3.Rapport Activite Pub

188
Papiers publiés dans des JOURNAUX ISI ( Institute for Scientific Information) 1. Ridha Ouni, Jamila Bhar and Kholdoun Torki, A new scheduling protocol design based on deficit weighted round robin for QoS support in IP networks, Journal of Circuits, Systems, and Computers, Vol. 22, No. 3 (2013) (21 pages). 2. Ridha Ouni, Dynamic slot assignment protocol for QoS support on TDMA-based mobile networks, Computer Standard and Interfaces, Vol.34, No.1, pp.146-155, 2012. 3. M. Z. Hourani, Ridha Ouni, Efficient data harvesting for inelastic traffic in vehicular sensor networks, Science international, 24(1), pp13-19, 2012. 4. Monji Zaidi, Ridha Ouni, Rached Tourki, Wireless propagation channel modeling for optimized handoff algorithms in wireless LANs, Computer and Electrical Engineering, Vol 37, (2011), pp 941- 957. Sous reserve de correction 5. Ridha Ouni, Rafik Louati, Enhanced AODV routing protocol for energy-efficiency in wireless sensor networks, under revision for the Journal of Circuits, Systems, and Computers (JCSC), 2014.

Transcript of 3.Rapport Activite Pub

Papiers publiés dans des

JOURNAUX ISI ( Institute for Scientific Information)

1. Ridha Ouni, Jamila Bhar and Kholdoun Torki, A new scheduling protocol design based on deficit

weighted round robin for QoS support in IP networks, Journal of Circuits, Systems, and Computers,

Vol. 22, No. 3 (2013) (21 pages).

2. Ridha Ouni, Dynamic slot assignment protocol for QoS support on TDMA-based mobile networks,

Computer Standard and Interfaces, Vol.34, No.1, pp.146-155, 2012.

3. M. Z. Hourani, Ridha Ouni, Efficient data harvesting for inelastic traffic in vehicular sensor networks,

Science international, 24(1), pp13-19, 2012.

4. Monji Zaidi, Ridha Ouni, Rached Tourki, Wireless propagation channel modeling for optimized

handoff algorithms in wireless LANs, Computer and Electrical Engineering, Vol 37, (2011), pp 941-

957.

Sous reserve de correction

5. Ridha Ouni, Rafik Louati, Enhanced AODV routing protocol for energy-efficiency in wireless sensor

networks, under revision for the Journal of Circuits, Systems, and Computers (JCSC), 2014.

A NEW SCHEDULING PROTOCOL DESIGN BASED ON

DEFICITWEIGHTEDROUNDROBIN FORQoS SUPPORT IN

IP NETWORKS¤

RIDHA OUNI†,¶, JAMILA BHAR‡ and KHOLDOUN TORKI§

†College of Computer and Information Sciences,

King Saud University, Riyadh 11543, Kingdom of Saudi Arabia

‡Faculty of Sciences of Monastir, Tunisia

§CMP, INPG, Grenoble, France¶[email protected]

Received 23 March 2012Accepted 4 October 2012

Published 21 February 2013

We present a study of the e®ects of active queue management (AQM) on the average queue size

in routers. In this work, three prominent AQM schemes are considered: packet classi¯cation,checking service level agreements (SLA) and queue scheduling. This paper presents several

adaptive resource sharing models that use a revenue criterion to allocate bandwidth in an

optimal way. The models ensure QoS requirements of data °ows and, at the same time, max-

imize the total revenue by adjusting parameters of the underlying schedulers. De¯cit roundrobin (DRR) and de¯cit weighted round robin (DWRR) scheduling techniques have shown their

ability in providing fair and weighted sharing of network resources for network devices. How-

ever, they are unable to use the total allocated network bandwidth even in burst tra±c. In thispaper, we propose a negative-de¯cit weighted round robin (N-DWRR) technique as a new

packet scheduling discipline to improve the bandwidth utilization rate without increasing the

total latency. A fully hardware packet scheduler has been implemented and veri¯ed as part of an

intellectual property core. This is motivated by the fact that the design and analysis of hard-ware/software architectures for such techniques requires new models and methods, which do not

fall under the domain of traditional embedded-systems design.

Keywords: Scheduling; DWRR; QoS; distributed queue; di®erentiated service; AQM; ASIC.

1. Introduction

Routers, even with their basic \store-and-forward" functionality can be considered

as \packet processors", and this is still their default behavior in IP-based networks.

However, with networks extensively growing in size, and the Internet shifting from

a research network into the one being used for commerce, communication,

*This paper was recommended by Regional Editor Eby G. Friedman.

Journal of Circuits, Systems, and ComputersVol. 22, No. 3 (2013) 1350012 (21 pages)

#.c World Scienti¯c Publishing Company

DOI: 10.1142/S0218126613500126

1350012-1

J C

IRC

UIT

SY

ST C

OM

P D

ownl

oade

d fr

om w

ww

.wor

ldsc

ient

ific

.com

by 4

6.23

0.82

.68

on 0

2/28

/13.

For

per

sona

l use

onl

y.

entertainment and information dissemination, routers became more and more

complex and incorporated new packet-processing functionality. The basic packet-

processing tasks at a router include:

. header parsing,

. packet classi¯cation to assign the packet a quality-of-service (QoS)-class,

. determination of the outgoing network interface (i.e., forwarding),

. checking service level agreements (SLA) (i.e., policing),

. queuing and link scheduling,

. means for implementing QoS guarantees to di®erent packet °ows.

Delivering QoS means guaranteeing given parameters within certain bounds for

connections made over a network.1 QoS can be applied di®erently to connections or

users, as well as to di®erent types of tra±c and data °ows. The parameters involved

in QoS can be classi¯ed as bandwidth, delay, jitter and packet loss. The routers must

use tra±c scheduling algorithms to serve packets carrying high-priority tra±c in

the network. Such tra±c scheduling algorithms should have low implementation

complexity and simple connection admission control to be able to operate at a high

speed. The latter increases complexity and limits the scalability of switching

systems. Thus, providing end-to-end QoS guarantees for high-priority tra±c in

a scalable and low-complexity fashion is an important issue in high-speed

communication networks.

The system presented in this paper provides guaranteed levels of QoS using

packet scheduling. The term \scheduling" encompasses a number of policies on

which decisions are made when processing packets arrive and depart from a router.2

A number of di®erent scheduling techniques exist for QoS and tra±c management.

Their main objective is to treat di®erent tra±c classes or °ows of packets with a

variable degree of priority in order to provide performance guarantees for a range of

di®erent tra±c types and pro¯les.2 Link scheduling in packet networks is an im-

portant mechanism to achieve QoS as it directly controls packet delays.3 Existing

QoS architectures like integrated services (IntServ)4 and di®erentiated services

(Di®Serv)5 rely on link scheduling to provide the di®erentiated bandwidth fairness

and delay among queues on each router. There are several tasks that any queue-

scheduling discipline should accomplish:

. Support the fair distribution of bandwidth to each of the di®erent service classes

competing for bandwidth on the output port. If certain service classes are required

to receive a larger share of bandwidth than other service classes, fairness can be

supported by assigning weights to each of the di®erent service classes.

. Furnish protection (¯rewalls) between the di®erent service classes on an output

port, so that a poorly behaved service class in one queue cannot impact the

R. Ouni, J. Bhar & K. Torki

1350012-2

J C

IRC

UIT

SY

ST C

OM

P D

ownl

oade

d fr

om w

ww

.wor

ldsc

ient

ific

.com

by 4

6.23

0.82

.68

on 0

2/28

/13.

For

per

sona

l use

onl

y.

bandwidth and delay delivered to other service classes assigned to other queues on

the same output port.

. Allow other service classes to access bandwidth that is assigned to a given service

class if the given service class is not using all of its allocated bandwidth.

. Provide an algorithm that can be implemented in hardware, so that it can arbi-

trate access to bandwidth on the highest-speed router interfaces without nega-

tively impacting system forwarding performance. If the queue-scheduling

discipline cannot be implemented in hardware, then it can be used only on the

lowest-speed router interfaces, where the reduced tra±c volume does not place

undue stress on the software implementation.

Many schedulers have been proposed to address these issues. These algorithms in-

clude weighted fair queuing (WFQ),2 weighted de¯cit earliest departure ¯rst

scheduling (WDEDF),3 frame-counter scheduling,6 resource allocation in an

IntServ/Di®Serv integrated EPON system7 and user-oriented hierarchical band-

width scheduling.8

End-to-end congestion control is widely used in the current internet to prevent

congestion collapse. However, because data tra±c is inherently bursty, routers are

provisioned with fairly large bu®ers to absorb this burstiness and maintain high-link

utilization. The random early detection (RED) technique keeps the average queue

size low while allowing occasional bursts of packets in the queue.9 It is designed to

accompany a transport-layer protocol such as TCP that avoids the global syn-

chronization of many connections while decreasing their window at the same time. In

this work, weighted RED (WRED) has been adopted and implemented because it

drops packets selectively based on IP precedence. Packets with a higher IP prece-

dence are less likely to be dropped than packets with a lower precedence. Thus,

higher priority tra±c is delivered with a higher probability than lower priority

tra±c.10

This paper focuses on three main issues pertaining to the classi¯cation, active

queue management (AQM) and scheduling for such packet processors and toward

this proposes appropriate models and algorithms. It introduces the negative

weighted de¯cit round robin (N-DWRR) scheduler, which aims to maintain the

weighted share of bandwidth among queues while reducing the queuing delay of

packets. The e®ectiveness and e±ciency of this technique, based on a performance

evaluation process, allows therefore addressing its hardware implementation. The

remainder of the paper is structured as follows. Section 2 analyzes the perceived QoS

as well as the classi¯cation disciplines in IP networks. It describes also related works

of recent scheduling algorithms. Section 3 discusses the basic operation details and

algorithm of the N-DWRR scheduler. Sections 4 and 5 present the performance

evaluation of the N-DWRR scheduler and its hardware implementation, respec-

tively. Finally, Sec. 6 concludes the paper.

A New Scheduling Protocol Design Based on DWRR

1350012-3

J C

IRC

UIT

SY

ST C

OM

P D

ownl

oade

d fr

om w

ww

.wor

ldsc

ient

ific

.com

by 4

6.23

0.82

.68

on 0

2/28

/13.

For

per

sona

l use

onl

y.

2. Background and Related Work

In this section, we describe four categories of service that e®ectively improve QoS in

networks. We present features of di®erentiated service approaches and tasks ac-

complished by scheduling disciplines. We are interested in highlighting the impact of

these techniques on the QoS in large IP networks.

2.1. Impact of statistical multiplexing on perceived QoS

QoS is the ability of a network to di®erentiate between di®erent types of tra±c and

prioritize accordingly. Voice and video are very delay-dependent and have very

predictable patterns, whereas data is very bursty and is less delay sensitive. If all

three types of tra±c occur on a network, the data tra±c usually interferes with voice

and video and causes it to be unintelligible.

QoS can e®ectively improve the usage of existing bandwidth.11,12 It deals with

four di®erent categories of services such as bandwidth, latency, jitter and loss. The

¯rst service category, bandwidth, concerns itself with how the network manages the

entire stream of data packets °owing through it, particularly in times of network

congestion. The second service category is latency, the end-to-end delay of a °ow.

Numerous applications, including voice and video, have a speci¯c end-to-end delay

budget. If a packet is delayed beyond the allocated budget, the data becomes stale or

is no longer relevant. The third category addresses the need to control jitter, the

variations in latency between packets. The ¯nal category deals with the need to

manage packet loss. As a consequence of congestion, packet loss has two purposes.

First, reducing the number of packets competing for an output link can relieve the

level of congestion. Second, when sending hosts notice that some packets are being

discarded, they usually reduce the volume of tra±c they are injecting into the

network.13

2.2. Di®erentiated service approaches in large IP networks

In the internet, three service models are studied and developed: Best-e®ort (BE)

service, Integrated service (IntServ) and Di®erentiated Service (Di®Serv).4,5 In BE

service model,14 the application program can be sent any amount of packets at any

time, and is not required to be approved in advance or notify the network. The

network provides no guarantee on packet transmission performance of reliability or

delay. The Intserv is a per-°ow oriented QoS architecture that uses the resource

reservation protocol (RSVP) for dynamical resource allocation. It provides the

guaranteed service and controlled-load service. The guaranteed service allows

guaranteeing bandwidth and delay application requirements. The controlled-load

service guarantees, when the network congestion occurs, the low delay and high pass

rate for packets. However, the Di®Serv classi¯es packets into a small number of

aggregated °ows or \classes" that provide di®erent levels of service for di®erent

R. Ouni, J. Bhar & K. Torki

1350012-4

J C

IRC

UIT

SY

ST C

OM

P D

ownl

oade

d fr

om w

ww

.wor

ldsc

ient

ific

.com

by 4

6.23

0.82

.68

on 0

2/28

/13.

For

per

sona

l use

onl

y.

classes.7 The Di®Serv model includes two services: expedited forwarding (EF) and

Assured Forwarding (AF) services. The network achieves packet classi¯cation,

tra±c shaping, tra±c policing and queuing (see Fig. 1). Di®Serv needs queuing

technology like WRED, priority queuing (PQ) and WFQ, which bu®ers and dis-

patches congested packets to accomplish queue management.

In case the IP border network adopts IntServ system, the problem of intercom-

munication between IntServ and Di®Serv must be solved, including the processing

mode of RSVP in Di®Serv domains, and the mapping between services supported by

IntServ and PHB (Per-Hop Behavior) supported by Di®Serv.

2.3. Queue-scheduling disciplines — related work

There are many di®erent queue-scheduling disciplines, each attempting to ¯nd the

correct balance between complexity, control and fairness13,15 that describe a number

of popular queue-scheduling disciplines: ¯rst-in-¯rst-out queuing (FIFO), priority

queuing (PQ), fair queuing (FQ), WFQ, weighted round-robin queuing (WRR) and

de¯cit weighted round-robin queuing (DWRR).

The WRR scheduler is a pioneer in this area yielding di®erentiated fairness among

queues. Packets, from di®erent °ows, are queued in separate queues and the

scheduler polls each queue in a cyclic manner in proportion to a weight pre-assigned

to each queue (see Fig. 1). WRR performs well when all packets have the same size.16

The de¯cit round-robin (DRR)17 scheduler is a modi¯cation of the WRR scheduler

that handles variable packet sizes without knowing the mean packet size of each °ow

in advance. The DRR scheduler provides near-perfect throughput fairness and °ow

isolation at low implementation cost. The DWRR scheduler is a variation of the

DRR scheduler and provides unfair bandwidth allocation to di®erent queues in the

scheduler. Di®erent queues are allocated a di®erent quantum value using a propor-

tionally weighted function.

RED dropper

Shaper

Shaper

Meter RED dropper

Marker

Sche

dule

r

Data Data EF Queue

AF Queue

BF Queue

Cla

ssif

ier

DSC

P pr

eced

ence

Classification AQM Scheduling

Fig. 1. Architecture of the weighted round-robin schedulers based on the IntServ/Di®Serv integration.

A New Scheduling Protocol Design Based on DWRR

1350012-5

J C

IRC

UIT

SY

ST C

OM

P D

ownl

oade

d fr

om w

ww

.wor

ldsc

ient

ific

.com

by 4

6.23

0.82

.68

on 0

2/28

/13.

For

per

sona

l use

onl

y.

Recently, Ref. 7 proposed to apply IntServ model in Di®Serv-based EPON

(Ethernet passive optical network), which uses per-°ow processing to guarantee QoS.

A combined Di®Serv and IntServ model is employed in an EPON system, with a

dynamic bandwidth allocation algorithm to provide more °exible user-oriented

service quality. Later, Ref. 8 proposed new User-oriented Hierarchical bandwidth

Scheduling Algorithms (UHSAs) that support Di®Serv and guaranteed fairness

among end users.8 Includes inter and intra-optical network unit (ONU) scheduling

processes. The inter-ONU scheduling adopts an improved hybrid cycle approach that

separates a frame into a static part for high priority tra±c and an adaptive dynamic

part for low priority tra±c. The intra-ONU scheduling proposes credit-based

scheduling approach to guarantee fairness among end users.

For implementation bene¯ts and due to the °exible and scalable modular circuit

design approach, certain circuit architecture can be targeted for a full ASIC imple-

mentation. Thus, Ref. 2 proposed a full hardware implementation of a WFQ packet

scheduler in order to deliver 50Gb/s throughput. The circuit comprises three main

components; a WFQ algorithm computation circuit, a tag/time-stamp sort and re-

trieval circuit and a shared bu®er. However, the overall performance of the WFQ

circuit is limited by the technology available on the development board, particularly

the memory bus between the FPGA and the RLDRAM II.

This paper proposes a new scheduling technique, called Negative-DWRR, to meet

the DWRR limitations and improve the bandwidth utilization rate without in-

creasing the total latency. Then, a fully hardware packet scheduler is implemented

and veri¯ed as part of an intellectual property core.

3. Negative De¯cit Weighted Round-Robin Scheduler

In this section, we propose a new approach for a queue-scheduling discipline. This

approach, called Negative-de¯cit weighted round robin, is an extended technique

from the DWRR and WRR models.

3.1. WRR and DWRR limitations

WRR and DWRR models support °ows with signi¯cantly di®erent bandwidth

requirements. They ensure that lower-priority queues are not denied access to bu®er

space and output port bandwidth.13 However, WRR's inability to support the pre-

cise allocation of bandwidth when scheduling variable-length packets is a critical

limitation that needs to be addressed. In DWRR, several packets at the head of a

visited queue are not serviced and they would wait the next round robin only because

their sizes are slightly higher than the permitted byte number. Consequently, these

packets may be delayed before they can be serviced. The amount of delay, introduced

during a round needed for scheduling the other queues, causes QoS degradation. It

may cause the dropping of packets placed at the tail of the queue. Moreover, this

R. Ouni, J. Bhar & K. Torki

1350012-6

J C

IRC

UIT

SY

ST C

OM

P D

ownl

oade

d fr

om w

ww

.wor

ldsc

ient

ific

.com

by 4

6.23

0.82

.68

on 0

2/28

/13.

For

per

sona

l use

onl

y.

problem reduces packet throughput, increases end-to-end delay, causes jitter, and

can lead to packet loss if there is insu±cient bu®er memory to store all of the packets

that are waiting to be transmitted.

