUSTER BASED ROUTING FOR WIRELESS SENSOR NETWORKSijcsit
 
Greedy Cluster Based Routing for Wireless Sensor Networks
Greedy Cluster Based Routing for Wireless Sensor NetworksGreedy Cluster Based Routing for Wireless Sensor Networks
Greedy Cluster Based Routing for Wireless Sensor NetworksAIRCC Publishing Corporation
 
Greedy Cluster Based Routing for Wireless Sensor Networks
Greedy Cluster Based Routing for Wireless Sensor NetworksGreedy Cluster Based Routing for Wireless Sensor Networks
Greedy Cluster Based Routing for Wireless Sensor NetworksAIRCC Publishing Corporation
 
PROPOSED A HETEROGENEOUS CLUSTERING ALGORITHM TO IMPROVE QOS IN WSN
PROPOSED A HETEROGENEOUS CLUSTERING ALGORITHM TO IMPROVE QOS IN WSNPROPOSED A HETEROGENEOUS CLUSTERING ALGORITHM TO IMPROVE QOS IN WSN
PROPOSED A HETEROGENEOUS CLUSTERING ALGORITHM TO IMPROVE QOS IN WSNIJCNCJournal
 
Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...
Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...
Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...M H
 
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...IJCNCJournal
 
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...IJCNCJournal
 
Adaptive Bandwidth Management Model for Wireless Mobile Ad-hoc Network
Adaptive Bandwidth Management Model for Wireless Mobile Ad-hoc NetworkAdaptive Bandwidth Management Model for Wireless Mobile Ad-hoc Network
Adaptive Bandwidth Management Model for Wireless Mobile Ad-hoc NetworkIJCNCJournal
 
ADAPTIVE BANDWIDTH MANAGEMENT MODEL FOR WIRELESS MOBILE AD-HOC NETWORK
ADAPTIVE BANDWIDTH MANAGEMENT MODEL FOR WIRELESS MOBILE AD-HOC NETWORKADAPTIVE BANDWIDTH MANAGEMENT MODEL FOR WIRELESS MOBILE AD-HOC NETWORK
ADAPTIVE BANDWIDTH MANAGEMENT MODEL FOR WIRELESS MOBILE AD-HOC NETWORKIJCNCJournal
 

Similar to 5113jgraph01 (20)

A Professional QoS Provisioning in the Intra Cluster Packet Level Resource Al...
A Professional QoS Provisioning in the Intra Cluster Packet Level Resource Al...A Professional QoS Provisioning in the Intra Cluster Packet Level Resource Al...
A Professional QoS Provisioning in the Intra Cluster Packet Level Resource Al...
 
DYNAMIC HYBRID CHANNEL (WMN) FOR BANDWIDTH GUARANTEES IN AD_HOC NETWORKS
DYNAMIC HYBRID CHANNEL (WMN) FOR BANDWIDTH GUARANTEES IN AD_HOC NETWORKSDYNAMIC HYBRID CHANNEL (WMN) FOR BANDWIDTH GUARANTEES IN AD_HOC NETWORKS
DYNAMIC HYBRID CHANNEL (WMN) FOR BANDWIDTH GUARANTEES IN AD_HOC NETWORKS
 
[IJCT-V3I2P21] Authors: Swati Govil, Dr.Paramjeet Rawat
[IJCT-V3I2P21] Authors: Swati Govil, Dr.Paramjeet Rawat[IJCT-V3I2P21] Authors: Swati Govil, Dr.Paramjeet Rawat
[IJCT-V3I2P21] Authors: Swati Govil, Dr.Paramjeet Rawat
 
TTACCA: TWO-HOP BASED TRAFFIC AWARE CONGESTION CONTROL ALGORITHM FOR WIRELESS...
TTACCA: TWO-HOP BASED TRAFFIC AWARE CONGESTION CONTROL ALGORITHM FOR WIRELESS...TTACCA: TWO-HOP BASED TRAFFIC AWARE CONGESTION CONTROL ALGORITHM FOR WIRELESS...
TTACCA: TWO-HOP BASED TRAFFIC AWARE CONGESTION CONTROL ALGORITHM FOR WIRELESS...
 
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
 
A comparative analysis on qos multicast routing protocols in MANETs
A comparative analysis on qos multicast routing protocols in MANETsA comparative analysis on qos multicast routing protocols in MANETs
A comparative analysis on qos multicast routing protocols in MANETs
 
Efficient energy, cost reduction, and QoS based routing protocol for wireless...
Efficient energy, cost reduction, and QoS based routing protocol for wireless...Efficient energy, cost reduction, and QoS based routing protocol for wireless...
Efficient energy, cost reduction, and QoS based routing protocol for wireless...
 
