Measuring the Performance of Call Admission Control in Two Tier Wireless Cellular Communication Networks

نویسندگان

  • Sumit kumar srivastava
  • Dharmendra Kumar Gupta
چکیده

A mobile ad hoc network (MANET) is a spontaneous network that can be established with no fixed infrastructure. This means that all its nodes behave as routers and take part in its discovery and maintenance of routes to other nodes in the network. Its routing protocol has to be able to cope with the new challenges that a MANET creates such as nodes mobility, security maintenance, quality of service, limited bandwidth and limited power supply. These challenges set new demands on MANET routing protocols. With the increasing interest in MANETs, there has been a greater focus on the subject of securing such networks. Out of the many discussions and research groups discussing the different security issues in the field of mobile ad hoc networks, many papers have been written describing different proposed secure routing protocols that defend against malicious nodes’ attacks that MANETs face. However, the majority of these MANET secure routing protocols did not provide a complete solution for all the MANETs’ attacks and assumed that any node participating in the MANET is not selfish and that it will cooperate to support different network functionalities. Recently, researchers started to study selfish nodes and their effects on mobile ad hoc networks. That resulted in creating a new thread of research in the MANET field. A number of research papers discussing different cooperation enforcement schemes for detecting and defending against selfish nodes and their disturbance to mobile ad hoc networks were published. Still none of these proposed cooperation enforcement schemes were based on any existing MANET secure routing protocols. All of these proposed schemes were based on routing protocols with no security measures at all. My research strategy is to choose one of the secure routing protocols according to its security-effectiveness, study it and analyze its functionality and performance. The authenticated routing for ad hoc networks (ARAN) secure routing protocol was chosen for analysis. Then, the different existing cooperation enforcement schemes were surveyed so that to come up with a reputation-based scheme to integrate with the ARAN protocol. The result of that integration is called: Reputed-ARAN. Consequently, Reputed-ARAN is capable of handling both selfish and malicious nodes’ attacks. Also, the Glomosim simulation package was chosen to carry out the experimental part of this thesis work. The results of the experiments showed that in the presence of 30% selfish nodes and with node mobility of 10 m/s, the newly proposed Reputed-ARAN protocol improves network throughput to 63.1%, from 38.8% network throughput provided by normal ARAN. This improvement is obtained at the cost of a higher overhead percentage with minimal increase in the average number of hops. The main contribution in this thesis: Reputed-ARAN proves to be more efficient and more

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Two-Threshold Guard Channel Scheme for Minimizing Blocking Probability in Communication Networks

In this paper, we consider the call admission problem in cellular network with two classes of voice users. In the first part of paper, we introduce a two-threshold guard channel policy and study its limiting behavior under the stationary traffic. Then we give an algorithm for finding the optimal number of guard channels. In the second part of this paper, we give an algorithm, which minimizes th...

متن کامل

Adaptive call admission control and resource allocation in multi server wireless/cellular network

The ever increasing demand of the subscribers has put pressure on the capacity of wireless networks around the world. To utilize the scare resources, in the present paper we propose an optimal allocation scheme for an integrated wireless/cellular model with handoff priority and handoff guarantee services. The suggested algorithm optimally allocates the resources in each cell and dynamically adj...

متن کامل

On Joint Sub-channel Allocation, Duplexing Mode Selection, and Power Control in Full-Duplex Co-Channel Femtocell Networks

As one of the promising approaches to increase the network capacity, Full-duplex (FD) communications have recently gained a remarkable attention. FD communication enables wireless nodes to simultaneously send and receive data through the same frequency band. Thanks to the recent achievements in the self-interference (SI) cancellation, this type of communication is expected to be potentially uti...

متن کامل

Call Admission Control for Two - Tier LTE Macro / Pico Cellular Networks

The demands for traffic and services through the mobile networks are ever increasing. Multi-tier has become a major trend in the design of new generations of mobile networks such as advanced long term evolution ( LTE-A) networks in order to support the high capacity demand required for multiservice traffic in wireless networks. Picocell emerged as one of the key radio access techniques for LTE-...

متن کامل

Fuzzy Neural Networks for Channel Management in Heterogeneous Wireless Cellular Networks

In this paper, adaptive channel management approach fuzzy neural networks in heterogeneous wireless cellular networks (ACM-FNN) is presented to efficient resource allocation, and admission control schemes are needed to guarantee quality-of-service (QoS) for differentiated services. The channel management in a two-tier such as micro cell or macro cell wireless cellular networks. Effective reliab...

متن کامل

Adaptive Radio Resource Management in Heterogeneous Wireless Networks

In this paper, adaptive channel management approach fuzzy neural networks in heterogeneous wireless networks (ACM-FNN) is presented to efficient resource allocation, and admission control schemes are needed to guarantee quality-of-service (QoS) for differentiated services. The channel management in a two-tier such as micro cell or macro cell wireless networks. Effective reliability and efficien...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012