3.2. Negative DWRR parameters

The N-DWRR queue-scheduling discipline is proposed to address the limitations of

WRR and DWRR models and improve especially the bandwidth utilization rate

without increasing the total latency. It de¯nes new parameters that ¯rst allow in

supporting the weighted fair distribution of bandwidth when servicing queues that

contain variable-length packets. Secondly, they reduce the waiting delay for a packet

in a queue even if its size is large. This gives a precise allocation of bandwidth. In

N-DWRR queuing, each queue is con¯gured with the following parameters:

. A weight re°ects the importance of the service class routed over the queue. It

de¯nes the percentage of the output port bandwidth allocated to the queue. When

the weight of a queue is high, the number of bytes permitted for transmission is

high.

. A quantum of service is proportional to the weight of the queue and is expressed

in terms of bytes. Each round, the quantum is added to the number of bytes that a

queue can transmit.

. A credit is the number of bytes permitted for transmission but they are not yet

transmitted in the previous round. i.e., a queue that was not permitted to transmit

in the previous round, because the packet at the head of the queue was larger than

the value of the permitted bytes, could save transmission \credits" and use them

during the next service round.

. A negative credit is the number of bytes transmitted in the previous round over

the number of permitted bytes. The negative credit for a queue should not exceed

the sum of credits of all the queues.

. A de¯cit-counter speci¯es the total number of bytes that the queue is permitted

to transmit each time that it is visited by the scheduler. The De¯cit-Counter for a

queue is incremented by the quantum each time that the queue is visited by the

scheduler. It depends also on the values of the credit and the negative credit

parameters.

3.3. Negative DWRR algorithm

In the N-DWRR algorithm, the scheduler visits each nonempty queue and deter-

mines the number of bytes in the packet at the head of the queue. The de¯cit-counter

is variable and it takes, each round, a speci¯c value according to the quantum, the

credit and the negative-credit values. The de¯cit-counter is incremented by the value

A New Scheduling Protocol Design Based on DWRR

1350012-7

J C

IRC

UIT

SY

ST C

OM

P D

ownl

oade

d fr

om w

ww

.wor

ldsc

ient

ific

.com

by 4

6.23

0.82

.68

on 0

2/28

/13.

For

per

sona

l use

onl

y.

quantum. Two scenarios exist as a function of the size of the packet:

(1) If the size of the packet at the head of the queue is less than or equal to the

variable de¯cit-counter, the packet is transmitted on the output port. Then, the

variable de¯cit-counter is reduced by the number of bytes in the packet. The rest

of the subtraction is called credit. The scheduler continues to dequeue packets

and decrements the variable de¯cit-counter by the size of the transmitted packet

until either the size of the packet at the head of the queue is greater than the

variable de¯cit-counter or the queue is empty.

(2) If the size of the packet at the head of the queue is greater than the variable

de¯cit-counter, then one of the following two situations take place:

(a) If the size of the packet at the head of the queue is less than or equal to the

variable de¯cit-counter incremented by the available credits of all the queues,

the packet is transmitted on the output port. The negative-credit takes then

the value of the out of range transmitted bytes (of this packet) among the

available credit. The latter depends on credits and negative-credits of all

queues as explained in Fig. 2. The variable de¯cit-counter as well as the credit

are reset to zero. The scheduler moves on to service the next nonempty queue.

This situation can be explained by the fact that the current queue has taken

a part of the bandwidth unused by the other queues. In general, this part of

Queue (i)

Wi <= Weight queue(i) Qi <= Quantum queue(i) DCi <= Deficit counter queue(i)

Pckt_size <

DCi Transmit pckt DCi <= DCi – pckt_size

Pckt_size <

DCx Transmit pckt

N_credit = pckt_size - DCi

Credit <= reset (0)

DCi <= reset (0)

Queue (i+1) Credit <= DCi N_credit <= reset (0)

Yes

No

Yes

No

Wi ≡ traffic typeQi depends on Wi DCi = f ct (Qi, credit(i), n_credit(i))

• Av_credit = DCi * Beta-i (Available credits) • Adding Av_credit without exceeding total bandwidth

DCx <= DCi + Av_credit

next packet

Fig. 2. The N-DWRR algorithm state diagram.

R. Ouni, J. Bhar & K. Torki

1350012-8

J C

IRC

UIT

SY

ST C

OM

P D

ownl

oade

d fr

om w

ww

.wor

ldsc

ient

ific

.com

by 4

6.23

0.82

.68

on 0

2/28

/13.

For

per

sona

l use

onl

y.

bandwidth depends on (i) the credit and the negative credit of all queues and

(ii) the size of the packet at head of this queue. This portion of bandwidth

will be subtracted, at the next round, from the bandwidth allocated to this

queue. This approach allows reducing packet latency in queues, without

exceeding the total bandwidth.

(b) If the size of the packet at the head of the queue is greater than the variable

de¯cit-counter incremented by the sum of the credit of all the queues, the

scheduler moves on to service the next nonempty queue. This queue will be

characterized by two values (credit and negative-credit), which will be used

within the next visit (round). The credit takes the last value of the de¯cit-

counter. However, the negative-credit is reset to zero.

(3) When the queue is empty, the scheduler sets to zero the de¯cit-counter, the credit

and the negative-credit values and moves on to service the next nonempty queue.

Figure 2 shows the NDWRR algorithm. It presents two test levels before deciding to

transmit a packet or to move on to service the next nonempty queue. These two test

levels give more probability to transmit a packet and decrease the average queue size,

which avoids congestion of packets in the tail of each queue.

4. N-DWRR Performance Evaluation

A queue-scheduling discipline allows managing the access to a ¯xed amount of

output port bandwidth by selecting the next packet that is transmitted on a port.

The packet transmission order depends on two parameters: the bandwidth allocated

to each queue (weight Wi) and Beta. Beta is a new parameter introduced by

N-DWRR to improve the total bandwidth utilization. It represents an additional

amount of bandwidth to o®er for each queue from the unused band. Our approach

provides a limited band without exceeding the total bandwidth. N-DWRR assumes

that the total bandwidth is not in general fully occupied. Therefore, the free band can

be distributed according to the needs of all queues.

4.1. Simulation environment and parameters

In this section, using Opnet modeler, we evaluate the performance of the most popular

scheduling techniques, at di®erent scenarios, based on many service classes: VoIP,

FTP, HTTP and Email. We consider a topology/network architecture including

mainly two parts: network core and network edge. In total, this environment includes

112 hardware devices (routers, switches, workstations, servers and VoIP telephones),

115 physical link (serial, Ethernet) and 3 con¯guration utilities. The simulation

scenario is based on many communication features such as tra±c type, number of

sources, tra±c starting time, tra±c data rate, etc. Each simulation scenario is done

for 10min including di®erent tra±c conditions (light, burst and heavy loads).

Table 1 outlines the QoS requirements expected for the di®erent types of tra±c.

A New Scheduling Protocol Design Based on DWRR

1350012-9

J C

IRC

UIT

SY

ST C

OM

P D

ownl

oade

d fr

om w

ww

.wor

ldsc

ient

ific

.com

by 4

6.23

0.82

.68

on 0

2/28

/13.

For

per

sona

l use

onl

y.

4.2. Simulation results

In order to evaluate the performance of the proposed technique, two simulation levels

are suggested. First, the simulation of the most popular scheduling techniques

deployed for Di®Serv in IP networks is done. This allows selecting the most e®ective

technique in terms of bandwidth utilization and latency. Second, using computer

simulation, we evaluate the performance of the proposed N-DWRR algorithm

compared to the selected technique.

4.2.1. Popular scheduling algorithms evaluation

CQ, DWRR, FIFO, PQ and WFQ are the most popular scheduling techniques used

in the IP networks that we propose to evaluate their performances under di®erent

scenarios and tra±c types. Figure 3 illustrates the main results of our simulation.

As mentioned in Table 1, all queuing strategies provide less than the acceptable

range. But, DWRR and WFQ queues o®er the lower end-to-end delay and jitter due

to the weight concept. They also o®er a reasonable response time for FTP and HTTP

applications. For these experiments, PQ and FIFO provide the worst performances

which cannot guarantee timing requirements in heavy or burst load.

Both WFQ and DWRR perform very well against the other technique, especially

in terms of end-to-end delay, jitter, throughput, download response time and

queuing delay. They also guarantee the lower dropping rate of IP packets. Finally,

Table 1. QoS requirements for the supported types of tra±c.

Tra±c class Delay Jitter Response time Loss Bandwidth

VoIP <150ms <30 ms — <1% High

FTP Med None 2�5 sec Zero High

HTTP <400 ms None 2�5 sec Zero <30.5 KbpsEmail Low None 2�5 sec Zero <10 Kbps

(a) VoIP End-To-End Delay (color online). (b) VoIP Packet Delay Variation (color online).

Fig. 3.

R. Ouni, J. Bhar & K. Torki

1350012-10

J C

IRC

UIT

SY

ST C

OM

P D

ownl

oade

d fr

om w

ww

.wor

ldsc

ient

ific

.com

by 4

6.23

0.82

.68

on 0

2/28

/13.

For

per

sona

l use

onl

y.

we demonstrate that the DWRR technique o®ers quite higher performances com-

pared to WFQ in all results (see Fig. 3). Moreover, DWRR is less computationally

complex and consequently easier to be implemented even in hardware. That is why

we suggest selecting DWRR for performance evaluation of our technique.

(c) FTP Download Response Time (color online).

(d) HTTP Download

Response Time (color online).

(e) Throughput (color online). (f) Utilization rate (color online).

(g) Queuing Delay (color online). (h) Dropped IP tra±c (color online).

Fig. 3. (Continued )

A New Scheduling Protocol Design Based on DWRR

1350012-11

J C

IRC

UIT

SY

ST C

OM

P D

ownl

oade

d fr

om w

ww

.wor

ldsc

ient

ific

.com

by 4

6.23

0.82

.68

on 0

2/28

/13.

For

per

sona

l use

onl

y.

4.2.2. Bandwidth utilization

In this section, we evaluate the performance of the proposed N-DWRR technique

through extensive simulation experiments maintained within a single IP router based

on a scalable architecture of queues. Here, four queues having di®erent weights are

deployed to store IP packets which are delivered randomly with variable size and

support di®erent types of tra±c. For the purpose of comparison and to show the

provided advantages, the performance evaluation consists mainly of measuring two

QoS metrics: the bandwidth utilization rate and latency. The ¯rst metric measures

the total bandwidth used by all queues during each round. The latency measures the

total queuing delay of all packets of the same weight.

Figure 4 shows the evolution of the total bandwidth used for each duty cycle of all

queues. These queues are characterized by di®erent weights given by 0.4, 0.3, 0.2 and

0.1. Notably, this ¯gure shows that the N-DWRR technique absorbs more band-

width than DWRR. The gap in bandwidth carried by N-DWRR reaches up to more

than 12% from the total bandwidth. In addition, N-DWRR a®ects the bandwidth

allocation speed which rapidly increases since the ¯rst round. This is due to two

reasons. First, empty queues are skipped to serve next queue which improve band-

width allocation. Second, we start with an intensive tra±c input to check the e±-

ciency of our algorithm. Thus, it can react appropriately within bursty tra±c

situations. This approach is also more suitable to support steady tra±c °ow or

constant bit rate, as indicated by the last part of the curve (see Fig. 4).

All these interpretations have been con¯rmed by varying the weight of these

queues. Figures 5(a) and 5(b) justify these results and show the bandwidth opti-

mization rate by using the N-DWRR technique. Table 2 shows the di®erent weights

of queues employed to extract results given in Figs. 4 and 5. This table also provides

the maximum bandwidth allocation gap between the two techniques. The gap

measures the di®erence between the allocated bandwidth using both scheduling

70

80

90

100

0 10 20 30 40 50

Use

d ba

ndw

idth

(%)

Round robin number

DWRR

NDWRR

Fig. 4. Bandwidth utilization rate for (W1 ¼ 0:4;W2 ¼ 0:3;W3 ¼ 0:2;W4 ¼ 0:1) weighted queues.

R. Ouni, J. Bhar & K. Torki

1350012-12

J C

IRC

UIT

SY

ST C

OM

P D

ownl

oade

d fr

om w

ww

.wor

ldsc

ient

ific

.com

by 4

6.23

0.82

.68

on 0

2/28

/13.

For

per

sona

l use

onl

y.

techniques. This parameter also re°ects the increasing rate in terms of bandwidth

improved by our technique against DWRR. This gap reaches upto 25% which

represents an e®ective argument indicating the e±ciency of the N-DWRR scheduling

technique.

4.2.3. Latency evaluation

The advantage of the N-DWRR technique is to maximize the bandwidth utilization

rate without introducing an additional queuing delay. This technique solves

successfully the compromise between bandwidth allocation and queuing delay.

Figures 6(a) and 6(b) evaluate the total latency of packets according to the weight of

their queues. First, these ¯gures con¯rm that the latency is inversely proportional to

the weight of queues. Second, they show that the latency maintained by N-DWRR is

slightly lower than DWRR.

4.2.4. Impact of Beta

N-DWRR speci¯cation (see Sec. 3.3) employs a generic parameter \Beta" which acts

on the performance of this technique. Beta represents the negative credit that a

queue is permitted to reach. In other terms, Beta is an additional amount of band-

width, computed as a fraction of the Quantum that N-DWRR o®ers to a queue. In

Table 2. Maximum gap of allocated bandwidth between N-DWRR and DWRR.

Weight Q1 Weight Q2 Weight Q3 Weight Q4 Max gap of BW

Figure 4 0.4 0.3 0.2 0.1 12%

Figure 5(a) 0.25 0.25 0.25 0.25 25%Figure 5(b) 0.42 0.08 0.42 0.08 15%

50

60

70

80

90

100

DWRRNDWRR

(a) W1 ¼ W2 ¼ W3 ¼ W4 ¼ 0:25

60

70

80

90

100

DWRR

NDWRR

(b) W1 ¼ 0:42;W2 ¼ 0:08;W3 ¼ 0:42;W4 ¼ 0:08

Fig. 5. Bandwidth utilization rate for di®erent weighted queues.

A New Scheduling Protocol Design Based on DWRR

1350012-13

J C

IRC

UIT

SY

ST C

OM

P D

ownl

oade

d fr

om w

ww

.wor

ldsc

ient

ific

.com

by 4

6.23

0.82

.68

on 0

2/28

/13.

For

per

sona

l use

onl

y.

this section, we are interested in measuring our QoS metric evolution function in

Beta. Thus, the objective is to determine the value of Beta, which serves both to

maximize bandwidth and minimize latency. We kept the same simulation environ-

ment (scenario, queue weight) for various alternatives of Beta.

First, the aim of this simulation is to determine a precise value (or value range) for

beta allowing access to the maximum amount of output port bandwidth. In this

context, we simulated the bandwidth evolution used by all queues according to Beta

0

0.2

0.4

0.6

0.8

1

1.2

5 15 25 35 45 55

Tota

llat

ency

(ms)

Queue weight (%)

Total latency (DWRR)

Total latency (NDWRR)

(a) W1 ¼ 0:05;W2 ¼ 0:15;W3 ¼ 0:2 and W4 ¼ 0:6

0

0.2

0.4

0.6

0.8

1

1.2

5 15 25 35 45 55

Tota

llat

ency

(ms)

Queue weight (%)

Total latency (DWRR)

Total latency (NDWRR)

(b) W1 ¼ 0:1;W2 ¼ 0:2;W3 ¼ 0:3 and W4 ¼ 0:4

Fig. 6. Total queuing delay of packets related to their queue weights.

90

91

92

93

94

95

5 15 25 35 45 55

Ave

rage

of u

sed

band

wid

th (a

ll qu

eues

) (%

)

Beta (%)

Fig. 7. Bandwidth utilization average as a function of Beta.

R. Ouni, J. Bhar & K. Torki

1350012-14

J C

IRC

UIT

SY

ST C

OM

P D

ownl

oade

d fr

om w

ww

.wor

ldsc

ient

ific

.com

by 4

6.23

0.82

.68

on 0

2/28

/13.

For

per

sona

l use

onl

y.

variation. In Fig. 7, the result shows that the used bandwidth increases with Beta to

reach a peak near the range of 35�45%. The bandwidth decreases slightly beyond the

peak value and then keeps almost constant. However, the queuing delay becomes

particularly high (see Fig. 8). Therefore, the choice of Beta should satisfy the com-

promise between bandwidth allocation and queuing delay.

Second, Fig. 8 shows the latency evolution in queues with di®erent weights. The

evolution often includes a Beta Band where latency is minimal. In the beta range of

25% to 35%, we note that latency meets a minimum of about 0.989ms, 0.654ms and

0.335ms for the light weighted queues (a, b, c) and a maximum of about of 0.168ms

only for the high-weighted queue (d). For the latter, the latency increases from

0.16ms (beta ¼ 0) to 0.168ms (beta ¼ 35%) which results in an increase of 8.1�s.

However, for all the light weighted queues, the latency decreases by 54�s.

0.988

0.989

0.99

0.991

0.992

0.993

0.994

0.995

(a)

0.652

0.654

0.656

0.658

0.66

0.662

0.664

0.666

(b)

0.33

0.335

0.34

0.345

0.35

0.355

0.36

(c)

0.152

0.154

0.156

0.158

0.16

0.162

0.164

0.166

0.168

0.17

(d)

Fig. 8. Total queuing delay for di®erent weighted queues.

A New Scheduling Protocol Design Based on DWRR

1350012-15

J C

IRC

UIT

SY

ST C

OM

P D

ownl

oade

d fr

om w

ww

.wor

ldsc

ient

ific

.com

by 4

6.23

0.82

.68

on 0

2/28

/13.

For

per

sona

l use

onl

y.

In conclusion, the common Beta range providing optimized values is limited be-

tween 25% and 35%. We choose Beta equal to 30% in order to obtain optimal results

which are already outlined in Secs. 4.2.2 and 4.2.3.

5. RTL Design of Embedded Packet Processors

Until recently, such a router used to be implemented entirely in software, running on

a general-purpose processor in a host computer. However, such implementations are

increasingly becoming infeasible because of two reasons: performance requirements

and complexity of the packet-processing functions. During the last few years, the

available network bandwidth has been on the rise, and with the advent of optical

¯bers being deployed for networking, network bandwidth has increased exponen-

tially. This has led to very stringent performance requirements from routers since

they have to process packets at line speed. Further, any new service to be supported

by a network is implemented by extending or modifying the routers. This has led to

very complex functionality being built in routers, with the additional requirement of

being reasonably °exible.

