Вы находитесь на странице: 1из 3

Bonfring International Journal of Software Engineering and Soft Computing, Vol. 9, No.

1, March 2019 17

Different Traffic Profiles for Wireless Network


A. Kavitha and Dr.D. Ayya Muthu Kumar

Abstract--- Wireless sensor network have been widely reasons. In current networking scenarios, middle boxes are
researched for use in both military and commercial more and more common. Wi-Fi presents preliminary results
application. In the view of interest there is a need to capture of our ongoing work on the monitoring and measurement of
and categorize the details of traffic and to trace the packets the performance of real operational wireless networks in the
that are effectively under different operational networks. The presence of middle boxes. Wi-Fi performance parameters of
motivation is to capture traffic and the packet of data from interest can obtain completely different values when measured
sensor nodes and analysis the network in a meaningful with different tools and methodologies. Reason for the status
manner. Specially the traffic generated by the wireless sensor of real and large scale wireless networks is not always easy.
network by setting up two different commonly used networks. Presence of network middle boxes is more and more used in
The data traffic between the nodes were captured oven an real operational wireless networks.
period. Using the captured information the detailed Liu Bo; suggests that the requirements of traffic signal
information of a packet is shown in the network. The results control, a new wireless traffic signal control system are
that are shown are the packet is traced from the network in the developed. On the existing, several kinds of wireless
form of record. The packets are traced when the simulation of
communication are compared and choose the most of them
Wimax network is processed. dictate the most suitable for application in traffic controller
Keywords--- WIMAX Networks, MSTR Model, QoS technology in them. Traffic jam is one of the important
Parameters, Packet based. problems in big cities, it not only lead people's travel to
anxiety, but also damage the urban environment and increased
traffic accident. Intelligent traffic control system is an
I. INTRODUCTION AND SCOPE effective measure to resolve the problem of traffic jam.

N ETWORK security consists of the presentation and the


schedule adopted by the network administrator to prevent
and monitor unauthorized access. Network security covers a
Intelligent traffic control system using high-tech make
traditional traffic mode become more intelligent, more
security, and energy saving and high Efficiency.
variety of computer networks both public and private that are Sebastien Doirieux; suggests that a simple and accurate
used for transaction and communication among business. It analytical model for performance evaluation of WiMAX
involves authorization of access to data in the network. networks With multiple traffic profiles are evaluated based on
WiMAX (Worldwide Interoperability for Microwave Access) the traffic promising access technology has been planned to
is a broadband wireless access technology which is based on support numerous kinds of applications having different traffic
IEEE standard 802.16. In order to board various traffic types, characteristics. One of the Quality of Service (QoS)
different service categories have been introduced for WiMAX parameters considered by the standard for traffic classes is the
networks.A detailed account of simulation based BE traffic maxim urn sustained traffic rate , which is an upper bound for
performance evaluations in WiMAX networks are done. user throughput. Worldwide Interoperability for Microwave
In this packet are traced based on the network where the Access is a broadband wireless access technology, which is
packets are transmitting is mainly based on the signal and the based on IEEE standard 802.16. The first operative version of
communication that are nearer to network. In this packet are IEEE 802.16 is 802.16-2004. It was followed by a ratification
transmitted based on the signal that are processed in the of amendment IEEE 802.16e in 2005. A new standard,
network.NS2 is a network simulator used for transmitting the 802.16m, is currently under definition for providing even
packet. If the network is not efficient the packet that are higher efficiency. Taking into account limited achievable user
transmitting will have a loss of packet ratio based on their data rate is an important challenge while dimensioning a
quality and the efficient that performed by the network. In this wireless network.
packet dropping is should be reduced based on their network Kitti Wongthavarawa; describes that future Department
that are efficient and effective in the process of Defense weighting concepts leverage information
superiority and will require vast improvements in information
II. LITERATURE SURVEY raiser in rams of higher bandwidth, Quality of Service (QoS)
Alessio Botta; describes the monitoring and measurement support and connection or a high speed backbone. Due or the
of wireless networks play an important role for a number of diverse multimedia raffle with different priorities and QoS
requirements, if is a well know fact that if is imperative to
provide QoS support in military networks. However, the IEEE
A. Kavitha, PG Scholar, Department of CSE, K.S.Rangasamy College of 802.16 provides only neither signaling mechanisms, but does
Technology, Tiruchengode. E-mail: kavithaasokan4@gmail.com
Dr.D. Ayya Muthu Kumar, Professor, Department of CSE, not specify any scheduling or admission control algorithmic
K.S.Rangasamy College of Technology, Tiruchengode. run automatically provide QoS support. The proposed solution
DOI:10.9756/BIJSESC.9008