Modified q aware scheduling algorithm for improved fairness in 802.16 j networks
Modified q aware scheduling algorithm for improved fairness in 802.16 j networksModified q aware scheduling algorithm for improved fairness in 802.16 j networks
Modified q aware scheduling algorithm for improved fairness in 802.16 j networks
 
Ijcnc050203
Ijcnc050203Ijcnc050203
Ijcnc050203
 
GREEDY CLUSTER BASED ROUTING FOR WIRELESS SENSOR NETWORKS
GREEDY CLUSTER BASED ROUTING FOR WIRELESS SENSOR NETWORKSGREEDY CLUSTER BASED ROUTING FOR WIRELESS SENSOR NETWORKS
GREEDY CLUSTER BASED ROUTING FOR WIRELESS SENSOR NETWORKS
 
Greedy Cluster Based Routing for Wireless Sensor Networks
Greedy Cluster Based Routing for Wireless Sensor NetworksGreedy Cluster Based Routing for Wireless Sensor Networks
Greedy Cluster Based Routing for Wireless Sensor Networks
 
Greedy Cluster Based Routing for Wireless Sensor Networks
Greedy Cluster Based Routing for Wireless Sensor NetworksGreedy Cluster Based Routing for Wireless Sensor Networks
Greedy Cluster Based Routing for Wireless Sensor Networks
 
PROPOSED A HETEROGENEOUS CLUSTERING ALGORITHM TO IMPROVE QOS IN WSN
PROPOSED A HETEROGENEOUS CLUSTERING ALGORITHM TO IMPROVE QOS IN WSNPROPOSED A HETEROGENEOUS CLUSTERING ALGORITHM TO IMPROVE QOS IN WSN
PROPOSED A HETEROGENEOUS CLUSTERING ALGORITHM TO IMPROVE QOS IN WSN
 
Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...
Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...
Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...
 
Energy-efficient routing protocol for wireless sensor networks based on prog...
Energy-efficient routing protocol for wireless sensor networks  based on prog...Energy-efficient routing protocol for wireless sensor networks  based on prog...
Energy-efficient routing protocol for wireless sensor networks based on prog...
 
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...
 
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...
 
Adaptive Bandwidth Management Model for Wireless Mobile Ad-hoc Network
Adaptive Bandwidth Management Model for Wireless Mobile Ad-hoc NetworkAdaptive Bandwidth Management Model for Wireless Mobile Ad-hoc Network
Adaptive Bandwidth Management Model for Wireless Mobile Ad-hoc Network
 
ADAPTIVE BANDWIDTH MANAGEMENT MODEL FOR WIRELESS MOBILE AD-HOC NETWORK
ADAPTIVE BANDWIDTH MANAGEMENT MODEL FOR WIRELESS MOBILE AD-HOC NETWORKADAPTIVE BANDWIDTH MANAGEMENT MODEL FOR WIRELESS MOBILE AD-HOC NETWORK
ADAPTIVE BANDWIDTH MANAGEMENT MODEL FOR WIRELESS MOBILE AD-HOC NETWORK
 
DESIGN AND IMPLEMENTATION OF ADVANCED MULTILEVEL PRIORITY PACKET SCHEDULING S...
DESIGN AND IMPLEMENTATION OF ADVANCED MULTILEVEL PRIORITY PACKET SCHEDULING S...DESIGN AND IMPLEMENTATION OF ADVANCED MULTILEVEL PRIORITY PACKET SCHEDULING S...
DESIGN AND IMPLEMENTATION OF ADVANCED MULTILEVEL PRIORITY PACKET SCHEDULING S...
 

More from graphhoc

ON THE PROBABILITY OF K-CONNECTIVITY IN WIRELESS AD HOC NETWORKS UNDER DIFFER...
ON THE PROBABILITY OF K-CONNECTIVITY IN WIRELESS AD HOC NETWORKS UNDER DIFFER...ON THE PROBABILITY OF K-CONNECTIVITY IN WIRELESS AD HOC NETWORKS UNDER DIFFER...
ON THE PROBABILITY OF K-CONNECTIVITY IN WIRELESS AD HOC NETWORKS UNDER DIFFER...graphhoc
 
The Impact of Data Replication on Job Scheduling Performance in Hierarchical ...
The Impact of Data Replication on Job Scheduling Performance in Hierarchical ...The Impact of Data Replication on Job Scheduling Performance in Hierarchical ...
The Impact of Data Replication on Job Scheduling Performance in Hierarchical ...graphhoc
 
DISTANCE TWO LABELING FOR MULTI-STOREY GRAPHS
DISTANCE TWO LABELING FOR MULTI-STOREY GRAPHSDISTANCE TWO LABELING FOR MULTI-STOREY GRAPHS
DISTANCE TWO LABELING FOR MULTI-STOREY GRAPHSgraphhoc
 