The real-time packet-processing constraints imposed on routers to support high-

line speeds motivate hardware-based solutions, where the router functionality is

implemented on application speci¯c integrated circuits (ASICs). The requirements

for °exibility and the complex nature of many of the processing functions, on the

other hand, favor software-based implementations on general-purpose processors. To

address these two con°icting issues, recently a new class of devices called \network

processors" has emerged.18 These are high performance programmable devices with

special architectural features that are optimized for packet processing. It is moti-

vated by the fact that the design and analysis of hardware�software architectures

for such processors requires new models and methods, which do not fall under the

domain of traditional embedded systems design.19,20

5.1. RTL design: Issues and trends

Most of today's embedded systems are implemented as a system-on-chip (SoC). In

the context of network packet processors, the architecture of such systems consists of

a heterogeneous combination of di®erent hardware and software components. The

hardware components consist of dedicated hardware block cores, di®erent kinds of

memory modules and caches, various interconnections and input�output inter-

faces.21 All of these are integrated on a single chip and run specialized software to

perform packet processing. The process of determining the optimal hardware and

software architecture for such processors includes issues involving resource alloca-

tion, partitioning and design space exploration. To tackle the complexity of such

designs, and also to meet demands for short time-to-market and low cost, several new

design paradigms like platform-based design19 have evolved. These are based on the

R. Ouni, J. Bhar & K. Torki

1350012-16

J C

IRC

UIT

SY

ST C

OM

P D

ownl

oade

d fr

om w

ww

.wor

ldsc

ient

ific

.com

by 4

6.23

0.82

.68

on 0

2/28

/13.

For

per

sona

l use

onl

y.

idea of concurrent design of hardware and software, and the design °ow starts with

an abstract speci¯cation of the application.

According to a protocol stack architecture, routers are built especially over two

layers, MAC in layer-2 and IP in layer-3. Forwarding frames are based on layer-2

MAC address information. Because of the standardization of the IP as the layer-3

protocol in local- and wide-area networks, layer-3 switching made it possible to do

classi¯cation and forwarding of packets based on their layer-3 DSCP ¯eld, without

resorting to complex routing algorithms. Since IP packets make up the major portion

of tra±c in any switch or router, we o®er here a solution where IP classi¯cation,

discarding, queuing, scheduling and forwarding were hardwired into ASICs.

5.2. Logic synthesis

Logic synthesis is one of the most important phases of the design °ow in state-of-the-

art circuits. It aims at transforming the HDL (usually Verilog HDL or VHDL)

description of the circuit into a technology-dependent, gate-level netlist. Through

this process, the hardware designer de¯nes the environmental conditions, con-

straints, compile methodology, design rules and target libraries, in order to achieve

certain design goals set by the initial speci¯cations. The tool we use for the logic

synthesis of the circuit is Synopsys DC, the most widely used synthesis tool. DC

optimizes logic designs for speed, area and wire routability. From the de¯ned goals,

DC synthesizes the circuit and tailors it to a target technology. The gate-level re-

presentation of the circuit is the input ¯le to the Place and Route tool.

The synthesis process is completed relatively easily and timing constraints are

met, while circuit area is kept to a minimum. Timing constraints are of the greatest

importance, as we opted for a clock frequency of 300MHz (3.33 ns clock cycle). We

were constrained to 300MHz due to the fact that it was the maximum operating

frequency of the FIFO we had. The circuit integrates 12 FIFOs as queues needed for

multiple port reception, di®erentiated service classi¯cation and scheduling. Hence,

we achieve 76.8Gbit/s incoming router throughput (8 inputs of 9.6Gbit/s link

throughput). Synthesis results are given in Table 3.

5.3. Post-synthesis veri¯cation

Post-synthesis veri¯cation is possibly the most important phase of the synthesis °ow.

It aims at testing whether the initial RTL design has the same behavior as the gate-

level netlist produced by the synthesis tool. In most cases, the initial results are not

the same, and the designer has to carefully investigate the reasons for the erroneous

behavior of the gate-level netlist. Usual mistakes happen when the circuit does not

reset correctly, a mistake that can pass unseen from the HDL compiler and simu-

lator, but, of course, the actual circuit will not work correctly.

Our synthesized gate-level netlist is imported back to the gate-level DC and is

tested within the same environment as the initial RTL design. The ¯nal netlist

A New Scheduling Protocol Design Based on DWRR

1350012-17

J C

IRC

UIT

SY

ST C

OM

P D

ownl

oade

d fr

om w

ww

.wor

ldsc

ient

ific

.com

by 4

6.23

0.82

.68

on 0

2/28

/13.

For

per

sona

l use

onl

y.

proved to behave correctly. The netlist is now ready to be imported to the Place &

Route tool for the ¯nal phase of the design process.

5.4. Place and route °ow

We place and route (P&R) the router chip core with Cadence Encounter.22 It is

comprised of various stages, some of them being optional, although important for

new design cases. At ¯rst, the design is imported to the tool. The ¯les needed are

technology-dependent and are either given by the technology vendor (in our case

CMOS 0.35�m) or are produced by the synthesis tool (in our case Synopsys Design

Compiler). The vendor provides the P&R tool with (a) technology library (.lib ¯les),

which contains the exact electrical characteristics of the library standard cells, (b)

layout (.lef ¯les), which includes standard cell actual layout, pin placement and

metal layer usage and (c) verilog (.v ¯les), containing the interface of every standard

cell. The same vendor also provides the memory models speci¯ed by their timing

library (.tlf ¯les). From the synthesis tool point of view, the only information needed

to be passed on to the P&R tool is the Synopsys technology mapped (.v) gate-level

representation of the design.

After importing the design, the designer has to °oorplan the various HDL mod-

ules and/or black boxes in the actual chip. Power rings are created and block rings

are added for power/ground termination purposes. Input/Output pins are also

placed in this stage. The most important decisions are, of course, exact chip layout,

utilization percentage and I/O placement.

When trial routing is complete, we move to the Clock Tree Placement phase. This

is achieved with bu®er insertions and thorough computations of the tree node

weights, so as to minimize clock skew produced by unbalanced clock tree placement.

In the ¯nal route phase, setup and hold times of registers are taken into account and,

having in mind the operating frequency constraint, the tools try to bu®er wires and

resize standard cells in order to minimize clock skew.

5.5. P&R results

The classi¯er, AQM and scheduler chip we place and route has a total area of

88.72mm2, with a square shape of (9:4� 9:4mm), as presented in Fig. 9. Area

results, as well as gate number can be seen in Table 4.

Table 3. Synthesis results: Memory area and cells are not included in this table.

Module Nb. I/O ports Nb cells (103) Area (mm2)

Classi¯er 458 183.6 10.2

AQM & NDWRR 192 226.8 12.6Total 344 410.4 22.8

R. Ouni, J. Bhar & K. Torki

1350012-18

J C

IRC

UIT

SY

ST C

OM

P D

ownl

oade

d fr

om w

ww

.wor

ldsc

ient

ific

.com

by 4

6.23

0.82

.68

on 0

2/28

/13.

For

per

sona

l use

onl

y.

Note the area di®erences compared to the corresponding synthesis results (shown

in Table 3): area is larger, while core gate count has increased by 18.8%. These

discrepancies are due to: (a) wiring; (b) hierarchy overhead; (c) clock tree and op-

timization bu®er insertion; (d) gate features in CMOS 0.35�m technology and (e)

area reserved for FIFOs. The total area, occupied by these FIFOs in the circuit, is

17.7mm2. Keep in mind that each module has to be fully optimized before importing

it to the top-level core. As a result, in most cases, the tool added bu®ers in all

hierarchy levels in order to meet timing constraints. These bu®ers, although usually

small, are numerous.

In this work, we presented a novel IP router organization and proved its feasibility

by designing classi¯er, AQM and scheduler modules. They aggregate incoming

throughput of 76.8Gbit/s. Final chip core area was 88.72mm2 in a 0.35�m CMOS

technology, while its power consumption dropped just below 6W. Taking into ac-

count that a similar router would be optimized (area, consumption) in the emerging

0.09�m technologies, we can state that the adopted organization can become a

switching block for future applications.

6. Conclusion

In this paper, we have proposed a novel QoS scheduler called negative de¯cit

weighted round robin scheduler. The motivation of the NDWRR scheduler is to

Table 4. Place and route results: Total numbers shown do not include FIFOs.

Module

Nb. cells

(103)

Nb. gates

(106)

Nb.

transistors

(106)

Area

0.35�m

(mm2)

Nb. I/O

ports

Nb. pins

(103)

All modules (without FIFOs) 487 1.46 5.84 71.02 344 575

FIFOs used as queues

Fig. 9. Final IP router layout: Square core with dimensions of 9:41� 9:41mm (88.72mm2).

A New Scheduling Protocol Design Based on DWRR

1350012-19

J C

IRC

UIT

SY

ST C

OM

P D

ownl

oade

d fr

om w

ww

.wor

ldsc

ient

ific

.com

by 4

6.23

0.82

.68

on 0

2/28

/13.

For

per

sona

l use

onl

y.

provide end-to-end bandwidth guarantees for di®erentiated service classes in large IP

networks. It can maintain its weighted share of bandwidth and provide delay dif-

ferentiation among queues. However, this is done at the cost of a higher algorithmic

complexity due to the rearrangement of service order according to the weight of the

packets at the head of each queue.

The N-DWRR scheduler provides two advantages. First, it works with variable

size packets. Second, the N-DWRR scheduler avoids having a packet waiting in

queue only because its size is slightly higher than the variable de¯cit-counter. This

problem occurs in the DWRR scheduler. However, in the N-DWRR scheduler the

packet in the head of the queue can be transmitted, even there is no su±cient

bandwidth, without exceeding the total bandwidth of the network. In conclusion, the

N-DWRR scheduler provides its queues with delay di®erentiation in terms of average

and worst-case packet delay that is statistically less than the DWRR scheduler; and

with throughput fairness that is higher than the DWRR and WFQ schedulers.

Further, this work includes the design evaluation for an optimal architecture of

network processors. It introduces a new service scheme motivated by the require-

ments of multi-service access networks. Based on the synthesis and P&R steps, we

then evaluated di®erent combinations of algorithms (for policing, queuing and link

scheduling) along with di®erent hardware building blocks and memory architectures,

for the design of a packet processor to support the proposed service scheme.

Acknowledgments

This work is supported by the Research Center of the College of Computer and

Information Sciences — King Saud University.

References

1. P. Giacomazzi, L. Musumeci, G. Saddemi and G. Verticale, Two di®erent approaches forproviding QoS in the Internet backbone, Comput. Commun. 29 (2006) 3957�3969.

2. K. McLaughlin, D. Burns, C. Toal, C. McKillen and S. Sezer, Fully hardware based WFQarchitecture for high-speed QoS packet scheduling, Integration VLSI J. (2011),doi:10.1016/j.vlsi.2011.01.001.

3. T. M. Lim, B. S. Lee and C. K. Yeo, Weighted de¯cit earliest departure ¯rst scheduling,Comput. Commun. 28 (2005) 1711�1720.

4. R. Braden, D. Clark and S. Shenker, Integrated services in the internet architecture: Anoverview, RFC (1633).

5. S. Blakem, D. Black, M. Carlson, E. Davies, Z. Wang and W. Weiss, An architecture fordi®erentiated service, RFC (2475).

6. S. Ece (Guran) Schmidt and H. S. Kim, Frame-counter scheduler: A novel QoS schedulerfor real-time tra±c, Comput. Commun. 29 (2006) 2181�2200.

7. L. Qiong, L. Hui, J. Yue-Feng and Q. Yao-Jun, Resources allocation in an Intserv/Di®serv integrated EPON system, J. China Univ. Posts Telecommunications 16 (2009)108�113.

R. Ouni, J. Bhar & K. Torki

1350012-20

J C

IRC

UIT

SY

ST C

OM

P D

ownl

oade

d fr

om w

ww

.wor

ldsc

ient

ific

.com

by 4

6.23

0.82

.68

on 0

2/28

/13.

For

per

sona

l use

onl

y.

8. Y. Yin and G. Poo, User-oriented hierarchical bandwidth scheduling for Ethernet passiveoptical networks, Comput. Commun. 33 (2010) 965�975.

9. S. Floyd and V. Jacobson, Random early detection gateways for congestion avoidance,IEEE/ACM Trans. Netw. 1 (1993) 397�413.

10. M. Wurtzler, Analysis and simulation of weighted random early detection (WRED)queues, EECS 891 project, 2002.

11. S. Mishima, L. Moy-Yee, G. Yee-Madera and E. Youse¯, Broadband packet switchprocessor, Space Commun. 18 (2002) 91�95.

12. Y. Mo, J. M. Nho, Yang, N. P. Mahalik, K. Kim and B. H. Ahn, A tra±c-class burst-polling based delta DBA scheme for QoS in distributed EPONs, Comput. Stand. Interfac.28 (2006) 721�736.

13. Supporting di®erentiated service classes: Queue scheduling disciplines, white paper chucksemeria, marketing engineer. Part number 200020-001, December 2001.

14. J. Postel, Internet protocol, DARPA Internet program protocol speci¯cation RFC791,September 1981.

15. L. Le, J. Aikat, K. Je®ay and F. D. Smith, The e®ects of active queue management on webperformance, in SIGCOMM'03, Germany, 25�29 August 2003, pp. 265�276.

16. M. Y. L. Wong and C. K. Li, Low computational complexity weighted queuing usingweighted De¯cit Round Robin, Proc. IASTED Application Information, Innsbruck,Austria (2002).

17. M. Shreedhar and G. Varghese, E±cient fair queuing using De¯cit Round Robin, IEEE/ACM Trans. Netw. 4 (1996) 375�385.

18. S. Chakraborty, System-level timing analysis and scheduling for embedded packet pro-cessors, Thesis of the Swiss Federal Institute of Technology, Zurich, April 2003.

19. K. Keutzer, S. Malik, R. Newton, J. M. Rabaey and A. Sangiovanni-Vincentelli, Systemlevel design: Orthogonolization of concerns and platform-based design, IEEE Trans.Comput.-Aided Des. 19 (2000).

20. R. A. Bergamaschi, S. Bhattacharya, R. Wagner, C. Fellenz, M. Muhlada, W. R. Lee,F. White and J.-M. Daveau, Automating the design of SoCs using cores, IEEE Des. TestComput. 18 (2001) 32�45.

21. D. G. Simos, Design of a 32� 32 variable-packet-size bu®ered crossbar switch chip,Thesis of institute of computer science FORTH-ICS/TR-339, July 2004.

22. Cadence Corporation; Available at http://www.cadence.com.

A New Scheduling Protocol Design Based on DWRR

1350012-21

J C

IRC

UIT

SY

ST C

OM

P D

ownl

oade

d fr

om w

ww

.wor

ldsc

ient

ific

.com

by 4

6.23

0.82

.68

on 0

2/28

/13.

For

per

sona

l use

onl

y.

This article appeared in a journal published by Elsevier. The attachedcopy is furnished to the author for internal non-commercial researchand education use, including for instruction at the authors institution

and sharing with colleagues.

Other uses, including reproduction and distribution, or selling orlicensing copies, or posting to personal, institutional or third party

websites are prohibited.

In most cases authors are permitted to post their version of thearticle (e.g. in Word or Tex form) to their personal website orinstitutional repository. Authors requiring further information

regarding Elsevier’s archiving and manuscript policies areencouraged to visit:

http://www.elsevier.com/copyright

Author's personal copy

Dynamic slot assignment protocol for QoS support on TDMA-based mobile networks

Ridha Ouni ⁎College of Computer and Information Sciences, King Saud University, Kingdom of Saudi ArabiaFaculty of Sciences of Monastir, EμE, Tunisia

a b s t r a c ta r t i c l e i n f o

Article history:Received 2 November 2009Received in revised form 21 May 2011Accepted 15 June 2011Available online 2 July 2011

Keywords:TDMA/FDDWLANBandwidth allocationQoSMAC protocol

An efficient bandwidth allocation scheme in wireless networks should not only guarantee successful datatransmission without collisions but also enhance the channel spatial reuse to maximize the systemthroughput. The design of high-performance wireless Local Area Network (LAN) technologies making use ofTDMA/FDD MAC (Time Division Multiple Access/Frequency Division Duplex – Medium Access Control) is avery active area of research and development. Several protocols have been proposed in the literature asTDMA-based bandwidth allocation schemes. However, they do not have a convenient generic parameters orsuitable frame repartition for dynamic adjustment. In this work, we undertake the design and performanceevaluation of a QoS (Quality of Service)-aware scheme built on top of the underlying signaling and bandwidthallocation mechanisms provided by most wireless LANs standards. The main contribution of this study is thenew guarantee-based dynamic adjustment algorithm used in MAC level to provide the required QoS for alltraffic types in wireless medium especially Wireless ATM (Asynchronous Transfer Mode). Performanceevaluation of this approach consists of improving the bandwidth utilization, supporting different QoSrequirements and reducing call reject probability and packet latency.

© 2011 Elsevier B.V. All rights reserved.

1. Introduction

Several wireless networking solutions have been developed toprovide different types of services for various end user applications.Wireless mobile data communication has been enlarged with thedevelopments of high performance wireless computers and othermobile devices [1]. Bandwidth is a scarce resource that can be sharedeither dynamically according to the amount of data required to betransferred to or from each node or deterministically by assigning afixed number of slots to each cell, as in a cellular network [2]. With thedeterministic assignment, a fixed number of slots, as portion of thebandwidth, is assigned to certain nodes (or groups of nodes) so thatthey have exclusive access to the assigned bandwidth. The dynamicassignment shares the bandwidth into the required number of slotswhich can be changed according to the occurred events in thenetwork. Thus, a QoS (bandwidth, delay, jitter) guarantee can beprovided. However, traditional bandwidth allocation is pre-planned,hence, it is less adaptive to traffic load variations and networktopology changes [2].

Recently, several high-performance wireless LAN technologiesmaking use of TDMA/TDD (Time Division Duplex) MAC have beendesigned [3–5]. In this type of networks, a central unit allocates thebandwidth among all active mobile terminals. These lasts use a set of

signaling primitives in order to place their resource requests. Thecentral unit then allocates the channel bandwidth among all thecompeting mobiles [3].