ISSN 2277-5099 | © 2019 Bonfring


Bonfring International Journal of Software Engineering and Soft Computing, Vol. 9, No. 1, March 2019 18

that is practical and comparable to the IEEE 802.16 standard ON/OFF elastic traffic. An ON period corresponds to the
provides QoS support far different Raffle classes. To the, best download of an element. The downloading duration depends
of our knowledge to refers such algorithm. on the system load and the radio link quality, so ON periods
Ashish Raniwal; suggests that even though multiple non- must be characterized by their size. An OFF period
overlapped channels exist In the 2.4GHz and 5GHz spectrum. corresponds to the reading time of the last downloaded
Most 802.11-based multi-hop ad hoc networks today use only element, and is independent of the system load.
a single channel. Networks rarely can fully exploit the cluster Performance Analysis
bandwidth available in the radio spectrum provisioned by the The performance analysis of the implemented proposal is
standards. We propose a multi-channel wireless mesh network analyzed. Various QoS parameters like delay, bandwidth, and
(WMN) architecture that equips each mesh network node with overhead are considered. The results are plotted as Xgraphs.
multiple 802.11 Network interface cards (NICs). The central The performance is calculated based on their throughput.
plan Issues of this multi-channel WMN architecture are
channel assignment and routing. Show that Intelligent channel IV. CONCLUSION
responsibility is critical to Hyaline’s performance, present
distributed algorithms that Utilize only local traffic load The wireless network is used to trace the packet available
statistics to dynamically assign channels and to route packets, in the network. To trace a packet in the network we need a
and collects their performance against a centralized algorithm tool. With the help of the tool trace the packet available in the
that execute the same functions. The maximum link layer data network. The result is provided that the packets are traced
rate falls quickly with enlarge distance between the transmitter when the simulations are performed. In the future a wide range
and the receiver. The bandwidth problem is further aggravated of application areas will make sensor networks and integral
for multi-hop ad hoc networks due to interference from part of our lives. As deployment of WiMAX networks is
adjacent hops on the same parch as well as from neighboring underway, need arises for operators and manufacturers to
paths. Fortunately, the 802.1 lb/g standards and a standard develop dimensioning tools. In this paper, we have presented
provide 3 and 12 non-overlapped frequency channels, an analytical model for WiMAX networks taking into account
respectively, which could be used simultaneously within a multiple data traffic profiles and the QoS parameter MSTR
neighborhood. Capacity to utilize multiple channels defined by the standard. Our model, based on a product-form
substantially increases the successful bandwidth available to closed queuing network, is able to instantaneously provide
wireless network nodes. Erlang-like performance parameters such as throughput per
user for each profile or channel utilization
III. IMPLEMENTATION The main goal beyond the conclusion is to trace a packet
Execution is the stage in the project where the theoretical that are available in the wireless network when the simulation
plan is turned into a working system and is giving confidence is performed trace the packet based on the traffic or a signal
on the new system for the users, which it will work logically that are related to the wireless network.
and effectively. It involves careful planning, investigation of
the current system and its constraints on execution, design of ACKNOWLEDGEMENT
methods to achieve the change over, an evaluation, of change We acknowledge DST-File No.368. DST-FIST
over methods. (SR/FIST/College-235/2014 dated 21-11-2014) for financial
Implementation of WIMAX Networks support and DBT – STAR – College-Scheme ref. no:
BT/HRD/11/09/2018 for providing infrastructure support.
WIMAX is a network of mobile users has implemented.
Nodes are randomly deployed in the network area. IEEE REFERENCES
standard of 802.16 is configured with each and every node of
[1] B. Alessio and A. Pescapé, “Monitoring and measuring wireless network
the network. Nodes are moving in the network area. The performance in the presence of middle boxes”, Eighth International
wimax channels are allocated between the nodes. Links are Conference on Wireless On-Demand Network Systems and Services,
established in the network. Multimedia data are generated to Pp. 146-149, 2011.
transmit across the network. [2] C.K. Anuraj and S. Joseph, “Analytical Study on encryption Techniques
and Challenges in Network Security”, IEEE 24th International
Implementation of Traffic Sources to WIMAX Conference on Advanced Information Networking and Applications
Workshops, 2010, 589-592.
Traffic source for the wimax network is implemented. [3] S. Arun Kumar, “Security and Management in Network: Security of
Unlike normal mobile ad hoc networks, multimedia data are to Network Management versus Management of Network Security (SNM
be transmitted through the network. A video file is chosen and Vs MNS)”, International Journal Of Computer Science And Network
Security, Vol. 17, No. 5, Pp. 166-173, 2017.
converted as video frames that comprises of various frames [4] R. Ashish, and T. Chiueh, “Architecture and algorithms for an IEEE
like I, P frames. These frames are broadcasted across the 802.11-based multi-channel wireless mesh network”, Proceedings IEEE
network using the established wimax links. 24th Annual Joint Conference of the IEEE Computer and
Communications Societies, Vol. 3, Pp. 2223-2234, 2005.
Implementation of Proposed MSTR Model [5] W. Kitti and A. Ganz, “IEEE 802.16 based last mile broadband wireless
military networks with quality of service support”, In IEEE Military
MSTR is a model where we assume that each mobile sends
Communications Conference, Vol. 2, Pp. 779-784, 2003.
feedback channel estimation on a frame by frame basis. Each [6] B. Taimur and B. Ghita, “OpenFlow-enabled user traffic profiling in
of the N mobiles is assumed to create an infinite length campus software defined networks”, IEEE 12th International