Impact of Mobility for Qos Based Secure Manet
Impact of Mobility for Qos Based Secure Manet  Impact of Mobility for Qos Based Secure Manet
Impact of Mobility for Qos Based Secure Manet graphhoc
 
A Transmission Range Based Clustering Algorithm for Topology Control Manet
A Transmission Range Based Clustering Algorithm for Topology Control ManetA Transmission Range Based Clustering Algorithm for Topology Control Manet
A Transmission Range Based Clustering Algorithm for Topology Control Manetgraphhoc
 
A Battery Power Scheduling Policy with Hardware Support In Mobile Devices
A Battery Power Scheduling Policy with Hardware Support In Mobile Devices A Battery Power Scheduling Policy with Hardware Support In Mobile Devices
A Battery Power Scheduling Policy with Hardware Support In Mobile Devices graphhoc
 
A Review of the Energy Efficient and Secure Multicast Routing Protocols for ...
 A Review of the Energy Efficient and Secure Multicast Routing Protocols for ... A Review of the Energy Efficient and Secure Multicast Routing Protocols for ...
A Review of the Energy Efficient and Secure Multicast Routing Protocols for ...graphhoc
 
Case Study On Social Engineering Techniques for Persuasion Full Text
Case Study On Social Engineering Techniques for Persuasion   Full Text Case Study On Social Engineering Techniques for Persuasion   Full Text
Case Study On Social Engineering Techniques for Persuasion Full Text graphhoc
 
Breaking the Legend: Maxmin Fairness notion is no longer effective
Breaking the Legend: Maxmin Fairness notion is no longer effective  Breaking the Legend: Maxmin Fairness notion is no longer effective
Breaking the Legend: Maxmin Fairness notion is no longer effective graphhoc
 
I-Min: An Intelligent Fermat Point Based Energy Efficient Geographic Packet F...
I-Min: An Intelligent Fermat Point Based Energy Efficient Geographic Packet F...I-Min: An Intelligent Fermat Point Based Energy Efficient Geographic Packet F...
I-Min: An Intelligent Fermat Point Based Energy Efficient Geographic Packet F...graphhoc
 
Fault tolerant wireless sensor mac protocol for efficient collision avoidance
Fault tolerant wireless sensor mac protocol for efficient collision avoidanceFault tolerant wireless sensor mac protocol for efficient collision avoidance
Fault tolerant wireless sensor mac protocol for efficient collision avoidancegraphhoc
 
Enhancing qo s and qoe in ims enabled next generation networks
Enhancing qo s and qoe in ims enabled next generation networksEnhancing qo s and qoe in ims enabled next generation networks
Enhancing qo s and qoe in ims enabled next generation networksgraphhoc
 
Simulated annealing for location area planning in cellular networks
Simulated annealing for location area planning in cellular networksSimulated annealing for location area planning in cellular networks
Simulated annealing for location area planning in cellular networksgraphhoc
 
Secure key exchange and encryption mechanism for group communication in wirel...
Secure key exchange and encryption mechanism for group communication in wirel...Secure key exchange and encryption mechanism for group communication in wirel...
Secure key exchange and encryption mechanism for group communication in wirel...graphhoc
 
Simulation to track 3 d location in gsm through ns2 and real life
Simulation to track 3 d location in gsm through ns2 and real lifeSimulation to track 3 d location in gsm through ns2 and real life
Simulation to track 3 d location in gsm through ns2 and real lifegraphhoc
 
Performance Analysis of Ultra Wideband Receivers for High Data Rate Wireless ...
Performance Analysis of Ultra Wideband Receivers for High Data Rate Wireless ...Performance Analysis of Ultra Wideband Receivers for High Data Rate Wireless ...
Performance Analysis of Ultra Wideband Receivers for High Data Rate Wireless ...graphhoc
 
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...graphhoc
 
An Algorithm for Odd Graceful Labeling of the Union of Paths and Cycles
An Algorithm for Odd Graceful Labeling of the Union of Paths and Cycles  An Algorithm for Odd Graceful Labeling of the Union of Paths and Cycles
An Algorithm for Odd Graceful Labeling of the Union of Paths and Cycles graphhoc
 
ACTOR GARBAGE COLLECTION IN DISTRIBUTED SYSTEMS USING GRAPH TRANSFORMATION
ACTOR GARBAGE COLLECTION IN DISTRIBUTED SYSTEMS USING GRAPH TRANSFORMATIONACTOR GARBAGE COLLECTION IN DISTRIBUTED SYSTEMS USING GRAPH TRANSFORMATION
ACTOR GARBAGE COLLECTION IN DISTRIBUTED SYSTEMS USING GRAPH TRANSFORMATIONgraphhoc
 
A Proposal Analytical Model and Simulation of the Attacks in Routing Protocol...
A Proposal Analytical Model and Simulation of the Attacks in Routing Protocol...A Proposal Analytical Model and Simulation of the Attacks in Routing Protocol...
A Proposal Analytical Model and Simulation of the Attacks in Routing Protocol...graphhoc
 