TDMA/FDD (Frequency Division Duplex) MAC protocol is used toseparate uplink and downlink channels which are divided into acontiguous series of fixed-size TDMA frames. Each frame is furthersubdivided onto a fixed number of slots to be allocated for differentservice classes. TDMA wireless networks, when operating under theinfrastructure mode, distinguish between two types of devices: theAccess Point (AP) and the Mobile Terminal (MT) [3]. The AP is theentity responsible of providing connectivity with the core network aswell as for adapting the users’ requirements by taking into account thecharacteristics of the core network and the services offered by thewireless LAN. Furthermore, the AP distributes resources and main-tains coordination between all the MTs located within the cell [3].

Traditional wireless networks deployed universally cannot pro-vide the necessary QoS guarantees for bursty traffic such as real-timemultimedia applications [1]. Based on the MAC protocol, it is possibleto build up QoS mechanisms capable of providing the guaranteesneeded by various applications. Thesemechanisms need to specify theformat and sequence of the control messages between MTs and AP.However, they don’t define the specifics regarding the timing andnumerical values of the system parameters, such as the bandwidth tobe reserved for each type of connection [3]. In other hand, thesemechanisms may consider distributed dynamic slot and powerallocation for a TD/SDMA broadband wireless packet network withmultiple access ports and adaptive antennas [6].

Computer Standards & Interfaces 34 (2012) 146–155

⁎ CCIS, King Saud University, P.O. Box 51178, Riyadh 11543, Kingdom of Saudi Arabia.Fax: +966 1 4675630.

E-mail address: [email protected].

0920-5489/$ – see front matter © 2011 Elsevier B.V. All rights reserved.doi:10.1016/j.csi.2011.06.003

Contents lists available at ScienceDirect

Computer Standards & Interfaces

j ourna l homepage: www.e lsev ie r.com/ locate /cs i

Author's personal copy

This work considers the problem of providing a QoS guarantee tousers and simultaneously maintaining the most efficient use of scarcebandwidth resources. It employs a certain bandwidth allocationscheme which needs to be dynamic according to the traffic demandvariations at each node. An efficient bandwidth allocation schemeshould take into account generic parameters describing differentrequirements of MT traffics. This scheme should then guaranteesuccessful data transmissions without collisions, share bandwidthdynamically and enhance channel spatial reuse to maximize systemthroughput. In this way, at setup connection time, the applicationsmay specify their QoS requirements. The admission control mecha-nismsmay then accept or reject new calls based on the level of activityof the on-going connections. Due to the high degree of burstiness oftoday’s applications, it is important that the AP be regularly informedof the status of the active connections [3]. This paper makes use of aTDMA/FDD based dynamic channel assignment to improve thenetwork’s ability to meet the QoS requirements of various types ofapplications. This work proposes a dynamic TDMA bandwidthallocation approach referred to as Dynamic Slot Assignment Protocol(DSAP). This approach efficiently utilizes the channel bandwidth byassigning unused slots to newMTs and compensating additional timeslots from lower QoS classes when the number of slots in the frame isinsufficient to support new connections. This protocol also gives morepriority to serve handoff calls.

The rest of this paper is organized as follows. Section 2 provides ashort overview of the frame structure and access mechanisms used inTDMA/FDD networks. In Section 3, we describe our dynamicbandwidth allocation proposal. A performance evaluation of thisproposal is given in Section 4. Finally, Section 5 concludes the paper.

2. MAC protocol: principles and description

2.1. Time division multiple access

Time division multiple access (TDMA) shares the availablebandwidth in the time domain. Each frequency band is divided intoseveral time slots. A set of such periodically repeating time slots isknown as the TDMA frame. Each node is assigned one or more timeslots in each frame, and the node transmits only in those slots [3]. Fortwo-way communication, TDMA systems employ the uplink and thedownlink time slots for transmitting and receiving data respectively.The uplink and downlink communications can be achieved in thesame frequency band, known as time division duplex (TDMA/TDD), oron different frequency band, called frequency division duplex (TDMA-FDD) [2].

2.2. Wireless network environment

TDMAwireless networks are designed through a cellular structurein which a set of mobile terminals (nodes) maintain their connectiv-ities with the core network over an AP. the AP allocates the time slotsin response to the MT requests. With this objective, each MT has torequest the required resources to the AP by issuing a ResourceRequest (RR) message, while the AP informs the MT of the positiveoutcome by using a Resource Grant (RG) message.

In WATM architecture, Wireless Terminals (WTs) and APs (or BSs:Base Stations) can be fixed or mobile. Therefore, some networkcomponents constituting a WATM can be different likewise. A WATMsystem with mobile users and fixed APs consists of three majornetwork components [1]. These are a mobile terminal with radio andmobility enhanced software and mobility enhanced ATM switch. TheWATM protocol stack integrates additional modules to the standardATM which include radio channels among MTs and APs, a DLC (DataLink Control) layer, a MAC layer and a wireless access control profile,which supports such functions as radio resource management atphysical, MAC and DLC layers, as well as mobility management.

2.3. TDMA-FDD frame description

The downlink channel time is divided into time frames of equallength, which are, in turn, divided into a number of time slots [1,7].The channel frame duration accommodates 111 slots shared amongdynamic and fixed applications-based allocation. Fixed allocationrequires a certain guaranteed timeslots to be assigned while theconnection is established. However, dynamic allocation ensures twotypes of timeslots: guaranteed and non-guaranteed. Each time slotincludes a single 56 bytes wireless ATM packet as adopted by manyprevious works [1,8–10] while it improves efficiently the bandwidthutilization rate. A slot allocation table (SAT) is used to manage andupdate the time slot allocation. In our study, we divide the downlinkframe in two intervals:

(a). The control interval, which is placed at the beginning of eachframe, and

(b). The information (or data) interval whichmay include idle slots.

The control interval comprises two fields: the frame header andthe signaling field. The frame header is the first downlink control slotused by the AP for signaling the beginning of a frame transmission anddenoting the current frame structure. The signaling fields divided intoa number of time slots in the downlink, corresponding to an equalnumber of request slots in the uplink, plus a fewmore slots needed forreasons which are explained in Section 3.2. Each signaling slot isdivided into two mini-slots of equal duration.

Uplink request slots are used by terminals to access the channeland make a slot reservation, and are placed at the beginning of eachtime similarly to the signaling slots in the downlink. Request slots arealso used by mobile terminals to acquire the additional informationslots when their bit rate increases.

The information interval consists of fixed allocated slots anddynamic allocated slots according the supported service classes. Weconsider four types of traffic in our study: Constant Bit Rate (CBR),Variable Bit Rate (VBR), Available Bit Rate (ABR) and Unspecified BitRate (UBR). Specific traffic and QoS parameters have been defined tocharacterize each service class. Based on the previous concepts andreferences, Fig. 1 presents our DSAP frame structure proposal todynamically allocate slots for different service classes.

For Constant Bit Rate (CBR) traffic, slot allocation is performedonce during call establishment. A fixed allocation of slots is assignedaccording to user requests. When CBR slots are no longer available,arriving CBR calls are blocked. Variable Bit Rate (VBR) slots areassigned based on a statistical multiplexing algorithm. Unused CBRand VBR slots are shared with other traffic classes. Arriving VBR callsare also blockedwhen VBR slots are not available. Finally, for AvailableBit Rate/Unspecified Bit Rate (ABR/UBR) traffics, slot allocation isperformed on a burst-by-burst basis via dynamic reservation of ABR/UBR slots and unused CBR and VBR slots. Since slots are apportionedfor CBR, VBR, and ABR/UBR categories, the channel is not dominatedby the most demanding user. In order to minimize the waste ofbandwidth due to collisions, reservation slots are divided inmini-slots[11].

2.4. Related works: bandwidth allocation strategies

For efficient utilization of the radio spectrum, a frequency reusescheme that is consistent with the objectives of increasing capacityand minimizing interference is required. A variety of channelassignment strategies have been developed to achieve these objec-tives. Channel assignment strategies can be classified as either fixed ordynamic [12]. In a Fixed Channel Assignment (FCA) strategy, each cellis allocated a predetermined set of voice channels. If all the channelsin that cell are occupied, the call is blocked and the subscriber does notreceive service.

147R. Ouni / Computer Standards & Interfaces 34 (2012) 146–155

Author's personal copy

In a Dynamic Channel Assignment (DCA) strategy, voice channelsare not allocated to different cells permanently. Given the central roleplayed by the MAC algorithms, there have been a large number ofstudies focusing on the design and evaluation of QoS-aware MACprotocols for TDMA networks [3].

One of the most well-known protocols of this category is theDynamic TDMA with TDD (DTDMA/TDD) protocol, which wasdesigned especially for the wireless ATM network (WATMnet) [11].It is a microcellular network capable of providing integratedmultimedia communication service to remote terminals [13]. In[13], users send transmission requests to the access point in thededicated reservation slots using slotted Aloha random access. Therequests are then processed, resulting in a schedule table based on theQoS parameters of user traffic. The access point proceeds to broadcastslot allocations and acknowledge successful reservations. The basicdisadvantages of this protocol are: (a) its use of the slotted Alohaaccess algorithm, which leads to unstable system behavior (unless thechannel utilization is low) and provides low throughput, and (b) thefact that the scheme is based on the concept of not allowing the mostdemanding user to dominate the channel seems a logical choice interms of fairness to lower priority users [11].

In [8], the authors describe a resource reservation protocol. In thisprotocol, the MTs issue the first request by using a contention-basedprotocol, similar to S-Aloha. Once having been allocated a number ofchannels, the data packets convey, via “piggybacking”, the followingMT’s resource requests. Whenever, an MT does not have any morepackets to transmit, the resources (bandwidth) are freed. Later, whenthe MT once again becomes active, it has to start the reservationprocess by issuing a first request via the contention process.

The MASCARA algorithm [9] makes use of a resource requestmechanism which integrates a scheduler based on the "token bucket"scheme allowing the resource distribution among the active connec-tions. The performance of these mechanisms severely degrades as thenumber of active connections increases. This may make the allocationmechanism prone to delay and losses; an undesirable condition whendeveloping QoS mechanisms [3].

Chang and Kim [14] proposed two efficient heuristic algorithms forthe channel allocation problem that minimize the average callblocking probability of the whole network subject to the co-channel,adjacent-site and co-site interference constraints, given the number ofavailable channels. Sung and Wong [15] developed a sequentialpacking algorithm that provides optimal solutions for a special classof network topologies — they also derived a lower bound for theminimum number of channels required to satisfy a given call trafficdemand under co-channel and adjacent-channel interferenceconstraints.

With connection oriented services, adaptive channel reallocationand distributed power control significantly improve system capacity.

In this context, [16] proposed an efficient resource (slot and power)allocation scheme with a technique named power shaping, in amulticell packet environment with sectorized base station antennas.Unlike in traditional approaches, where time slots are allocated first,and then power control is performed, power shaping first assigns inadvance (static allocation) a maximum power level to each channeland then dynamically performs channel allocation and fine powercontrol. Later, the same authors proposed, in [6], an allocationalgorithm which works in a distributed SDMA environment and isable to support power shaping. Power shaping imposes a constrainton each slot of the frame about the maximum transmit power. Theallocation algorithm tries to fill each slot with a set of packets,depending on users spatial separability, channel quality, interferenceestimation and available power. In addition, [6] also described twoother allocation algorithms: centralized Max-min Fit (C-MMF) andrandom allocation. The centralized Max-Min Fit algorithm ideallyknows the current status of the whole network where Slots are visitedand filled one by one starting from slot 0, with a centralized control,i.e., each AP is aware of what the other APs are doing. With therandom allocation algorithm, each AP picks up each of its assignedusers in a random order and allocates it to a random slot.

3. QoS-aware model for dynamic bandwidth allocation in mobilenetworks

In this section, we briefly explain the DSAP model for a dynamicbandwidth allocation in mobile networks. The TDMA format in thismodel has N sessions with M slots each one in the frame. The APmaintains its frame, and each frame includes a control slot table anddata slot table. M and N are variable values and are adjusted when theframe does not have enough slots to support new connections. Thisprotocol controls the expansion and recovery of unassigned time slotsby dynamically changing the set of M values according to the trafficload, the service classes and the number of mobile terminals in thecontention area.

3.1. Control channel descriptions

The control channel is formed by means of the first slot in eachframe. The control phases of slot 0 are dedicated to the reservation ofthe corresponding data slot. If a MT wants to reserve a data slot, itcontends for the corresponding control slot. The time slots order isgenerated in the control slot, and is used in the corresponding dataslot of all the subsequent frames. In general terms, to make areservation, the MT first sends out a request and second a feedback isprovided from the AP of the contention area. This request cannotsuccessful when it collides with other requests. A four-phase dialogueis carried out between MTs when establishing connections and AP

Frame (i - 1) Frame ( i ) Frame (i+1)

Guard time

Time

… … …

Frame header

Signaling mini-slots

Dynamic allocated ABR, VBR and UBR

slots

Fixed allocated CBR slots Idle slots

… … …

Fig. 1. The DSAP frame structure.

148 R. Ouni / Computer Standards & Interfaces 34 (2012) 146–155

Author's personal copy

ensuring adequate resource allocation, by using four types of controlpackets.

(1). Request phase: this is the initial phase in which a MT sends arequest packet (REQP) to obtain information on the assignedslots from the AP. The request packet includes the connectionrequirements expressed by specific number of time slots.

(2). Reservation phase: In this phase, the AP receiving the packetrequest ensures managing the available resources to satisfy therequirements. Other alternatives could be followed to allowestablishing the connection when there are not enoughresources (Section 3.2.2).

(3). Response phase: the AP reports the receipt of the requestpacket using a response packet (RESP) to announce the numberand the order of assigned slots.

(4). Confirm phase: the MT sends back a confirmation packet(CFMP) indicating that the suggestion is accepted.

Consider Fig. 2. Here MTi has packets ready to be transmitted viaAP1. During the request phase, node i transmits the request packet(REQP). If the neighbors of node i send other REQPs ensuring collision,the request cannot successful. Otherwise, the AP gets the REQP,allocates the required time-slots and announces the assigned slotsusing RESP. MTi collects the information of the assigned slots bylistening to each slot and sends confirmation packet (CFMP) notifyingthat the previous allocation is accepted. Finally, a certain number oftime slots are assigned to MTi. The four-phase protocol with the

reservation procedure is thus completed. A similar approach has beendeveloped in [2].

3.2. Dynamic slot assignment protocol (DSAP)

The considered MAC protocol is centralized in nature with moremanagement and control functions at the AP. The uplink (MTs to AP)and downlink (AP to MTs) communication is assumed to be time-slotted and physically separate (i.e. different frequency channels).Statistical multiplexing on a TDMA channel is used with a slot lengthable to carry one wireless ATM packet. The slots are classified asavailable and reserved slots. Available slots are used to send dynamicreservation requests (signaling channel) and reserved slots are usedto send data packets. To coordinate the multiple accesses in theuplink, the AP transmits slot-by-slot commands, in order to specifywhether a slot of the uplink channel is available or reserved, andidentify the MT enabled to transmit.

Based on time slot architecture, our proposed protocol controls thenumber of unassigned time slots by dynamically changing theallocated time slots according to the traffic load, the service classand the number of MT in the contention area.

When a MT needs to communicate with any other, initially it asksfor a transmission channel from the AP. According to the QoSrequirements of this connection request, the AP assigns adequatenumber of time slots for this connection using a dynamic SlotAllocation Table (SAT). The SAT configuration dynamically changes

Pac

ket

arri

val

DP

HRP

DRP

Y

Y

Y

N

N

N

Send the packet to the MT.

Higher weight (Wh) affected, Compute the number of slotsthat satisfy required QoS.

Release the connection slots.

NCRPY

N

Normal weight (Wn) affected,Compute the number of slotsthat satisfy required QoS.

Discard packet

DP: data packet ,HRP: handoff request packet ,NCRP: new connection request packet ,DRP: disconnection request packe t,W: weight of the connection request.

Reservation procedureSlots reservation & SAT update

Recovery procedureSlots release & SAT update

Fig. 3. Signaling procedure of the DSAP protocol.

New calls MT0 MT1 MT2 Idle … Idle

0 1 2 3 … nMTi

REQP MT0 MT1 MT2 Idle … Idle

AP RESP MT0 MT1 MT2 Idle … Idle

MTi CMFP MT0 MT1 MT2 Idle … IdleNew

calls MT0 MT1 MT2 MTi … Idle

Current state of frame allocation

Next state of frame allocation

Phase 1

Reservation + Phase3

Phase4

Fig. 2. Four-phase protocol with reservation procedure in DSAP.

149R. Ouni / Computer Standards & Interfaces 34 (2012) 146–155

Author's personal copy

with an algorithm based on the QoS parameters of the service classes.The proposed DSAP protocol can be mainly divided into threecomplementary procedures operating at the AP for signaling,reservation and recovery.

3.2.1. Signaling procedureThe signaling procedure includes three tasks according the type of

packet that the AP receives. These are namely, assigning adequatenumber of slots for a connection considering the QoS requirements ofthe requesting MT, forwarding any arrived data packets to theirdestinations and terminating any active connection. The core functionof the signaling procedure manages efficiently packets arriving at theAP MAC level. This procedure is highly coupled with the reservationprocedure as described in Fig. 3.

The signaling procedure is used to compute the availablebandwidth for MT applications and allow data packet transfer to thedestined MTs. The traffic delivered to the AP MAC level is identifiedaccording to the packet formats. Four types of packet may beidentified (NCRP, HRP, DP and DRP) and each one needs specificprocessing. The receipt of a NCRP allows getting the number of slotsthat can provide the required QoS and reserves them from the SAT.Handoff connection requests are assigned higher priority to beaccepted. When there are not enough slots, a solution is giventhrough a resource compensation step integrated in the reservationprocedure and will be described below in Section 3.2.2. DRP and DPhandle connection termination requests and data packets deliveries,respectively. In most cases, packet processing leads to change the SATcontent.

3.2.2. Reservation procedureThe reservation procedure and its resource compensation algo-

rithm in the AP are the most vital part of our DSAP protocol. Thisprocedure supports QoS guarantee for different and bursty trafficssuch as multimedia applications based on an effective and efficientmanagement of the SAT. The SAT content depends on the allocatedand available slot number, the MT number in the contention area andthe service classes.

