Professional Documents
Culture Documents
1, March 2019 17
Abstract--- Wireless sensor network have been widely reasons. In current networking scenarios, middle boxes are
researched for use in both military and commercial more and more common. Wi-Fi presents preliminary results
application. In the view of interest there is a need to capture of our ongoing work on the monitoring and measurement of
and categorize the details of traffic and to trace the packets the performance of real operational wireless networks in the
that are effectively under different operational networks. The presence of middle boxes. Wi-Fi performance parameters of
motivation is to capture traffic and the packet of data from interest can obtain completely different values when measured
sensor nodes and analysis the network in a meaningful with different tools and methodologies. Reason for the status
manner. Specially the traffic generated by the wireless sensor of real and large scale wireless networks is not always easy.
network by setting up two different commonly used networks. Presence of network middle boxes is more and more used in
The data traffic between the nodes were captured oven an real operational wireless networks.
period. Using the captured information the detailed Liu Bo; suggests that the requirements of traffic signal
information of a packet is shown in the network. The results control, a new wireless traffic signal control system are
that are shown are the packet is traced from the network in the developed. On the existing, several kinds of wireless
form of record. The packets are traced when the simulation of
communication are compared and choose the most of them
Wimax network is processed. dictate the most suitable for application in traffic controller
Keywords--- WIMAX Networks, MSTR Model, QoS technology in them. Traffic jam is one of the important
Parameters, Packet based. problems in big cities, it not only lead people's travel to
anxiety, but also damage the urban environment and increased
traffic accident. Intelligent traffic control system is an
I. INTRODUCTION AND SCOPE effective measure to resolve the problem of traffic jam.
that is practical and comparable to the IEEE 802.16 standard ON/OFF elastic traffic. An ON period corresponds to the
provides QoS support far different Raffle classes. To the, best download of an element. The downloading duration depends
of our knowledge to refers such algorithm. on the system load and the radio link quality, so ON periods
Ashish Raniwal; suggests that even though multiple non- must be characterized by their size. An OFF period
overlapped channels exist In the 2.4GHz and 5GHz spectrum. corresponds to the reading time of the last downloaded
Most 802.11-based multi-hop ad hoc networks today use only element, and is independent of the system load.
a single channel. Networks rarely can fully exploit the cluster Performance Analysis
bandwidth available in the radio spectrum provisioned by the The performance analysis of the implemented proposal is
standards. We propose a multi-channel wireless mesh network analyzed. Various QoS parameters like delay, bandwidth, and
(WMN) architecture that equips each mesh network node with overhead are considered. The results are plotted as Xgraphs.
multiple 802.11 Network interface cards (NICs). The central The performance is calculated based on their throughput.
plan Issues of this multi-channel WMN architecture are
channel assignment and routing. Show that Intelligent channel IV. CONCLUSION
responsibility is critical to Hyaline’s performance, present
distributed algorithms that Utilize only local traffic load The wireless network is used to trace the packet available
statistics to dynamically assign channels and to route packets, in the network. To trace a packet in the network we need a
and collects their performance against a centralized algorithm tool. With the help of the tool trace the packet available in the
that execute the same functions. The maximum link layer data network. The result is provided that the packets are traced
rate falls quickly with enlarge distance between the transmitter when the simulations are performed. In the future a wide range
and the receiver. The bandwidth problem is further aggravated of application areas will make sensor networks and integral
for multi-hop ad hoc networks due to interference from part of our lives. As deployment of WiMAX networks is
adjacent hops on the same parch as well as from neighboring underway, need arises for operators and manufacturers to
paths. Fortunately, the 802.1 lb/g standards and a standard develop dimensioning tools. In this paper, we have presented
provide 3 and 12 non-overlapped frequency channels, an analytical model for WiMAX networks taking into account
respectively, which could be used simultaneously within a multiple data traffic profiles and the QoS parameter MSTR
neighborhood. Capacity to utilize multiple channels defined by the standard. Our model, based on a product-form
substantially increases the successful bandwidth available to closed queuing network, is able to instantaneously provide
wireless network nodes. Erlang-like performance parameters such as throughput per
user for each profile or channel utilization
III. IMPLEMENTATION The main goal beyond the conclusion is to trace a packet
Execution is the stage in the project where the theoretical that are available in the wireless network when the simulation
plan is turned into a working system and is giving confidence is performed trace the packet based on the traffic or a signal
on the new system for the users, which it will work logically that are related to the wireless network.
and effectively. It involves careful planning, investigation of
the current system and its constraints on execution, design of ACKNOWLEDGEMENT
methods to achieve the change over, an evaluation, of change We acknowledge DST-File No.368. DST-FIST
over methods. (SR/FIST/College-235/2014 dated 21-11-2014) for financial
Implementation of WIMAX Networks support and DBT – STAR – College-Scheme ref. no:
BT/HRD/11/09/2018 for providing infrastructure support.
WIMAX is a network of mobile users has implemented.
Nodes are randomly deployed in the network area. IEEE REFERENCES
standard of 802.16 is configured with each and every node of
[1] B. Alessio and A. Pescapé, “Monitoring and measuring wireless network
the network. Nodes are moving in the network area. The performance in the presence of middle boxes”, Eighth International
wimax channels are allocated between the nodes. Links are Conference on Wireless On-Demand Network Systems and Services,
established in the network. Multimedia data are generated to Pp. 146-149, 2011.
transmit across the network. [2] C.K. Anuraj and S. Joseph, “Analytical Study on encryption Techniques
and Challenges in Network Security”, IEEE 24th International
Implementation of Traffic Sources to WIMAX Conference on Advanced Information Networking and Applications
Workshops, 2010, 589-592.
Traffic source for the wimax network is implemented. [3] S. Arun Kumar, “Security and Management in Network: Security of
Unlike normal mobile ad hoc networks, multimedia data are to Network Management versus Management of Network Security (SNM
be transmitted through the network. A video file is chosen and Vs MNS)”, International Journal Of Computer Science And Network
Security, Vol. 17, No. 5, Pp. 166-173, 2017.
converted as video frames that comprises of various frames [4] R. Ashish, and T. Chiueh, “Architecture and algorithms for an IEEE
like I, P frames. These frames are broadcasted across the 802.11-based multi-channel wireless mesh network”, Proceedings IEEE
network using the established wimax links. 24th Annual Joint Conference of the IEEE Computer and
Communications Societies, Vol. 3, Pp. 2223-2234, 2005.
Implementation of Proposed MSTR Model [5] W. Kitti and A. Ganz, “IEEE 802.16 based last mile broadband wireless
military networks with quality of service support”, In IEEE Military
MSTR is a model where we assume that each mobile sends
Communications Conference, Vol. 2, Pp. 779-784, 2003.
feedback channel estimation on a frame by frame basis. Each [6] B. Taimur and B. Ghita, “OpenFlow-enabled user traffic profiling in
of the N mobiles is assumed to create an infinite length campus software defined networks”, IEEE 12th International