More from graphhoc (20)

ON THE PROBABILITY OF K-CONNECTIVITY IN WIRELESS AD HOC NETWORKS UNDER DIFFER...
ON THE PROBABILITY OF K-CONNECTIVITY IN WIRELESS AD HOC NETWORKS UNDER DIFFER...ON THE PROBABILITY OF K-CONNECTIVITY IN WIRELESS AD HOC NETWORKS UNDER DIFFER...
ON THE PROBABILITY OF K-CONNECTIVITY IN WIRELESS AD HOC NETWORKS UNDER DIFFER...
 
The Impact of Data Replication on Job Scheduling Performance in Hierarchical ...
The Impact of Data Replication on Job Scheduling Performance in Hierarchical ...The Impact of Data Replication on Job Scheduling Performance in Hierarchical ...
The Impact of Data Replication on Job Scheduling Performance in Hierarchical ...
 
DISTANCE TWO LABELING FOR MULTI-STOREY GRAPHS
DISTANCE TWO LABELING FOR MULTI-STOREY GRAPHSDISTANCE TWO LABELING FOR MULTI-STOREY GRAPHS
DISTANCE TWO LABELING FOR MULTI-STOREY GRAPHS
 
Impact of Mobility for Qos Based Secure Manet
Impact of Mobility for Qos Based Secure Manet  Impact of Mobility for Qos Based Secure Manet
Impact of Mobility for Qos Based Secure Manet
 
A Transmission Range Based Clustering Algorithm for Topology Control Manet
A Transmission Range Based Clustering Algorithm for Topology Control ManetA Transmission Range Based Clustering Algorithm for Topology Control Manet
A Transmission Range Based Clustering Algorithm for Topology Control Manet
 
A Battery Power Scheduling Policy with Hardware Support In Mobile Devices
A Battery Power Scheduling Policy with Hardware Support In Mobile Devices A Battery Power Scheduling Policy with Hardware Support In Mobile Devices
A Battery Power Scheduling Policy with Hardware Support In Mobile Devices
 
A Review of the Energy Efficient and Secure Multicast Routing Protocols for ...
 A Review of the Energy Efficient and Secure Multicast Routing Protocols for ... A Review of the Energy Efficient and Secure Multicast Routing Protocols for ...
A Review of the Energy Efficient and Secure Multicast Routing Protocols for ...
 
Case Study On Social Engineering Techniques for Persuasion Full Text
Case Study On Social Engineering Techniques for Persuasion   Full Text Case Study On Social Engineering Techniques for Persuasion   Full Text
Case Study On Social Engineering Techniques for Persuasion Full Text
 
Breaking the Legend: Maxmin Fairness notion is no longer effective
Breaking the Legend: Maxmin Fairness notion is no longer effective  Breaking the Legend: Maxmin Fairness notion is no longer effective
Breaking the Legend: Maxmin Fairness notion is no longer effective
 
I-Min: An Intelligent Fermat Point Based Energy Efficient Geographic Packet F...
I-Min: An Intelligent Fermat Point Based Energy Efficient Geographic Packet F...I-Min: An Intelligent Fermat Point Based Energy Efficient Geographic Packet F...
I-Min: An Intelligent Fermat Point Based Energy Efficient Geographic Packet F...
 
Fault tolerant wireless sensor mac protocol for efficient collision avoidance
Fault tolerant wireless sensor mac protocol for efficient collision avoidanceFault tolerant wireless sensor mac protocol for efficient collision avoidance
Fault tolerant wireless sensor mac protocol for efficient collision avoidance
 
Enhancing qo s and qoe in ims enabled next generation networks
Enhancing qo s and qoe in ims enabled next generation networksEnhancing qo s and qoe in ims enabled next generation networks
Enhancing qo s and qoe in ims enabled next generation networks
 
Simulated annealing for location area planning in cellular networks
Simulated annealing for location area planning in cellular networksSimulated annealing for location area planning in cellular networks
Simulated annealing for location area planning in cellular networks
 
Secure key exchange and encryption mechanism for group communication in wirel...
Secure key exchange and encryption mechanism for group communication in wirel...Secure key exchange and encryption mechanism for group communication in wirel...
Secure key exchange and encryption mechanism for group communication in wirel...
 
Simulation to track 3 d location in gsm through ns2 and real life
Simulation to track 3 d location in gsm through ns2 and real lifeSimulation to track 3 d location in gsm through ns2 and real life
Simulation to track 3 d location in gsm through ns2 and real life
 
Performance Analysis of Ultra Wideband Receivers for High Data Rate Wireless ...
Performance Analysis of Ultra Wideband Receivers for High Data Rate Wireless ...Performance Analysis of Ultra Wideband Receivers for High Data Rate Wireless ...
Performance Analysis of Ultra Wideband Receivers for High Data Rate Wireless ...
 