As outlined in ATM standard, the QoS parameters and trafficdescriptors are used to determine the required number of slots. ThePCR (Peak Cell Rate), SCR (Sustainable Cell Rate) and MCR (MinimumCell Rate) are the basis parameters which allow determining requiredslot number for CBR, VBR and ABR traffics respectively. With theseparameters (high level allocation category), the slots guarantee fieldare restricted, in the SAT, for these traffics. With other QoSparameters, the guarantee field for VBR, ABR and UBR traffics maybe reassigned for a new connection based high level allocation.However, the guarantee field of UBR slots can be used by anyguaranteed CBR, VBR or ABR connection since UBR service does notprovide any QoS guarantees. These allocation categories are used bythe compensation algorithm.

• A CBR connection request is characterized by the PCR and CellTransfer Delay (CTD) parameters which their values determine thenumber of required slots. Moreover, the CDV parameter allowsdistributing these slots through the TDMA frame (as well as throughthe SAT) in order to guarantee the Cell Delay Variation (CDV).

• A VBR connection request is characterized by the SCR, CTD and MBS(MaximumBurst Size) parameters which their values determine the

Y

Y

Y

N

N

N

Packet arrival

CB

R

VB

R

AB

R

UB

R

If unused slots satisfy connection request requirements for different services classes.

Actualizing / Terminating connection

DRPTimer

Assign additional non -guaranteed slots from UBR, ABR and VBR connections successively to satisfy connection requirements (equation1),Identify MTs contributing for compensation process and save their number of offered slots.

Get the packet, its requirements & Weight

Requirement negotiation: offering lower QoS than those required.

Reject connection & Notification with release information.

Connection parameters buffering,Send the changes in the SAT to all affected active MTs.

USATP: phase 1AP releases slots, and sends update packets (rewards non-guaranteed slots).

CSATP: phase2MTs report the USAT packets and send CSAT packets,AP updates and reschedules its SAT.

Recovery procedure

Reservation procedure

CRP

Unused slot within anamount of time

CRP: connection request packet, DRP: disconnection request packet,SAT: slot allocation table,USATP: update SAT phase,CSATP: confirmation SAT phase,W: weight of the connection request.

Fig. 4. Reservation and recovery procedures in DSAP.

150 R. Ouni / Computer Standards & Interfaces 34 (2012) 146–155

Author's personal copy

number of guaranteed slots. In addition, the PCR value determinesthe number of the non-guaranteed slots. Similarly, CDV parameterserves to distribute slots through the SAT.

• For an ABR connection request, the MCR and PCR values determinethe numbers of guaranteed slots and non-guaranteed slotsrespectively. Finally, a UBR connection request doesn’t require QoSguarantees. It uses any amount of remaining bandwidth from theother service classes without exceeding the part provided by thePCR.

In these last sections, we assumed that the available empty slotsare sufficient to satisfy the request requirements. In this case, theconnection is established and the requesting MT is informed for itsreserved slots. Otherwise, when there are not enough slots for therequest, two solutions can be considered (Fig. 4):

(1). The first solution tries to assign additional slots from the non-guaranteed slots pre-allocated to UBR, ABR and VBR connec-tions in the given order. Based on a compensation algorithm,the additional slots are selected, from specific service classeswith a computed number, in order to avoid QoS degradation inthe active connections. Eq. (1) computes the number ofadditional slots using one or more terms (a, b, c) that satisfyconnection requirements. The compensation algorithm affectsthe service classes with different weights used to calculate thenumber of slots that could be liberated for the new connectionrequest. This algorithm takes into account the weight of theservice classes (active and requesting), the number of activeconnections (i.e. MTs in the contention area) and the trafficload. The weight depends on the service class and the type ofthe connection request (new request or handoff request).Handoff requests are affected by higher weights to reduce thecall reject probability, minimize the transition delay betweenAPs and guarantee the same QoS level.

Nb:additional:slots = ∑UBRclass

UBR:slots + ∑ABRclass

non:grnteed:slots + ∑VBRclass

non:grnteed:slots

0≤ACR≤MCRð Það Þ

MCR≤ACR≤PCRð Þbð Þ

SCR≤ACR≤PCRð Þcð Þ

ð1Þ

(2). The second solution is initiated when the first one does notsatisfy the QoS requirements of the connection request. Thissolution is based on negotiation step which consists of offering,to the MT, lower QoS than those required. The calculationachieved in the first solution can be used to generate the QoSparameters and the traffic descriptors that the AP can offer. Thislast then sends a signaling packet to theMTwhich can accept orrefuse these parameters. Finally, if the second solution does notprovide acceptable QoS level, the connection is rejected and arelease notification is sent to the MT (Fig. 4).

3.2.3. Recovery procedureOur frame recovery procedure in the DSAP protocol improves the

efficiency of the frame. This procedure starts when a slot in the frameis released. This occurs when (1) a disconnection request is receivedor (2) a slot remains idle for a certain amount of time. Then, the APchecks its Slot Allocation Table (SAT) to identify the slots in the framewhich are unreserved and not flagged.

The AP releases its unused slots in the data session. It updates itsSAT and then notifies its MTs to update their SATs by following thetwo phases described below using two types of control packets(Fig. 4).

(1). Update SAT Phase (USATP): This is the first phase in which anAP releases the slots and sends the update SAT packets to notify

its MTs to update theirs SATs. These MTs are those providingadditional slots from their non-guaranteed slots during thecompensation phase (Section 3.2.2).

(2). Confirmation SAT Phase (CSATP): this is the second phase inwhich the MT reports receiving the USATP packet sent inphase 1. The AP receiving the CSATP packet must update andreschedule its SAT.

4. Performance evaluation

In this section, we are interesting to improve DSAP performancesin order to justify its capability to manage the MAC level in wirelessATM environment. We propose to study and analyze the evolution ofcertain metrics which allow evaluating DSAP behavior. Differentscenarios are established to simulate the DSAP protocol using severalnetwork events specified by the number of new and handoff calls, thesupported service classes and the traffic load. According the wirelessATM service class, traffic parameters are fixed as outlines Table 1.

4.1. Metrics

In our study, we have been interested in assessing the performancein terms of the following metrics: total normalized throughput,connection reject probability (new call, handoff call), resourceutilization average and overhead. In the following, we provide thedefinitions of all metrics being considered. The term upstream trafficrefers to the traffic being sent from the MTs to the AP.

• Total normalized throughput: is the ratio between the upstreamtraffic having been effectively sent through the channel over alltraffic having been submitted by all types of sources [3]. This metriccan be simply defined as follows:

Throughput =∑service classes

i ∑connectionsj trafout i;jð Þ

∑service classesi ∑connections

j traf in i;jð Þð2Þ

• Call blocking probability: is the ratio between the rejected connec-tions over the number of all connection requests per unit time. Itdepends on two criteria: the DSAP behavior and the traffic load.

• Resource utilization average (Rua): is the average channel utilizationof the assigned time slots at a particular [2]. Let:

CH i; jð Þ =n1 slot i is usedforMTj0 Otherwise

FL = the framelength

Then Rua =∑MTs

j=1∑slots

i=1CH i; jð Þ

FLð3Þ

4.2. Modeling and simulation environment

We assume the use of a wireless LAN consisting of several mobileterminals and an access point connected to awired node that serves assink for the flows from the wireless domain. The background flowgenerated by the MTs is a combination of different service classes oftraffic with which many scenarios (light, heavy and burst traffics) aredeployed as simulation inputs. The simulation parameters, listed in

Table 1Simulation parameters.

Downlink frame Duration=2 ms, fixed number=111 slots

CBR parameters PCR=100 kbps→10 Mbps, CDV≤1 msVBR parameters SCR=100 kbps→8Mbps, PCR=300 kbps→10Mbps, CDV=1ms.ABR parameters MCR=100 kbps→4 Mbps, PCR=300 kbps→10 MbpsUBR parameters PCR=100 kbps→5 Mbps

151R. Ouni / Computer Standards & Interfaces 34 (2012) 146–155

Author's personal copy

Table 1, have been respected and MTs are modeled by componentsresponsible of generating various traffics at up to 10 Mbps. In thiswork, modeling the AP behavior constitutes the principal contributionto dynamically allocating resources for optimal requirements satis-faction. Therefore, the AP is modeled by several concurrent andsequential processes allowing transmit, receive, signaling, reserva-tion, recovery and scheduling packets.

In order to evaluate the DSAP protocol compared to TDMA, wedeveloped a simulator generating trace-files describing the evolutionof different metrics according the input traffics and their features. Thissimulator has been developed using the frame structure described inFig. 1 with a time duration of 2 ms. Our simulator combines threesequential processes: (a) insertion of metrics, (b) trace-file loadingand (c) result visualization (Fig. 5).

(a). First, several QoS metric-related instructions are inserted atspecific processing levels in the algorithm pseudo-code. Theseinstructions allow measuring the evolution of the indicatedmetrics associated to different times and inputs.

(b). Second, simulating the algorithm using different events andnetwork workloads leads to generate a trace file(s) loadingmetric values evolution which reflects the algorithm behavior.

(c). Third, the trace file is organized into tables to correlate betweenmetric evolutions and allows results visualization. Now,performance evaluation of the proposed algorithms can bedone. But, the insufficient results leads to reformulate thepseudo-code and go back to the process (b).

As simulation environment input, the algorithm pseudo-codeshould be described in programming tool allowing concurrentprocesses and time sensitive instructions which are a primaryattribute of hardware as offered by Hardware Description Language(HDL). These features introduce flexibility to describe variable andreal scenarios as well as initiating specific process when detectingcertain event.

The real-time packet-processing constraints imposed on APs tosupport high line speeds motivate hardware based solutions, wherethe AP functionality is implemented on application specific integratedcircuits (ASICs). The requirements for flexibility and the complexnature of many of the processing functions, on the other hand, favorsoftware based implementations on general-purpose processors. Toaddress these two conflicting issues, recently a new class of devicescalled “network processors” has emerged [17]. These are highperformance, programmable devices with special architectural fea-tures that are optimized for packet processing. It is motivated by thefact that the design and analysis of hardware-software architecturesfor such processors requires new models and methods, which do notfall under the domain of traditional embedded-systems design. But,The co-design flow is addressed only when performance evaluationproves the effectiveness and efficiency of the proposed protocol.

- - - - - - -- - - - - - -

store (ti, throughput, …) in trace file

- - - - - - -- - - - - - -

store (tj, BW, …) in trace file

Process 1

Process 2

a) insertion of metric for measurement

t0=0µs, throughput= x, …t1=100µs, used BW=y, …t2=300µs, blocked call Nb=z, ………ti=10ms, throughput=m, ……tn=5s, …

b) measure and load metric in trace file

Algorithm pseudo-code

Trace file structure

Time 0 100 300throu

TimeBW … … …

Input% 10 20 …throu … … …

c) result organization & visualization

Call blocking prob

Fig. 5. Simulation environment processes.

0

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.2 0.4 0.6 0.8 1

random accesspower shapingC-MMFDSAPPure-TDMA

Thr

ough

put

Load

Fig. 6. Throughput vs. Load: comparison between the proposed algorithm, the pure-TDMA, the power shaping, the centralized and the random allocation algorithms.

152 R. Ouni / Computer Standards & Interfaces 34 (2012) 146–155

Author's personal copy

4.3. DSAP evaluation

The most works for resource allocation focus on one point of viewby evaluating the impact of their approaches on a single QoS metric.However, this work includes several factors and processes allowingsimultaneously improving resource utilization rate, throughput, callblocking probability (new call, handoff) and packet delay variation.

As described in Section 2.4, [6] presented three allocationalgorithms with power shaping, CMMF and random allocation. Asfirst performance evaluation result, Fig. 6 compares, in terms ofnetwork throughput, the different algorithms for increasing loads. Thehighest curve refers to the Dynamic Slot Allocation (DSAP) algorithm,whereas the bottom one refers to the random algorithm. As the loadincreases when the MTs have to go through a contention mechanismto place their requests, the basic allocation algorithms cannot servethese requests with the desired requirements especially when thereare not enough timeslots. This increases dramatically the collision andcall blocking probabilities as the number of MTs increases, which inturn leads to decrease the throughput. In the same situation, thecompensation mechanism in DSAP consists of liberating new timeslots to serve additional requests and meet these problems.

Using the same simulation scenario, DSAP performs also to increasethe resource utilization average as shown in Fig. 7. The total resourcesutilization is more important for DSAP compared to TDMA for tworaisons. First, the compensation algorithm employs non-used and non-guaranteed slots which may decrease the call blocking probability andthen increases the number of allocated slots (i.e.Rua). Second,disconnections are followed by rewarding released slots for MTtransmitting with lower QoS than those requested in signaling phase.In summary, DSAP includes compensation and rewarding mechanismsto improve the assigned slots average when a connection request and

connection release events occur, respectively. Consequently, DSAP usesmore than 25% of resources compared to TDMA as shown in Fig. 7.

Furthermore, the DSAP affects the call blocking probability since itincludes algorithm capable to serve new connection requests even inoverloaded state. For the same traffic scenario, Fig. 8 compares thereject probability evolution between classical TDMA and DSAP.Within the first period (until 3 second), the DSAP reject probabilityis very lower than TDMA. This is due to the availability of resourcesthat can be compensated between requests. Moreover, the rest of thesimulation scenario shows that the average reject probability is stilllower for DSAP than TDMA.

DSAP is also designed to improve handoff performances allowingto maintain a transparent transition between APs. DSAP gives morepriority for handoff requests processing since it is usually preferredmaintaining an established communication than accepting new call[10]. As a result, the handoff reject probability is lower for handoffcalls while the scenario includes the same number of handoff and newcalls (Fig. 9).

DSAP protocol is designed to process CBR applications with morepriority during resource allocation or compensation. This leads toreduce the blocking probability for new CBR calls especially when thetraffic load is low. As result, the CBR call blocking probability is under0.2 when the supported CBR traffic is lower than 50% because thereare usually enough resources to be allocated or compensated fornew CBR calls. However, the CBR call blocking probability brutallyincreases when the CBR traffic load exceeds 50%. In this case, therearen’t enough non-guaranteed time slots that can be used as resourcesfor the new CBR calls (Fig. 10).

The cell delay variation (CDV) is a sensitive QoS parameter whichdepends on the type of service class. CDV should take on almostconstant value especially for CBR applications. DSAP protocol provides

0

10

20

30

40

50

60

70

80

90

1 2 3 4 5 6 7 8

Rua

(%)

time (s)

TDMA

DSAP

Fig. 7. DSAP resource utilization average compared to TDMA behavior.

00.020.040.060.08

0.10.120.140.160.18

0.2

0 1 2 3 4 5 6 7 8 9

Cal

l blo

ckin

g pr

obab

ility

time (s)

TDMA

DSAP

Fig. 8. Call blocking probability evolution vs. a typical scenario for TDMA and DSAP.

0

0.1

0.06 1.31 2.58 3.83 5.08 6.32 7.58

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.91

Han

doff

cal

l blo

ckin

g pr

obab

ility

time (s)

total connections

Handoff connections

Fig. 9. Handoff and new calls blocking probabilities under light the same scenario.

153R. Ouni / Computer Standards & Interfaces 34 (2012) 146–155

Author's personal copy

a reduced CDV for CBR connections compared to classical TDMAtechnique since it includes a suitable model for time slot repartitionand update based on the slot allocation table (SAT). Fig. 11 outlinesthe CDV evolution for three CBR connections maintained withdifferent PCRs ((a)- 1.5 Mbps, (b)- 1 Mbps and (c)- 0.5 Mbps). TheCDV fluctuates around a constant value according to the PCR and equalto (0.51 μs, 0.76 μs and 1.54 μs) given by Fig. 11-(a), (b) and (c)respectively. DSAP protocol minimizes CDV fluctuations which im-proves QoS to be offered for mobile terminals and meets application

delay constraints. It gives a sufficient resources distribution strategy thatarranges fairly all the connections.

5. Conclusions

In this work, we have proposed a QoS-aware mechanism andevaluated its performance in terms of various metrics of interest. Thismechanism combines signaling, reservation and recovery processesaiming to provide the QoS guarantees required by applications whencoexisting with other services in TDMA/FDD mobile networks. Thismechanism utilizes the bandwidth resources in an efficient way in thepresence of four different types of services. Based on the simulationresults, we show the benefits of designing a simple and effectivebandwidth allocation mechanism.

Compared to other TDM mechanisms, the proposed DSAPimproves channel throughput, achieves lower call blocking probabil-ity and stabilizes cell delay variation. In particular, DSAP improvesresource utilization by more than 25%.

Acknowledgements

This work is supported by the Research Center of the College ofComputer and Information Sciences - King Saud University. Theauthor thanks the reviewers for their helpful comments. Theirremarks greatly improved the presentation of the paper.

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

10 20 30 40 50 60 70 80 90

CB

R c

all b

lock

ing

prob

abili

ty

CBR load

Fig. 10. CBR call blocking probability function in CBR load.

0.44

0.46

0.48

0.5

0.52

0.54

0.56

0

0.1

0.2

0.29

0.39

0.49

0.58

0.68

0.78

0.87

0.97

1.07

1.17

1.26

1.36

1.46

CD

V (

µs)

time (ms)

CBR(1,5Mbps)

0.69

0.71

0.73

0.75

0.77

0.79

0.81

1.36

1.72

2.09

2.45

2.81

3.18

3.54 3.9

4.27

4.63

CD

V (

µs)

time (ms)

CBR (1 Mbps)

1.47

1.49

1.51

1.53

1.55

1.57

1.59

1.61

0

0.47

0.93

1.39

1.85

2.32

2.78

3.24 3.7

4.17

CD

V (

µs)

time (ms)

CBR(500kbps)

a

b c

Fig. 11. Cell delay variation for different CBR traffics.

154 R. Ouni / Computer Standards & Interfaces 34 (2012) 146–155

Author's personal copy

References

[1] C. Ceken, I. Erturk, C. Bayilmis, A new MAC protocol design based on TDMA/FDDfor QoS support in WATM networks, Computer Standards & Interfaces 28 (2006)451–466.

[2] Chien-Min Wu., Dynamic frame length channel assignment in wireless multihopad hoc networks, Computer Communications 30 (2007) 3832–3840.