ISSN 2277-5099 | © 2019 Bonfring


Bonfring International Journal of Software Engineering and Soft Computing, Vol. 9, No. 1, March 2019 19

Conference on Wireless and Mobile Computing, Networking and


Communications (WiMob), Pp. 1-8, 2016.
[7] B. Vucetic, O. Al-Khatib and W. Hardjawana, “Traffic Modeling and
Performance Evaluation Of wireless Smart Grid Networks”, IEEE 25th
Annual International Symposium on Personal, Indoor, and Mobile Radio
Communication (PIMRC), Pp. 265-271, 2016.
[8] D. Sebastien, B. Baynat, M. Maqbool and M. Coupechoux, “An
analytical model for WiMAX networks with multiple traffic profiles and
throttling policy”, 7th International Symposium on Modeling and
Optimization in Mobile, Ad Hoc, and Wireless Networks, Pp. 1-8, 2009.
[9] S. Dmitry, N. Bayer, B. Xu, V. Rakocevic and J. Habermann, “Internet
traffic performance in IEEE 802.16 networks”, 12th European Wireless
Conference 2006-Enabling Technologies for Wireless Multimedia
Communications, Pp. 1-5, 2006.
[10] K. Inderpreet and A.L.N. Rao, “A Framework to improve the Network
Security with Less Mobility in MANET”, International Journal of
Computer Applications, Vol. 167, No. 10, Pp. 1-4, 2017.
[11] X.A. Spyros, N. Passas and L. Merakos, “Flexible resource allocation in
IEEE 802.16 wireless metropolitan area networks”, 14th IEEE
Workshop on Local & Metropolitan Area Networks, Pp.111-116, 2005.
[12] B. Liu and Z. Fusheng, “Traffic signal control system based on wireless
technology”, Third International Conference on Intelligent System
Design and Engineering Applications, Pp. 1578-1580, 2013.

ISSN 2277-5099 | © 2019 Bonfring

Вам также может понравиться