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...
 
An Algorithm for Odd Graceful Labeling of the Union of Paths and Cycles
An Algorithm for Odd Graceful Labeling of the Union of Paths and Cycles  An Algorithm for Odd Graceful Labeling of the Union of Paths and Cycles
An Algorithm for Odd Graceful Labeling of the Union of Paths and Cycles
 
ACTOR GARBAGE COLLECTION IN DISTRIBUTED SYSTEMS USING GRAPH TRANSFORMATION
ACTOR GARBAGE COLLECTION IN DISTRIBUTED SYSTEMS USING GRAPH TRANSFORMATIONACTOR GARBAGE COLLECTION IN DISTRIBUTED SYSTEMS USING GRAPH TRANSFORMATION
ACTOR GARBAGE COLLECTION IN DISTRIBUTED SYSTEMS USING GRAPH TRANSFORMATION
 
A Proposal Analytical Model and Simulation of the Attacks in Routing Protocol...
A Proposal Analytical Model and Simulation of the Attacks in Routing Protocol...A Proposal Analytical Model and Simulation of the Attacks in Routing Protocol...
A Proposal Analytical Model and Simulation of the Attacks in Routing Protocol...
 

Recently uploaded

Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 

Recently uploaded (20)

Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 

5113jgraph01

  • 1. International journal on applications of graph theory in wireless ad hoc networks and sensor networks (GRAPH-HOC) Vol.5, No.1, March 2013 A Professional QoS Provisioning In The Intra Cluster Packet Level Resource Allowance For Wireless Mesh Networks K.Senthamil Selvan1 and B. LakshmiDhevi2 1 Department of Electronics and Communication Engineering, Research Scholar, St.Peter’s University, Chennai senthamilkselva@gmail.com 2 Department of Computer Science Engineering, Chennai lakshmidhevi.b@gmail.com ABSTRACT Wireless mesh networking has transpired as a gifted technology for potential broadband wireless access. In a communication network, wireless mesh network plays a vital role in transmission and are structured in a mesh topology. The coordination of mesh routers and mesh clients forms the wireless mesh networks which are routed through the gateways. Wireless mesh networks uses IEEE 802.11 standards and has its wide applications broadband home networking and enterprise networking deployment such as Microsoft wireless mesh and MIT etc. A professional Qos provisioning in intra cluster packet level resource allocation for WMN approach takes power allocation, sub carrier allocation and packet scheduling. This approach combines the merits of a Karush-Kuhn-Tucker (KKT) algorithm and a genetic algorithm (GA) based approach. The KKT algorithm uses uniform power allocation over all the subcarriers, based on the optimal allocation criterion. The genetic algorithm is used to generate useful solutions to optimization and search problems and it is also used for search problems. By combining the intrinsic worth of both the approaches, it facilitates effective QOS provisioning at the packet level. It is concluded that, this approach achieves a preferred stability between system implementation and computational convolution. KEYWORDS Wireless Mesh Network (WMN), Karush-Kuhn-Tucker (KKT), Genetic algorithm (GA), Quality of Service(QoS), Clustering. 1. INTRODUCTION In the networking paradigm, wireless mesh networks brought tremendous changes and is applicable universally. WMNs are structured in a mesh topology. The coordination of mesh routers and mesh clients forms the wireless mesh networks which are routed through the gateways. Our everyday practice of laptop and cell phones act as the mesh clients and mesh routers forwards the signals appropriately through gateways. Wireless mesh networking has been attracting significant attention from industry and academia. WMN affords the internet DOI : 10.5121/jgraphoc.2013.5101 1
  • 2. International journal on applications of graph theory in wireless ad hoc networks and sensor networks (GRAPH-HOC) Vol.5, No.1, March 2013 access with a low cost for all applications. Most of the researchers formulated an absolute work on cross layer information for resource allowance and data scheduling. In [1], adaptive subcarrier, bit and power allocation was investigated to minimize the total transmit power of an OFDM system with fixed data rate. An optimal joint subcarrier and power allocation algorithm was proposed in [5], to maximize the system capacity with fixed power and delay constraints. In [7], resource allocation is performed based on a utility function which reflects the quality of service (QoS). In [6], power allocation of a multimedia CDMA cellular network is determined by maximizing the weighted sum capacity. In [22], an urgency and efficiency based packet scheduling scheme was employed for OFDM systems, based on a utility function of the Mesh router domain Mesh client domain Figure1. Wireless Mesh Network head-of-line (HOL) packet delay and channel quality. In [24], the genetic algorithm was employed for resource allocation and scheduling by maximizing the weighted sum capacity, where the weights are determined at the MAC layer according to the traffic delays. Our proposed approach concentrates on resource allowance for all the nodes available in clusters. Many technological advances in communication networks offers the services such as conference calling, voice mail and video conferencing etc in MAC layer which necessitates the packet scheduling. *This paper consists of the following sections. In the section [II] we have report how we designed the related work for an efficient intra clusters packet resources using QOS wireless networks .We report the system model in the section [III], and in the section [IV] The Performance model with the conclusion and the references in the section [V],[VII].* 2