[3] Francisco M. Delicado, Pedro Cuenca, Luis Orozco-Barbosa, QoS mechanisms formultimedia communications over TDMA/TDD WLANs, Computer Communica-tions 29 (2006) 2721–2735.

[4] Broadband Radio Access Networks (BRAN), High Performance Radio Local AreaNetworks (HIPERLAN) Type 2; System Overview, ETSI Std. TS 101 683, , 2000.

[5] IEEE Standard for Local and Metropolitan Area Networks – Part 16: Air Interfacefor Fixed Broadband Wireless Access Systems – Amendment 1: Detail SystemProfiles for 10–66 GHz, IEEE Std. 802.16c-2002, December 2002.

[6] R.Veronesi, V. Tralli, J. Zander,M. Zorzi, Distributeddynamic resource allocationwithpower shaping for multicell SDMA packet access networks, the wireless commu-nications and networking congference (WCNC), March 2004, Atlanta, 2004.

[7] P. Koutsakis, M. Va.adis, H. Papadakis, Prediction-based resource allocation formultimedia traffic over high-speed wireless networks, AEU International Journalof Electronics and Communications 60 (2006) 681–689.

[8] M. Karol, Z. Liu, K. Eng, An efficient demand-assignment multiple access protocolfor wireless packet (ATM) networks, Wireless Networks 1 (1995) 267–279.

[9] N. Passas, S. Paskalis, D. Vali, L. Merakos, Quality-of-service oriented mediumaccess control for wireless ATM networks, IEEE Communications Magazine 35(11) (1997) 42–50.

[10] Bih-Hwang Lee, Hsin-Pei Chen, Su-Shun Huang, Dynamic Resource Allocation forHandoff in WATM Networks, 11th International Conference on Parallel andDistributed Systems (ICPADS’05) IEEE, 2005.

[11] Polychronis Koutsakis, On improving channel throughput by restricting datatraffic access in multimedia integration over wireless channels, AEU InternationalJournal of Electronics and Communications 62 (2008) 1–10.

[12] Mohan R. Akella, Rajan Batta, Moises Sudit, Peter Rogerson, Alan Blatt, Cellularnetwork configuration with co-channel and adjacent-channel interferenceconstraints, Computers and Operations Research 35 (2008) 3738–3757.

[13] D. Raychaudhuri, L.J. French, R.J. Siracusa, S.K. Biswas, Y. Ruixi, P. Narasimhan, C.A.Johnston, WATMnet: a prototype wireless ATM system for multimedia personalcommunication, IEEE Journal on Selected Areas in Communications 15 (1) (1997)83–95.

[14] K.N. Chang, S. Kim, Channel allocation in cellular radio networks, Computers andOperations Research 24 (1997) 849–860.

[15] C.W. Sung, W.S. Wong, Sequential packing algorithm for channel assignmentunder co-channel and adjacent channel interference constraint, IEEE Transactionson Vehicular Technology 46 (1997) 676–685.

[16] R. Veronesi, V. Tralli, DCA with power-shaping (PS-DCA) in TDMA and TD/CDMAcellular systems with centralized and distributed control, The 14th IEEEInternational Symposium on Personal, Indoor and Mobile Radio Communications(PIMRC), 7–10 Sept, 2003.

[17] S. Chakraborty, System-Level Timing Analysis and Scheduling for Embedded PacketProcessors, thesis of the Swiss federal institute of technology, Zurich, April 2003.

Ridha Ouni. is Assistant professor in the college of Computer and Information Sciencesof the King Saud University, KSA, since Feb 2009. He was Assistant Professor in the‘Institut Préparatoire aux Études d'Ingénieurs de Monastir (IPEIM)’, Tunisia, since 1999.Currently, he prepares his HDr in the wireless networking field. His research interestsinclude wireless communication, mobility, QoS management and wireless sensornetworks.Previously, he Received his MSc in Physic Micro-electronic, his DEA degree in‘Matériaux et Dispositif pour l'électronique’ and his PhD from the Sciences Faculty ofMonastir, Tunisia in 1995, 1997 and 2002, respectively.

155R. Ouni / Computer Standards & Interfaces 34 (2012) 146–155

Sci.Int.(Lahore),24 (1),13-19,2012 ISSN 1013-5316; CODEN: SINTE 8

13

EFFICIENT DATA HARVESTING FOR INELASTIC TRAFFIC IN VEHICULAR SENSOR NETWORKS

Ridha Ouni, Mohammad Zuheir Hourani

Department of Computer Engineering, CCIS, King Saud University, P.O.Box 51178, Riyadh 11543, Saudi Arabia

ABSTRACT—The basic idea behind intelligent transportation system (ITS) is how to deploy vehicular sensor network that have many characteristic such as high computation power ,enough storage space and mobile sensor node in order to design an effective and efficient architecture for data collection and data exchange. In this paper we will introduce an intelligent transportation system with new network paradigm to collect important information from the road environment based on the vehicular sensor network (VSN). Data aggregate provides the end users with valuable information in order to make the road safer and less congested. Our system framework consists of active vehicular sensor node, passive vehicular sensor node and sink node distributed according to the road segmentation for collecting data from active vehicular sensor node passing by, while active vehicular sensor node collects data from passive vehicular sensor node in their segment using multihop data harvesting. .Finally, the simulation shows the effectiveness of the proposed schema.

Keyword- ITS, VSN, IVS, data harvesting, hybrid architecture, data aggregation.

1. INTRODUCTION

Significant advances in manufacturing technology

equipment and the advent of Micro-Electro-Mechanical

Switches (MEMS) has opened the way for the construction

of intelligent sensor nodes which are able to perform three

major functions: sensing, processing and wireless

communication. These wireless sensor nodes are

characterized by their intelligence, their small size, low cost,

battery powered, and easy to install and repair. These features open doors to deploy WSNs in the future for a wide

range of applications because it greatly expands our ability

to monitor and control the physical environment from

remote locations [1]. An interesting field where the use of WSNs proves effectiveness is the field of Intelligent Vehicular Systems. An Intelligent Vehicular System (IVS) uses technological advances in computers and information technology to improve the efficiency of both new and existing vehicular systems. Vehicular sensor networks (VSNs) is a technology where sensors are deployed in the road side and in the vehicles to sense various urban phenomenon’s and transmit information for vehicular traffic control and monitoring. VSNs have different characteristic from traditional sensor network (static network), interns of mobility, computational, power supply, memory storage and reliability. Moreover vehicular sensor network VSN has a much more dynamic topology as compared to the static WSN. It is often assumed that VSN will move continuously in a random fashion, thus making the whole network a very dynamic topology. This dynamic nature of VSN is reflected in the choice of other characteristic properties, such as routing, MAC level protocols and physical hardware, beside this, dynamic topology of vehicular sensor network VSN, communication links can often become unreliable[2].The previous characteristics allow deploying vehicular wireless sensor network to design intelligent transportation system. Compared to “traditional static sensor network” vehicular sensor network may generate a sheer amount of data due to the mobility of the vehicles, it’s impossible to deliver all the

data collected to the sink. First because just too much is detected by such powerful sensor platform, second because the network capacity is too thin and limited time it takes for vehicle to drive through the coverage area of the sink because of the mobility. In order to solve most of these problems we introduce active and passive node solution beside simple data representation that will reduce the amount of data transferred between nodes. In this paper we are interested in designing optimal system architecture for such vehicular sensor network for vehicular traffic control and monitoring. Several assumptions have been made. First, we assume that vehicles communicate through a wireless interface, implementing a CSMA/CA MAC layer protocol that provides a RTS/CTS/DATA/ACK handshake sequence for each transmission. Vehicular sensor network adopt IEEE 802.11 as a cost efficient and widely deployed solution for network communication. IEEE 802.11b is a draft amendment to IEEE 802.11 standard to add wireless access in vehicular environment. It supports data exchange for vehicle to vehicle (V2V) and vehicle to infrastructure (V2I) in the licensed ITS band. Performance evaluation of IEEE 802.11b is done in [3], [4], [5]. The number of sink nodes that are distributed beside the road is very small in proportion to the number of vehicular sensor nodes. So, we assume that sink node has a relatively fast processor and a large storage device and has enough energy resources. In addition, it has very large data base to store information from the vehicles. However, vehicular sensor node has lower storage space and low processor capability. It is assumed that each vehicle has unique ID to identify the vehicular node and included in each message sent. Finally, we assume devices participating in vehicular networks are highly mobile with a speed up to 180km/h.But, their mobility patterns are predictable due to the constrained movement imposed by the road system and constrained speed imposed by speed limits, traffic conditions and signals. In fact, the mobility of vehicular sensors poses challenges to the communication system. Mobility undermines the reliability of communication and also causes the topology to continuously change.

ISSN 1013-5316; CODEN: SINTE 8 Sci.Int.(Lahore),24(1),13-19,2012

14

This paper focuses on how to deploy WSN as an intelligent transportation system over effective and efficient architecture for data collection and data exchange allowing vehicle traffic monitoring and control. The rest of the paper is organized as follow. Section II provides a back ground and related work in vehicular sensor networks. Section V introduces the proposed scheme for data harvesting and dissemination. Section IV evaluates the simulation results conducted with C++. The final section concludes the paper.

RELATED WORK

Recently, there is a strong interest from researcher’s in deploying WSNs in VSNs in many applications that involve constraints related to the traffic conditions such as traffic monitoring and control, traffic estimation and monitoring parking. Some research focus in moving vehicles to enable wireless sensor communication between roadside and vehicle or between vehicles. These applications aim to make roads safer and less congested in order to save the time for people. It’s important to note that these applications encounter three types of communications [6]: Vehicle-to-Vehicle (V2V) communication: vehicles

are equipped with sensors in order to exchange information that is crucial to avoid severe situations like traffic jam avoidance.

Vehicle-to-Infrastructure (V2I) communications: information flow from vehicles to sensors installed on roadway infrastructure

Hybrid communication: uses both V2V and V2I architecture

In [7] the author proposed a scheme based on the hybrid communication. Vehicles will send all their sensed data to infostations, where the data will be forwarded to corresponding infostation based on the infostations management area. Later, any vehicle requesting sensed data can request these infostation, which is more of an indirect form of vehicle to vehicle communication using relay nodes forming another type of data harvesting protocol. However, this technique requires installation of an infostation infrastructure, which can be very costly and complex. An effective traffic monitoring system is studied in [8] which is capable of detecting, classifying and determining the direction of travel of vehicles on a two-lane road. One of the biggest issues in realizing VSN is concerned with data harvesting which is a technique where sensors create data that summarize the characteristic of the data and send it to the target. In [9], the author proposed a novel multi-hop data harvesting (MDH) method for the V2I architecture. MDH have two scheme proposed for VSN. The MDH scheme using replicas (MDH-R) is proposed for requesting data from single sensor node, while data aggregation scheme is designed (MDH-RA) for cases when the request was made to a geo cast region. Many applications in VSN may require multi-hop data transmission to meet real-time constraints. The author see multi-hop data dissemination capabilities may become ideal for future researches in this area. In some situations it becomes obvious that flooding a message into a whole network is not appropriate and will cause a high level of congestion. At the same time request/reply schemes might not be appropriate, e.g. since

the information is needed by many nodes at the same time. It has therefore been proposed to replace the unstructured flooding of packets by some sort of hierarchical distribution using clustering. Clustering come out as new brand of vehicular networks, whose propose is the real time gathering and diffusion of information. In [6] the author used a Clustering Gathering Protocol (CGP) that is across layered protocol based on hierarchal and geographical data gathering, aggregation and dissemination. The goal of CGP is to gather from all node in the vehicular ad hoc network in order to offer different kind ITS services, it allows telecommunication/service providers to get valuable information about the road environment in a specific geographical area, using V2V network to minimize the high cost links usability and base station to gather information from the vehicles Another cluster-based approach is presented in [10]. Here, cars within a small region autonomously form a cluster. Owing to the close vicinity, direct communication between those cars is possible. However, communication with other vehicles or clusters has to be performed by relaying vehicles that are part of several clusters.

2. OVERVIEW

Our system framework is consisting of static road side node (sink node), and mobile vehicular sensors. Road side nodes are distributed according to the road segmentation for collecting data from mobile vehicular sensors passing by and to exchange data about traffic condition. While mobile sensors on vehicles monitor the road condition and send this information to active mobile neighbors when they are close enough then to the road side sink node (see Figure 1). We focus on vehicular mobility, collaboration between mobile and static nodes, and information exchange among mobile vehicles. Mobile vehicles can gather latest information spreading on the map out of the reach of static node, whereas static node can gather information from more active vehicles coming across, where the connectivity between static and mobile nodes and also between mobile and mobile nodes are most likely meaningful and useful.

Figure 1: Vehicular Sensor Architecture

3. ROAD SEGMENTATION

The roads are divided into small segments. On each road segment, there are two road side node (sink node) located at the both ends of the segment, as shown in Figure 2. Usually, the road side nodes are placed on the roadside with different distances based on the road environment to collect data from active vehicles passing by. So, drivers

Sci.Int.(Lahore),24 (1),13-19,2012 ISSN 1013-5316; CODEN: SINTE 8

15

can get the road condition before entering this segment; while vehicular mobile sensors, assisted by themobility of the vehicles, can know the road information along their own path. The road is divided into virtual segments with the different length (Figure 2). In each segment an active node is selected to gather data from all nodes in its segment, aggregate them, and send the result to the next sink node.

4. PROPOSED SCHEME

The proposed scheme consists of providing a feasible, efficient and robust vehicular sensor network framework to

monitor road traffic and provide desired and reliable

information for users, particularly for drivers in

automobiles. In the context we decided to use active node

based solution for the V2V dissemination. The scheme will

be divided into three parts: Active vehicular sensor node

selection phase, data harvesting/dissemination phase, and

the data sharing phase.

Figure 2. Road segmentation

Figure 3. Active node selection flowchart

ACTIVE VEHICULAR SENSOR NODE SELECTION PHASE Every road segment has two such sink near the ends.Every

vehicle enter the segment will send hello message to the sink

node at the beginning of each segment containing the vehicle

ID and its speed.Then, the sink node will store this

information in the data base.Using this information, the sink

node will create an active node based on two parameters as

threshold; the maximum number of vehicles (passive nodes)

detected in the road, and the elapsed time.

First, the sink node stores the data about each vehicle

entering the segment until reaching the maximum number of

vehicles. Second, the sink node will choose one of these cars

randomly to be an active node by broadcasting control information as a request including the ID of the vehicle and

its velocity.When collecting this request, the other vehicle

nodes (passive nodes) identify the target node dedicated for

forwarding their information. All other nodes must know the

active node in their segment. To do so, the AVS will include

its ID in the packet as new destination and then diffuse reply

to the sink node which will be also received and processed

by its neighbored vehicles.The mobility of vehicular sensor

network can affect the topology of the network.Therefore,

we also use the elapsed delay to control when the sink sends

request to create an active node exactly before the group of

vehicle leave the wireless range of the sink.This time will be calculatedusing theequation below.

Where is the distance that our wireless communication can

support (IEEE 802.11), and reflects the mobility of the

vehicles which is the velocity of the vehicular sensor

node.As a result, we need two counters in the sink node one

for time and the other for the number of vehicles. So, in this

way we guarantee that we create an active node for each

group of vehicles, figure 3 and the following pseudo-

codeprovides more details in explaining the algorithm.

1. while (EOS)

2. ENSURE VEE

3. if (N = TLV) then

4. CREATE an active node 5. elseif (T = TLT) then

6. CREATE an active node

7. else goto 5

8. end if

9. end while

Pseudo code notations:

EOS: End of simulation.

VEE: Vehicle wants to enter/exit the current base station’s

wireless range.

TLV: Threshold level to create a new active node.

N: Admitted no. of Vehicle’s for the current base station.

TLT: Threshold level in terms of average time of the vehicles to leave the range of the current base station.

T: Current Time.

ISSN 1013-5316; CODEN: SINTE 8 Sci.Int.(Lahore),24(1),13-19,2012

16

Figure 4. Active Node Selection

Segment-based active node solutions provide less propagation delay and high delivery ratio with also bandwidth fairness. In [6] the authors use a distributed clustering algorithm to create a virtual backbone that allows only some nodes to broadcast messages and thus, to reduce significantly broadcast storms. When the active node receives the data from the passive node originally holding the data, it will process it in store & forward fashion instead of sending directly to the sink node when the next sink node is far. Similarly, the passive node keeps the data in its memory during a parametric time, and waits for active node to be closest enough from it. An example is given in figure 5, where the node (F) cannot reach the active node. In this case, it will store its data till it reaches the active node or wait another active node. All nodes in the segment, transmits in unicast their sensed data to the active node using a mechanism similar to DCF (Distributed Coordination Function). Themechanism consists of: First, each node wait a random bounded back-off time, Then at the end of the back-off time, the node sends a

Request To Send (RTS) to the active node, Next, the active node acknowledges the reception by

sending a Clear To Send (CTS) message, Finally, the node sends its data to the active node. The road architecture and main concept of this mechanism are shown in figure 5.

Figure 5. Data Harvesting Model.

Passive vehicular sensor nodes will monitor the traffic condition by measuring the speed of the vehicle to send it to the active node in its segment. The active vehicular sensor node will store the data message and count the number of vehicles in its segment, supporting limited number of vehicles. Related to the event representation the sink node

( ) compare the number of vehicles and their average velocity that reside in its segment, in order to take decision about congestion. This data will be forwarded to sink node ( ) that is located at the end of this segment. In turn, the sink node will forward this data to the preceding sink node to update its data about traffic condition in this segment and floods it to the new coming vehicles that wish to enter this segment. When the vehicle is going to enter a new road segment, the sink node at the near end will communicate with this vehicle. So, the vehicle can know the road condition of this segment in advance. There is no need to place more sink node in the middle of one segment, because even if the vehicle get information at the middle of a segment, drivers still cannot change their direction or change the route trip.

DATA SHARING PHASE

In some areas, data traffic may increase dramatically due to many vehicles requesting for data at the same time. In this case, there is a high probability that more than one vehicle is requested to be an active vehicular node from the sink node ( ). When the active node reach its limit from the passive node due to the congestion that involve many vehicle in the segment, the sink node sends request to create new active node to provides fairness. This is very important in a sensor network where every node has to send its data. It also reduces significantly broadcast storms and thus avoids collisions. Moreover, case that we can have new active node when there are two separate groups of cars where one of them reaches the end of wireless communication range of sink( ) but the maximum number of passive node still not complete. In this case, the sink node will request new active node from the coming group based on time factor in order to ensure that each group have active node to send information to it. It can be seen from figure 6, when there are many vehicles having data to be sent about the traffic condition which means congestion occurred on a specific segment. In this case, the active node sends a message to the sink node ( ) in order to create new active node.

Figure 6. Sharing Phase.

5. SIMULATION

The simulation was carried out in C++ for 1000 seconds. Depending on the number of base stations and their relative

ranges the road site is segmented. IEEE 802.11b is

considered to operate with CSMA-CA with minimum back-

Sci.Int.(Lahore),24 (1),13-19,2012 ISSN 1013-5316; CODEN: SINTE 8

17

off exponent set to 3 and having 4 as maximum number of

back-off with channel sensed every 0.1 seconds and

operating in 2.4GHz frequency, ACK waiting duration is set

to 0.05 seconds for the participating active and passive

nodes, and having a channel bandwidth of 20MHz. The

maximum data rate is 11 Mbit/s and the modulation is achieved using DSSS with only 1 MIMO stream into

consideration. The threshold level for the admitted vehicles

that will create an active node is varied with 5, 10 and 15

numbers to study the effect of congestion based on the

number of vehicles which is random. The road site can have

a maximum capacity of 100 or 200 vehicles for the above

mentioned threshold levels and the speed of the vehicles

have a range from 0-180km/hr. First of all, the number of active agent’s is of utmost importance to study the performance of the system. In figure 7, there is a clear difference between the total number of vehicle that enter the segment and the subsequent active agents. This reflects that the number of messages between the vehicle’s and infrastructure would be reduced to 90%. The total number of active agents/nodes during a given time interval is calculated as number of total vehicle in that interval over threshold plus the number of active nodes that left the boundary of each segment and wait for other segments to determine their active and passive nature. Figure 8 illustrates the number of messages transferred from passive to active vehicles on the whole system when the average speed is varying for 100 vehicles. It is observed that when all the vehicles are present within the system, the number of messages is quite stable. It can be concluded that active nodes solution is convenient for different kind of mobility model such as high speed (low density) or low speed (high density) and also that nodes velocity doesn’t affects the active nodes performance. Indeed, the number of messages doesn’t increase significantly with rising speed.

0 100 200 300 400 500 600 700 800 900 10000

20

40

60

80

100

120

140

160

Time(sec)

Num

ber of V

ehic

les

Number of vehicles vs Time

Total Number of Vehicles

Number of Active Nodes for Nth

=10

Number of Active Nodes for Nth

=5

Number of Active Nodes for Nth

=4

Figure 7. Number of Vehicles vs Time

0 20 40 60 80 100 120 140 160 1804000

4500

5000

5500

6000

6500

7000

7500

8000

Velocity (km/h)

Num

ber

of

Packets

fro

m P

assiv

e t

o A

ctive

Number of Packets vs Velocity for 100 vehicle

Figure 8. Number of packets from passive to active nodes

In figure 9, when the system is procured with 10 communication channels and the velocity of the vehicles are kept in this range (20–160km/hr), the number of lost packets will abruptly increase from 18 – 62 ( approx. 3.5 times). This increase is due to the high mobility of the vehicles that affect the access channel. But when the communication channel is increased to 15, the vehicles have high probability to access the channel and the number of lost packets decreases to 40 which is approx. 1.5 times reduced as compared to 62. Comparison of figure 9 and figure 10 reveals the fact that there is an influence of mobility on packet loss. As highlighted above in figure 9, packet loss occurs from even at low velocity due to the mobility difference between the active nodes and the base station. However, usually there will be a small difference of velocity between active and passive nodes. As a result, the packet loss is negligible. Figure 11 show how the blocking probability evolves between active and sink station for a rising velocity of vehicles. When the vehicles begin to enter a segment, the average system velocity is low and the system is in a congested state. In this scenario, more nodes will try to communicate with the base station resulting in a higher blocking probability. As the average system velocity increases the blocking probability decreases due to the fact that the vehicles are far apart. Finally, the blocking probability starts rising again after 55km/hr which is the optimal speed to access the channel. For an increasing velocity the system goes through the back-off due to packet loss and resulting in a rising blocking probability. When the distance margin to access the base station for any active node increases the blocking probability will be affected as illustrated in figure 12. Because with the increased distance the node will take much time for data transmission and even for back-off. The channel communication factor also contributes towards this effect on the blocking probability. Higher communication channel leads to a lower the blocking probability.

ISSN 1013-5316; CODEN: SINTE 8 Sci.Int.(Lahore),24(1),13-19,2012

18

0 20 40 60 80 100 120 140 160 1800

20

40

60

80

100

120

140

160

180

200

Velocity (km/h)

Num

ber

of

Lost

Packets

fro

m A

ctive t

o B

asesta

tion

Number of Lost Packets vs Velocity

Nch

= 15

Nch

= 5

Nch

= 10

Figure 9. Number of Lost Packets from Active to Base Station

0 20 40 60 80 100 120 140 160 1800

200

400

600

800

1000

1200

1400

Velocity (km/h)

Num

ber

of

Lost

Packets

fro

m P

assiv

e t

o A

ctive

Number of Lost Packets vs Velocity

Nch

= 5

Nch

= 10

Nch

= 20

Figure 10. Number of Packets Lost from Passive to Active

CONCLUSION

In this paper, a scheme for data harvesting and data exchange based on active vehicular sensor nodes for real time traffic flow is proposed. We provide an effective and collaborative hybrid method to deliver important information to particular end users. We use road side sink and vehicular sensor nodes to restore and exchange data, and then we study our novel scheme to prove that the mobility of the nodes affects the data transmission and also the blocking probability to access the channel. An optimal system velocity has been defined in order to have a stable system. Finally, the active node solution is used to reduce the broadcast storm and also the number of vehicles that communicate with the base station in the form of active nodes.

0 20 40 60 80 100 120 140 160 1800.02

0.04

0.06

0.08

0.1

0.12

0.14

0.16

velocity (km/h)

Blo

ckin

g P

robabili

ty

Blocking Probability vs Velocity (A->BS)

Nch

= 7

Nch

= 11

Nch

= 15

Figure 11. Blocking Probability

10 20 30 40 50 60 700

0.01

0.02

0.03

0.04

0.05

0.06

Margin

Blo

ckin

g P

robabili

ty

margin choosing effect

Nch

=11

Nch

=14

Nch

=17

Nch

=20

Figure 12. Blocking Probability in terms of margin

ACKNOWLEDGMENT

The authors would like to thank the Research Center of the College of Computer and Information Sciences - King Saud University, for its support in funding this work.

REFERENCES

[1]. J. Yick, B. Mukherjee, D. Ghosal, “Wireless sensor network

survey”, Computer Networks, Science Direct, April 2008.

[2]. Munir, S.A.; Biao Ren; Weiwei Jiao; Bin Wang;

DongliangXie; Man Ma , “Mobile Wireless Sensor Network:

Architecture and Enabling Technologies for Ubiquitous

Computing”, Advanced, pp:113 – 120, August 2007.

[3]. Vladimir Bychkovsky, Bret Hull, Allen Miu, Hari

Balakrishnan, and Samuel Madden. “A measurement study of

vehicular internet access using in situ Wi-Fi networks”. In

MobiCom ’06:Proceedings of the 12th annual international

conference on Mobile computing and networking, pages 50–

61, New York, NY, USA, 2006.

[4]. David Hadaller, Srinivasan Keshav, Tim Brecht, and

Shubham Agarwal. “Vehicular opportunistic communication

under the microscope”. In MobiSys ’07: Proceedings of the

Sci.Int.(Lahore),24 (1),13-19,2012 ISSN 1013-5316; CODEN: SINTE 8

19

5th international conference on Mobile systems, applications

and services, pages 206–219, New York, NY, USA, 2007.

[5]. J. Ott and D. Kutscher. “Drive-thru internet: IEEE 802.11b

for automobile users”. In 23rd Annual IEEE Conference on

Computer Communications (INFOCOM), 2004.

[6]. I. Salhi, M. O. Cherif, S. M. Senouci, “A New Architecture

for Data Collection in Vehicular Networks”, IEEE

International Conference onCommunications ICC'09, pp.1–6,

August 2009.

[7]. U. Lee, E. Magistretti, B. Zhou, M. Gerla, P. Bellavista, A.

Corradi. “Efficient data harvesting in mobile sensor

platforms”, Proceedings of the 4th annual IEEE International

Conference on Pervasive Computing and Communications

Workshops PERCOMW’06, pp. 352, 2006.

[8]. H. Ng, S.L. Tan, J. G. Guzman, “Road traffic monitoring

using a wireless vehicle sensor network”, International

Symposium on Intelligent Signal Processing and

Communications Systems, ISPACS’08. pp. 1–4, Feb. 2009.

[9]. K.W. Lim Y.-B. Ko, “Multi-hop data harvesting in vehicular

sensor networks”, Communications, IET, Vol.4, no7,

pp.768–775, April 2010.

[10]. Chennikara-Varghese J, Chen W, Hikita T and Onishi

R,“Local peer groups andvehicle-to-infrastructure

communications”. GLOBECOM’07: Proceedings of the

IEEE GlobalTelecommunications Conference – Workshops,

pp. 1–6, 2007.

Computers and Electrical Engineering 37 (2011) 941–957

Contents lists available at SciVerse ScienceDirect

Computers and Electrical Engineering

journal homepage: www.elsevier .com/ locate/compeleceng

Wireless propagation channel modeling for optimized Handoffalgorithms in wireless LANs q

Monji Zaidi a,⇑, Ridha Ouni b, Rached Tourki a

a Electronic and Micro-Electronic Laboratory (ElE, IT-06) FSM, University of Monastir, Monastir 5000, Tunisiab College of Computer and Information Sciences, King Saud University, Saudi Arabia

a r t i c l e i n f o

Article history:Received 9 November 2009Received in revised form 5 September 2011Accepted 12 September 2011Available online 24 October 2011

0045-7906/$ - see front matter � 2011 Elsevier Ltddoi:10.1016/j.compeleceng.2011.09.003

q Reviews processed and approved for publication⇑ Corresponding author. Tel.: +216 22691815; fax

E-mail addresses: [email protected] (M. Za

a b s t r a c t

In this paper, we present a time-series analysis technique which covers the basic conceptsand mechanisms driving the wireless propagation channel. We also use a generated seriesfor simulation study of Handoff performance showing the impact of multipath phenomena.Moreover, the extraction of the average signal has been used to reduce significantly thenumber of unnecessary Handoffs.

The wireless propagation channel modeling is based on the linear model concept of thereceived power from the access point (AP). This concept has a crucial role in modeling newdecentralized Handoff based on the ratio of expected and current signal slopes already pro-vided by the linear model. Hence, a fuzzy-based solution is developed and a comparisonwith the analytical solution results is established. Until recently, Handoff mechanismsare implemented entirely in software, which increasingly becoming infeasible. Therefore,this work attempt to follow the top-down co-design approach providing hardware proto-type which leads to reduce the power consumption and support high processing speed.

� 2011 Elsevier Ltd. All rights reserved.

1. Introduction

The man-made structures [1] such as buildings or small houses in suburban areas, with sizes ranging from a few meters totens of meters, dramatically influence the wireless propagation channel. In urban areas, the size of structures can be even larger.Likewise, in rural and suburban environments may reach similar dimensions. These features are similar or greater in size thanthe transmitted wavelength (metric, decimetric, centimetric waves) and may both block and scatter the radio signal causingspecular and/or diffuse reflections. These contributions may reach the mobile station (MS) by way of multiple paths, in additionto that of the direct signal. In many cases, these echoes make it possible that a sufficient amount of energy reaches the receiver,so that the communication link is feasible. This happens especially when the direct signal is blocked. Hence, in addition to theexpected distance power decay, two main effects are signaled in mobile propagation: shadowing and multipath [2].

Wireless links have intrinsic characteristics that affect the performance of Handoff protocols. In this paper, we reviewmany simulation models for cellular and WLAN links used in the design of Handoff protocols. We also consider the interplaybetween wireless links and Handoff. We argue that the design and evaluation of Handoff protocols can be improved by pro-viding available models of wireless links that strike a balance between realism, generality, and detail. We consider how theappropriate models for wireless links can help in Handoff optimization and evaluation.

We can identify three levels in the variation rate of the received signal as a function of the distance between the accesspoints (AP) and MS, namely, very slow variations due to the range, slow or long-term variations due to shadowing and fast or

. All rights reserved.

to Carvalho.: +216 73501785.idi), [email protected] (R. Ouni).

942 M. Zaidi et al. / Computers and Electrical Engineering 37 (2011) 941–957

short-term variations due to multipath. Other operating scenarios, where both ends of the link are surrounded by obstacles,are indoor communications where walls, ceiling, or various pieces of furniture will clearly determine the propagation con-ditions. In an indoor environment, the corner effects are very seldom studied. It causes dropping off the received signalstrength (RSS) at the MS by 20dB or more in few meters when turning a corner [3]. Therefore, several characteristics ofthe communication environment should be taken into account while designing Handoff algorithms. Moreover, many Hand-off issues should be revived before its development in microcells.

The major issue deals with the implementation process which includes specific features to meet the Handoff timing con-straints and QoS guarantee. Therefore, in the simulation environment, the Handoff algorithm pseudo-code could bedescribed in programming tool allowing concurrent processes and time sensitive instructions which are a primary attributeof hardware as offered by the hardware description languages (HDL). These features introduce flexibility to describe variableand real scenarios as well as initiating specific process when detecting certain event [4]. In one hand, the real-time packet-processing constraints imposed on the APs to support high line speeds motivate hardware based solutions, where the APfunctionality is implemented on application specific integrated circuits (ASICs). The requirements for flexibility and the com-plex nature of many of the processing functions, on the other hand, favor software based implementations. As result, thedesign and analysis of hardware-software architectures for such algorithms requires new models and methods, which donot fall under the domain of traditional embedded-systems design.

The rest of this paper is organized as follows. Section 2 provides an overview of related works. Section 3 briefly introducesthe basic concepts and mechanisms driving the wireless propagation channel. Section 4 evaluates the importance of theoverall Signal extracted from the fast variation in the removal of unnecessary Handoffs based simulation. The Section 5establishes a comparison of the proposed scheme with other methods existing in the literature in term of speed and powerconsumption. Section 6 describes the linear regression method applied to a measurement series of the received power froman AP. Section 7 develops a decentralized Handoff algorithm using fuzzy logic based approach on the slopes ratio betweencurrent and expected signals provided by the linear regression method. Finally, Section 8 summarizes the paper.

2. Related work

Many metrics have been used to support Handoff decisions, including the received signal strength (RSS), signal to inter-ference ratio (SIR), distance between the MS and AP, traffic load, and mobile velocity, where RSS is the most commonly usedone. The conventional Handoff decision compares the RSS from the serving AP with that from one of the target APs, using aconstant Handoff threshold value (Handoff margin). The selection of this margin is crucial to Handoff performance. If themargin is too small, numerous unnecessary Handoffs may be processed. Conversely, the quality of service (QoS) could below and calls could be dropped if the margin is too large. The fluctuations of signal strength associated with shadow fadingcause a call sometimes to be repeatedly handed over back and forth between neighboring APs, in what is called the ‘‘ping-pong effect’’ Over recent years, many investigations have addressed Handoff algorithms for cellular communicationsystems.

A novel terminal-controlled handover scheme in heterogeneous wireless networks was presented in [5] and [6]. Anetwork discovery algorithm with fuzzy logic and a Handoff decision algorithm using multi-criteria decision making(MCDM) based on vague sets are derived, which are both user-centric. In [7], we have proposed the hardware transformationand implementation of the Handoff protocol from its initial software description. We have implemented two models thatreduce the scan phase during the Handoff process. These models have been implemented on an application-specific inte-grated circuit (ASIC). A local averaging technique, which moves fast fading component from the received signal strength,was proposed in [8] to allow the conventional Handoff decision reacting more quickly to corner effects. A timer-based hardHandoff algorithm was presented in [9] to prevent unnecessary Handoffs caused by fluctuations due to shadowing, by whichthe choice of timer interval introduces the tradeoff between Handoff number and Handoff delay. A dynamic handover mar-gin decision based on a traffic balancing rule was proposed in [10] to resize the cells according to the spatial variability oftraffic. A speed-sensitive Handoff algorithm in a hierarchical cellular system was described in [11], in which microcells servethe slowly moving mobiles and macro-cells serve fast-moving mobiles. In [12] and [13], RSS and the mobile location andvelocity were used as metrics for making Handoff decisions using fuzzy logic. A table lookup approach, proposed in [14],determines Handoff margins based on the mobile location, the mean of the intensity of the signal and the standard deviationthereof.

Distance hysteresis for mitigating the fading effect on Handoff performance was presented in [15]. Making Handoffdecisions in various Handoff scenarios was presented in [15] and [16], where a suitable Handoff decision is provided for apredefined scenario. In the literature, most Handoff algorithms, based on the mobile location, suffer from a lack of practica-bility. The computational complexity of making a Handoff decision using fuzzy logic is excessive and establishing and updat-ing a lookup table to support a Handoff margin decision is time-consuming. The selection of a Handoff algorithm based onthe Handoff scenario only succeeds in cases that the mobile environment is similar to one of the pre-classified environments,and involves complicated processes to define the Handoff scenarios. It also relies on an updated database when applied in anew mobile user environment. Furthermore, most studies assume that location of the mobile can be perfectly determinedusing the global positioning system (GPS), which is not available for most existing mobile telephones. In reality, the perfor-mances of available location estimators are far from that obtainable using GPS technique.

M. Zaidi et al. / Computers and Electrical Engineering 37 (2011) 941–957 943

A normal Handoff scheme for channel carrying in mobile cellular networks has been reported in [17]. It increases thechannel reuse factor by 1 and it becomes difficult to take advantage of channel carrying if traffic were to exhibit strong deter-ministic correlations between neighboring cells. Handoff techniques in cellular networks are reported in [18,19].

Performance analysis with bandwidth efficient Handoff scheme is presented in [20]. Fuzzy logic based technique forHandoff in cellular communication have been reported in [21,22]. The Handoff criteria use threshold values to membershipfunctions. The possible weakness in [21] and [23] is the jump values inherent in some fuzzy sets and it only takes a non lineof sight (NLOS) transmission into consideration.