  • 3. International journal on applications of graph theory in wireless ad hoc networks and sensor networks (GRAPH-HOC) Vol.5, No.1, March 2013 2. RELATED WORK In the preceding work, packet scheduling is not addressed properly. The QoS provisioning is often neglected in the MAC layer. To improve the capability of orthogonal frequency division multiplexing systems the cross layer was deliberated in the networks. This work is also different in the following aspects. First, we consider an OFDM system where each user has multiple heterogeneous traffic queues at the same time. Second, we propose a packet dependent (PD) scheduling scheme, which determines the packet transmission order by assigning different weights to different packets, and therefore is more efficient than the conventional queue dependent scheduling [20][8] where all packets in a queue have the same weight. The packet weights in PD scheduling are determined based on the delay, packet size and QoS priority level of the packets. Third, our resource allocation is user based, by maximizing the weighted sum capacity of users rather than queues, and therefore requires a lower complexity than the conventional queue based resource allocation. The weight for each user is obtained by summing the weights of selected packets for that user. Regarding the problem of power-subcarrier-time resource allocation with QoS assurance, a KKT- driven resource allocation algorithm is proposed in [10], effectively provisioning QoS at the packet level (e.g., packet dropping rates).This simple KKT-driven algorithm is shown to outperform a random scheme. KKT-driven approach considers all three resource dimensions (i.e., power, subcarrier, and time) individually in succession. Thus, the throughput performance can be quite far from optimal. Genetic algorithms (GAs) are commonly used as search algorithms for near-optimal solutions [12]. GA-based resource allocation can incorporate all three resource dimensions simultaneously, potentially achieving better throughput performance and provisioning QoS more effectively. Yet, GAs are usually computationally expensive due to a long convergence time. 3.SYSTEM MODEL In this work, WMN is considered and it is a package of more clusters. Each and every node in the communication networks are connected together. Grouping of similar nodes in to clusters are called clustering and this technique is employed. By similarity the nodes can be split up into small groups which are referred to as clusters for effective data combination. For all the clusters available in the networks, must have a cluster head for directing the other nodes to perform the data communication effectively. This cluster head must have adequate resources and it was elected by the neighboring nodes. By employing the clustering mechanism, the networks can provide bandwidth, stability and scalability. The nodes in the cluster may vary or it may be constant according to the traffic load increase or decrease. The cluster head plays an important role and this offers the resource allowance for all the lively nodes in the cluster. Also it affords the timing information to all the clusters available in the network. Further this time is divided into frames. Every frame in the nodes consists of a beacon slot, control slot and data slots in a serial manner which is shown in figure 2. 3
  • 4. International journal on applications of graph theory in wireless ad hoc networks and sensor networks (GRAPH-HOC) Vol.5, No.1, March 2013 Figure 2. Frame structure Beacon slot Control slot Data 1 Data 2 Data 3 …….. Data n Each and every slot in the frame can have their own functionality. The beacon slot in the frame provides timing and node cluster sequence which are needed for transmission in the data slots. The control slot in the frame reveals the needed information of resource allowance technique to the beacon slot for all the clusters in the network. A mesh router can be a sender, relay or receiver at different times. The mesh routers act as an Omni-directional transceiver. Figure 3. An Intra-cluster WMN Orthogonal frequency division multiplexing (OFDM), which divides a broadband channel into a set of orthogonal narrowband subcarriers, allows for a wide range of resource management approaches, and therefore is regarded as a promising technology for future wireless communications. With the help of multi-channel OFDM technology, each router can choose a set of subcarriers for DATA transmissions and/or receptions. In order to focus on intra-cluster resource allocation, we make the following assumptions for presentation clarity. The first focus is on Qos satisfaction in the networking attributes such as cell loss ratio, cell transfer delay, cell delay variation and cell error ratio. The second focus is on clustering mechanism for effective packet scheduling. 4
  • 5. International journal on applications of graph theory in wireless ad hoc networks and sensor networks (GRAPH-HOC) Vol.5, No.1, March 2013 4. PROBLEM FORMULATION In our problem formulation, we take the instantaneous rate requirements of different traffic types (e.g., voice, video, and data) in the current frame, if any, into account. Let X, Y, and Z denote the number of active links in a cluster, the number of subcarriers available in a cluster, and the number of timeslots (i.e., DATA slots) in a frame, respectively. Consider the following resource allocation optimization problem which is the selection of the best element and is given below. In an optimization problem solving, we must calculate the maximizing function and minimizing function by systematical computation approach function. >=Rdm , Vm , Vm,l Here, Um is the utility function of the X link. Rx(a, p) represents the actual aggregate transmission rate of the frame allocating the Y subcarriers to all the active links in the cluster. The transmit power over all the sub carriers in the transmitter link should be indicated by p. The maximum power constraint of the transmitter and the channel gain should be indicated for all the links. By using the resources allocated, the particular content of data should be transmitted without any loss and noise interruption. 5. COMBINED KKT-GA RESOURCE ALLOCATION Karush-Kuhn-Tuker algorithm first uses uniform power allocation over all the subcarriers, allocates subcarriers based on the optimal subcarrier allocation criterion, re-allocates the subcarriers until all the system constraints are met, and finally performs water- filling for power re-allocation. In a multi-carrier communication system, each channel can carry a signal under noise condition considering maximizing the transmission rate and minimizing the total power consumption. The KKT algorithm finds the solution for optimization problems constrained to one or more inequalities. This algorithm follows some necessary conditions while finding the solution: (i) Feasibility (ii) Direction which improves objective (iii) Complementary slackness (iv) Positive Lagrange multipliers. The time complexity of the Cheng’s KKT-driven algorithm is on the order of O (LMN). Despite low complexity, this approach is only suboptimal, because it considers three resource dimensions (i.e., power, subcarrier, and time) individually in succession .In our project this algorithm is used for allocation process for the optimal allocation of a node to the server (cluster header) based on the above three resource dimensions power, subcarrier, time. The genetic algorithm (GA) is a search heuristic that mimics the process of natural evolution. This heuristic is routinely used to generate useful solutions to optimization and search problems. In our project genetic algorithm is used for selection process and fitness function evaluation. A typical genetic algorithm describes the genetic representation of the solution and it represents the 5
  • 6. International journal on applications of graph theory in wireless ad hoc networks and sensor networks (GRAPH-HOC) Vol.5, No.1, March 2013 string of bits which describes the characteristics of the genetic illustration. A fitness function evaluates the strings of the solution by fixing the fitness functionality value. By employing reproducing and breeding, we can obtain the best elucidation. So that avoiding the unwanted or useless solution in further. Genetic algorithms are a type of trial-and-error search technique that is guided by principles of Darwinian evolution. The genetic algorithm follows the concept of living organisms in natural evolution, but considering the string values following selection, mutation and reproduction. GAs start with a pool of randomly-generated candidate solutions which are then tested and scored with respect to their utility. Solutions are then bred by probabilistically selecting high quality parents and recombining their genetic representations to produce offspring solutions. Offspring are typically subjected to a small amount of random mutation. The process of following selection, mutation and recombination must be enforced continuously till obtaining the acceptable solution. Genetic algorithms has its wide applications in variety of areas such as micro-biology, medicine and in almost all authorities. Parallelized versions of genetic algorithms (GAs) are popular primarily for three reasons: the GA is an inherently parallel algorithm, typical GA applications are very compute intensive, and powerful computing platforms, especially Beowulf-style computing clusters, are becoming more affordable and easier to implement. In addition, the low communication bandwidth required allows the use of inexpensive networking hardware such as standard office Ethernet. In our work, we have the center of attention to perform the data communication without any packet data loss and sustains the system implementation in the best manner. The time complexity of Combined-KKT-GA is low, resulting in a preferred candidate for practical implementation. We propose to combine the Cheng’s KKT driven and GA-based resource allocation schemes as follows. 1) Obtain a resource allocation solution using the Cheng’s KKT-driven approach. 2) Obtain a resource allocation solution using the GA based approach. 3) Choose the better solution out of the above two solutions. Figure 4. KKT-GA algorithm combined flowchart 6
  • 7. International journal on applications of graph theory in wireless ad hoc networks and sensor networks (GRAPH-HOC) Vol.5, No.1, March 2013 Therefore, on average, the performances of this novel approach. Combined-KKT- GA is expected to be lower bounded and upper bounded by that of the Cheng’s KKT-driven scheme and that of the GA-based scheme, respectively. 6. PERFORMANCE EVALUATION We consider a cluster with a number of wireless nodes randomly located in a 1km x 1km coverage area. We assume that the routing is predetermined so that the transmission source and destination pair of an incoming packet is known in advance In Figure. 6, there is an obvious performance gap between the system throughputs obtained from all the approaches and the data capacity. This gap is recognized to the low traffic load and resource reservation. We observe that both the system throughput and resource utilization for the proposed algorithms are improved when the traffic load increases. The proposed Combined-KKTGA approach can effectively provision QoS for real-time traffic and achieve satisfactory system throughput performance. This novel approach is also of low computational complexity, leading to a viable candidate for practical implementation Figure 5. System throughputs of the proposed scheme (Combined-KKT-GA), the GA-based scheme, the Cheng’s KKT-driven scheme for the number of links M. 7. RESULTS In a wireless communication mesh network, devoted links are used that gives the assurance of holding their own information and avoids the traffic tribulations and this mesh network is robust on the whole networks. This WMN provides the system performance, accuracy of data without any packet data loss and deliver data in a timely manner. When the data communication occurs between the client nodes, the server must be initiated in prior and intimates the client to sends the data which is shown in figure 7.Now the client is ready to transfer the files, on receiving the server ip address which is shown in figure 8. So the file transmission can be done in the client window by mentioning the appropriate file name which is shown in figure 9.The data must be received by the destination with-in a second and the file contents are transferred accurately without any significant delay. 7
  • 8. International journal on applications of graph theory in wireless ad hoc networks and sensor networks (GRAPH-HOC) Vol.5, No.1, March 2013 Figure6. The sever started message box Figure 7. Output response given by the server message box Figure 8. Client side window 8
  • 9. International journal on applications of graph theory in wireless ad hoc networks and sensor networks (GRAPH-HOC) Vol.5, No.1, March 2013 Figure 9. After specifying file name, the client transfers content to the server Figure 10. The Destination side window 8. CONCLUSION In this work, by combining the intrinsic worth of KKT algorithm and genetic algorithm that facilitates professional QOS provisioning in the intra cluster packet level. This combined algorithm is proposed for the joint power subcarrier- time intra-cluster resource allocation problem in WMNs. This proposed approach provides reliability, privacy, security that makes fault identification and fault isolation easily. It is concluded that, this approach achieves a preferred stability between system implementation and computational convolution. 9
  • 10. International journal on applications of graph theory in wireless ad hoc networks and sensor networks (GRAPH-HOC) Vol.5, No.1, March 2013 9. REFERENCES [1] C. Y. Wong, R. S. Cheng, K. B. Lataief, and R. D. Murch, “Multiuser OFDM with adaptive subcarrier, bit, and power allocation," IEEE J.Select. Areas Commun. vol. 17, no. 10, pp. 1747-1758, Oct. 1999. [2] D. S. W. Hui, V. K. N. Lau, and W. H. Lam, “Cross-layer design for OFDMA wireless systems with heterogeneous delay requirements,”IEEE Trans. Wireless Commun., vol. 6, pp. 2872–2880, Aug. 2007. [3] G. C. Song, “Cross-layer resource allocation and scheduling in wireless multicarrier networks,” Ph.D. dissertation, Georgia Institute of Technology, 2005. [4] H. T. Cheng, H. Jiang, and W. Zhuang, “Distributed medium access control for wireless mesh networks," Wireless Commun. Mobile Computing, vol. 6, no. 6, pp. 845-864, Sept. 2006. [5] H. T. Cheng and W. Zhuang, “Pareto optimal resource management for wireless mesh networks with QoS assurance: joint node clustering and subcarrier allocation," IEEE Trans. Wireless commun., in press. [6] H. Yin and H. Liu, “An efficient multiuser loading algorithm for OFDM based broadband wireless systems," in Proc.IEEE Globecom’00, vol. 1, 2000, pp. 103-107. [7] L. Gao and S. Cui, “Efficient subcarrier, power, and rate allocation with fairness consideration for OFDMA uplink,"IEEE Trans. WirelessCommun., vol. 7, no. 5, pp. 1507-1511, May 2008. [8] M. Andrews, K. Kumar an, K. Ramanan, A. Stolyar, P. Whiting, and. Vijayakumar, “Providing quality of service Over a shared wireless link,” IEEE Commun. Mag., vol. 2, pp. 150–154, Feb. 2001. [9] M. Mitchell, An Introduction to Genetic Algorithms. Cambridge, MA:The MIT Press, 1998. [10] Y. Yu and W. Zhou, “Resource allocation for OFDMA system based on genetic algorithm,” in Proc. IEEE IWCLD’2007, vol. 10, Tai’an, China,Sep. 2007, pp. 65–69. BIOGRAPHIES K.Senthamil Selvan has completed his B.E. in the faculty of ECE and M.E. in the area of Applied Electronics. He is currently a research scholar in the department of Electronics and Communication Engineering at St. Peter’s University, Avadi, Chennai. He is an Assistant Professor in the dept. of ECE at Dhanalakshmi College of Engineering, Chennai. He shows interest in the areas of Wireless Communication, Embedded system design and Image processing. B.Lakshmi Dhevi has completed her B.E. in the faculty of Computer Science and Engineering (CSE), M.E. in the area of Computer Science and Engineering. She shows interest in the areas of Wireless sensor networks, Cloud Computing and Image processing. 10