This paper proposes an optimized Handoff (in terms of reduction of unnecessary Handoffs) algorithm based on local aver-aging technique, which moves fast fading component from the received signal strength. (Not using additives equipments).However, since the MS has limited energy source, in the form of the battery pack, energy consumption should be minimized.An important factor in this works is to minimize and estimate the power consumption that our technique requires to per-form optimized Handoff.

Then, based on the possibility concept, the linear model of the received power from the actual AP has been proposed andits pivotal role in a new decentralized Handoff modeling has been established. The Handoff based on the ratio of the slopes ofnormal signal loss to the actual signal loss, provided by the linear model, is presented and the fuzzy based solution is sup-ported by comparing its results with the results obtained in analytical solution.

3. Basic concepts driving the WLAN propagation channel

3.1. Wave propagation model

Currently the 3 G wireless systems are being deployed in the 2 GHz band while wireless Local Areas Networks (WLANs)are beginning to be deployed in the 5 GHz band while, still, the 2.4 GHz band is the most popular mode for this application.The WLANs typically operates on unlicensed frequency bands, either the 2.4 GHz or the 5 GHz bands. They do not requireline-of-sight (LOS) conditions, which is a very desirable feature. The key element of a WLAN is a wireless AP. APs are con-nected to an Ethernet hub or server. They transmit a radio frequency over an area of several hundred feet, which can pen-etrate walls and other nonmetal barriers.

The signal from the AP can reach a target through its LOS path, or reflection paths, or diffraction paths and their combi-nation. Consider a scenario with maximum numbers of n access points, nr reflection paths, nd diffraction paths, nc combinedpath and one LOS path from the jth access point to a target, the received signal y(t) at the target is given by the equation 1.

YjðtÞ ¼ xjðt � s1;jÞLj þXnrþ2

i¼2

xjðt � si;jÞRi;j þXnrþndþ3

i¼nrþ3

xjðt � si;jÞRi;j þXnrþndþncþ4

i¼nrþndþ4

xjðt � si;jÞCi;j þ eðtÞ; 8j 2 1; . . . ; n ð1Þ

where i is the ith path to the target, t is the time, x(t) is the emitted signal from the access point station, e(t) is the back-ground and system noise at the source, and Lj, Rj and Ci,j are the weighting factors for LOS path, reflection paths, diffractionpaths and combined paths respectively. The time delay si,j or time of arrival (ToA), of the signal through the ith path with

distance di,j is given by: si;j ¼di;j

Vair.

Where, Vair represents the signal speed in air. The magnitudes of the factors are inversely proportional to the signalstrength losses of their correspondent paths. Each weighting factor depends on its path distance and geometric spreading.Additionally, the weighting factor Ri,j is dependent on the surfaces and positions of obstacles, while the factor Di,j isdependent on the frequency of the signal, the shape and positions of obstacles. The factor Ci,j can be expressed asCi,j = Di,j�Ri,j.

In a dynamic environment, all of the weighting factors may change with time depending on obstacles. Modeling RSS insuch an environment requires taking into account the all information of the movements, sizes, shapes and surface materialsof all obstacles. In NLOS conditions, where the LOS path is not available, the LOS path weighting factor Lj is zero. The diffrac-tion of an acoustic signal increases with the increase in the ratio between the wavelength and the obstacle size [24]. Thediffraction of a high-frequency signal, such as ultrasonic, with short wavelength is negligible. Therefore, for a high frequencysignal, Di,j and Ci,j are approximately zero. This means that the signals passing through the diffraction and combined paths aretoo weak to be detected.

Consider a small dynamic obstacle obstructing a signal path, the low-frequency acoustic signal will pass through theobstacle if its wavelength is larger than the dimensions of the obstacle, even though the correspondent weighting factor de-creases. As a result, small dynamic obstacles do not hinder any low-frequency signal.

3.2. Received signal characteristics

Two representative and extreme scenarios may be considered: (a) the case where a strong direct signal is available to-gether with a number of weaker multipath echoes, i.e., LOS conditions; and (b) the case where, a number of weak multipathechoes is received and no direct signal is available i.e., NLOS conditions.

944 M. Zaidi et al. / Computers and Electrical Engineering 37 (2011) 941–957

Case (a) occurs in open areas or in very specific spots in city centers, in places such as crossroads or large squares with agood visibility of AP. This situation may be modeled by a Rice distribution for the variations of the received RF signal enve-lope. Under these conditions, the received signal will be strong and with moderate fluctuations (Fig. 1).

Case (b) will typically be found in highly built-up indoor environments. This is a worst case scenario since the direct sig-nal is completely blocked out and the overall received signal is only due to multipath, thus being weaker and subjected tomarked variations (Fig. 2). This kind of situation may also occur in indoor environments where the signal is obstructed bydense masses of walls. The received signal amplitude variations in this situation are normally modeled with a Rayleighdistribution.

The received field strength or the received voltage may be represented in the time domain, r(t) or in the traveled distancedomain, r(x) . For carrying out the propagation channel measurements, the mobile speed, V, should remain constant. In suchcases, the traversed distance needs to be recorded too. In our simulations and in the series analyzed, we will assume a con-stant MS speed. For a constant V, it is quite practical to make the conversion directly between the representation in the time,r(t), and the traveled distance domains, r(x) = (t = x/V).

The variable x may either be expressed in meters or in wavelengths. Based on such signal recordings plotted in the dis-tance domain, it is possible to separate and study individually the fast and slow variations, which are due respectively tomultipath and shadowing. Fig. 1 and Fig. 2 show slow and fast variations (i.e., long-term and short-term variations) ofthe received power r(t), or r(x) from an AP respectively.

The received signal may, therefore, be described as the product of these two terms, when expressed in linear unitsr(t) = s(t) � f(t) or alternatively r(x) = s(x) � f(x). In dB, the products become additions, i.e., R(t) = s(t) � f(t) or R(x) = s(x) � f(x).

0 50 100 150 200 2505

10

15

20

25

30

35

40

45

50

55

Rec

eive

d vo

ltage

:slo

w v

aria

tions

(dB

μV

)

Traveled distance (m)

Fig. 1. Received power: Slow variation.

0 50 100 150 200 250-130

-120

-110

-100

-90

-80

-70

-60

-50

-40

Rec

eive

d po

wer

: F

ast v

aria

tions

(dB

m)

Traveled distance (m)

Fig. 2. Received power: Fast variation.

M. Zaidi et al. / Computers and Electrical Engineering 37 (2011) 941–957 945

4. Mean extraction and impact on the undesirable Handoffs

4.1. The average signal computing and construction

With the approach mentioned above, we are assuming that the fast variations are superposed on the slow variations.Fig. 3 illustrates an overall time series where the slow variations are also plotted. The figure also shows the fast variationsafter removing (filtering out) the slow variations. The slow variations can be extracted from the fast variations through low-pass filtering by computing a running means. This is equivalent to calculating the signal average for the samples within aroute section of length 2L equal to a few tens of wavelengths (equation 2).

SðXiÞ ¼1

2N þ 1

Xk¼N

k¼�N

fiþk for f i�N . . . fi . . . fi�N 2 fX=Xi � L < x < xi þ Lg ð2Þ

Where S(xi) is the local mean value at xi, xi which is the route position defined by, xi ¼ 2L2 , with 2N being the number of

samples received from -L to +L. Here fi represents the ith fast or short-term variations and [-L, +L] is the 2L length of the routeconsidered for the computation of the local mean. It is used to separate out the fast from the slow variations.

Typically lengths, of 10k to 10k, are used [5]. For example, for the 2.4 GHz (k=12.5 cm) band used in 3G mobile commu-nications, the average length could be 2L � 3. The average value, S(xi) computed for a given route position xi is usually calledthe local mean at xi.

The length (2L) of route considered for the computation of the local mean, i.e., used to separate out the fast variationsfrom the slow ones, is usually called a small or local area. It is within a small area that the fast variations of the receivedsignal are studied since they can be described there with well-known Rayleigh distributions.

4.2. Handoff review

In this section, we will take into consideration a scenario of the WLAN Handoff process; this is meant to show the advan-tage of performing Handoff based on the overall signal extracted from the fast variations. MS is assumed to travel from AP1to AP2. Midway between the two APs, the averages of the received signals strength are similar. Therefore, a threshold is set toinitiate a simple Handoff algorithm. Fig. 4 illustrates the two received signals from, both, old and new APs as well as the fixedthreshold. Based on the actual signal variation, the Handoff algorithm runs whenever the received signal is below the thresh-old and the alternative signal is high.

Fig. 5 illustrates the numerous switches that take place. If the extracted mean from the former received power is strictlydecreasing and the extracted mean from the new received power is strictly increasing, subsequently undesirable Handoff canbe eliminated. Finally the number of AP changes is drastically reduced as shown in Fig. 6. Of course, real Handoff algorithmsare much more complex, and involve different criteria which are part of the network optimization process.

This method selects the AP delivering the higher power at the MS location during the Handoff processing duration. Thedecision is based only on the RSS measurement which leads to many unnecessary Handoffs, even when the signal of the cur-rent AP is still at an acceptable level.

0 50 100 150 200 250-140

-130

-120

-110

-100

-90

-80

-70

-60

-50

-40

Rec

eive

d po

wer

and

its

mea

n ex

trac

tion

(dB

m)

Traveled distance (m)

Fast variations

Overall signal

2L

xi

Fig. 3. Fast variation and its mean extraction.

Fig. 4. Threshold and received signals from old and new APs.

Fig. 5. Aps handling the communication during Handoff and using fast variation signals and threshold.

Fig. 6. APs handling the communication during Handoff and using the overall signal and hysteresis.

946 M. Zaidi et al. / Computers and Electrical Engineering 37 (2011) 941–957

M. Zaidi et al. / Computers and Electrical Engineering 37 (2011) 941–957 947

This scheme allows a MS to Handoff only if the overall signal of new AP is sufficiently stronger (by a hysteresis margin, H)than the current one. This technique prevents the so-called ping-pong effect, the repeated Handoff between two APs causedby rapid fluctuations in the received signal strengths from both APs. The first Handoffs, however, may be unnecessary if theserving AP is sufficiently strong.

4.3. Handoff methods: description and comparison

In this simulation, there are four Handoff methods which performance will be compared.

� Normal hysteresis method� Hysteresis plus dwelling timer method� Trajectory-Aware vertical Handoff method and� Proposed ‘‘Local and Variable Average Extraction plus Hysteresis (LVAEH)’’ method.

4.3.1. Normal hysteresis methodIn this method, Handoff is performed whenever the RSS of new AP is higher than the RSS of old AP bay a predefined value.

[25]. Simple pseudo codes describe the Handoff algorithm.If (RSSnew - RSSold) > HysHandoff;End.In this simulation, the Hysteresis value is assumed to be 10dB.

4.3.2. Hysteresis plus dwelling timer methodIn this method, whenever the RSS of new AP is higher than the RSS of old AP bay a predefined hysteresis value, a Timer is

triggered. When this Timer reaches certain specified value, Handoff is processed. The dwelling is reset when the RSS of newAP is not higher than the RSS of old AP bay the hysteresis value or when Handoff is processed [26,27]. The following pseudocodes may describe this algorithm.

If (RSSnew - RSSold) > HysTimer ++ = Sampling time;ElseReset Timer;EndIf Timer > dwelling DelayHandoff;Reset Timer;End;In this simulation, the Hysteresis value is assumed to be 10dB and dwelling delay is assumed to be 3 sec.

4.3.3. Trajectory-Aware Vertical Handoff (TAVH) methodIn this method, the position, velocity and RSS of MS are calculated and every data is taken in account in Handoff decision.

A Handoff is carried out whenever the position of MS has reached to a certain boundary, regardless of the RSS. This reducesthe rate of Handoff failures. Here, the boundary is a safety distance of MS from the AP to assure a successful Handoff and thisboundary is not fixed and is varying according to the position and velocity of the MS. On the other hand, Handoff is also car-ried out whenever the RSS of the MS has dropped below predefined threshold value (-60 dB in this simulation). The followingpseudo code describes the dwelling TAVH method which is deployed in [28].

If (position_of_MT > Safe_Boundary) or (RSS_LSL < Thershold)Handoff;End;

4.3.4. Proposed Local and Variable Average Extraction plus Hysteresis (LVAEH) methodThis method continuously computes the average of the received power from two APs (new and old). This computation

aims to combine each 2L portion of the traveled distance with an S(xi) value. The length (2L) is not fixed but, it is variableaccording to the velocity of MS and the frequency band used in 3G communication. For example, when the 2.4 GHz band isdeployed, the wavelength is k = 12.5 cm. So, when typically lengths of 10k to 10k are used [1], the average length would be2L � 3-6 m. The local mean at xi is computed using the equation 2.

When a new AP provides higher S(xi) than the old AP bay a predefined hysteresis value (-15 dB in this simulation), Hand-off is processed. Our pseudo code includes equations computing power signal average plus other parameters taking decisionsto initiate Handoff.

Fig. 7. Number of unnecessary Handoffs for each method.

948 M. Zaidi et al. / Computers and Electrical Engineering 37 (2011) 941–957

Old communication establishedIf x>2L

S ¼Xk¼N

k¼�N

fiþk for f i�N . . . fi . . . fi�N 2 fX=Xi � L < x < xi þ Lg;

SXi¼Xk¼N

k¼�N

fiþk for f iþN . . . fi . . . fi�N 2 fX=Xi � L < x < xi þ Lg;

If ðSXiÞnew——ðSXi

Þold > HysHandoff;ElseMaintain old communicationUnder five different scenarios, these methods are simulated to evaluate the number of initiated Handoffs. Fig. 7 estab-

lishes a comparison between our proposed solution and all methods previously described in section 4.3. As result, our pro-posed method guarantees a minimum number of Handoff processes avoiding ping-pong situations. Especially, it performs till65% Handoff initializations lower than the TAVH method.

For performance evaluation, the handoff latency and the loss rate are considered as two QoS metrics for both standardand LVAEH algorithms. The Handoffs latency is defined as the time interval from the time when the MS is disconnected fromits current AP till the time when the MS receives the re-association response for its new location. In order to evaluate theHandoff latency, different cellular transition scenarios have been developed to simulate these algorithms. Fig. 8 showsthe impact of our proposed LVAEH scheme on the handoff latency compared to the standard algorithm. For 9 scenarios,the Handoff latency tolerated in LVAEH scheme is reduced for 64 to 85.7 % compared to the standard protocol.

We assume that during the Handoff processing delay, all the data packets destined for the MS are lost which leads tointerrupt the communication. Consequently, the proposed LVAEH scheme also guarantees lower data loss rate which reflectsthe quality of the communication during the Handoff process.

5. Hardware implementation and power consumption

There are two alternatives to implement wireless algorithms in the Medium Access Control (MAC) layer. The firstalternative is a Central Processor Unit (CPU)-based solution. It uses software for protocol analysis and CPU, such asDigital Signal Processing (DSP), for process management. It is more flexible in design stage and easy to modify and updatethe protocol. However, the low processing speed and the higher cost present its major weakness. The second alternativeimplements a hardware prototype following the top-down co-design approach. This alternative offers the circuitreconfiguration and very high speed processing suitable for real time communications. But, it needs long developmenttime. This work adopts the second alternative to implement our proposed LVAEH method at the MAC abstractionlevel.

Yet, the very fast growth of the modern VLSI technology offers a hardware realization of an ever-growing share ofmathematical means. New algorithms which satisfy VLSI-technology requirements are needed. These algorithms performthe features of the hardware prototype in terms of processing delay, chip area, and power consumption.

Fig. 8. LVAEH and QoS parameters. (a): Handoff latency, (b): lost data.

M. Zaidi et al. / Computers and Electrical Engineering 37 (2011) 941–957 949

5.1. Mean extraction Process: Design and implementation

Fig. 9 shows the mean extraction process flow chart responsible to provide S(xi) values (equation 2) which make usefuldecision for handoff initialization. It also allows detecting and removing unnecessary Handoff. Fig. 9 correlates between inone side the finite state machine operating as detailed in section 4.3 and in other side the sub-modules deployed to achievearithmetic operations (additions, divisions) and process data and events (Fig. 9).

Fig. 9. Flow chart of the signal mean extraction process.

950 M. Zaidi et al. / Computers and Electrical Engineering 37 (2011) 941–957

Five MAC components have been developed in order to implement the average extractor process. As illustrated in Fig. 10,these components include a controller (or scheduler), receiver, Adder, Divider and a shared memory. The controller serves toschedule tasks and synchronize module interactions for the whole process. The receiver is responsible to acquire the signaland extract RSS. As given by the equation 2, the adder and divider components apply arithmetic operations at discrete posi-tions providing one sample every 2L distance. The shared memory allows storing up to 256 words of 16 bits and serves asmailbox between these components.

5.2. Building blocks specifications

5.2.1. Receiver ModuleThe MS receives Message Protocol Data Units (MPDUs) from the Physical Layer Convergence Protocol (PLCP) level and

decodes packets. Table 1 lists the MAC receiver interface signals and describes their significations.

Fig. 10. Top level structure of the average extraction system.

Table 1Receiver interface signals (I. Input, O. Output).

Name Type Description

clk I:bit Operation clockreset I:bit Initialization signalRecep_valiv I:bit Input from the controller module, it requests receiving dataRts_recep I:bit Notifies transmitter that receiver got Request to Send (RTS) frameIn_recep I[15:0] Data bus from physical layer: (Received power)End_recep O:bit Notifies Controller that reception is completedCts_recep O:bit Notifies that transmitter sent Clear To Send (CTS) frameWrite O:bit Enable memory for writing dataOut_recep O:[15:0] Enable to save the received data in memoryAdr_recep O:[7:0] Address bus

Table 2The adder in-out put ports.

Name Type Description

Clk I:bit Operation clockReset I:bit Initialization signalIn_somme I[15:0] Power valueLire_mem I[15:0] Input port from the controllerAdr_data O[7:0] Memory bus addressRead O:bit Enables memory for reading modeSomme O[15:0] Addition result, returns

Pk¼Nk¼�Nfiþk value

Table 3The divider in-out put ports.

Name Type Description

Clk I:bit Operation clockReset I:bit Initialization signalnum I[15:0] Dividendden I[15:0] Divisorquot O[15:0] Quotient (division result)rest O[15:0] Division remainder

M. Zaidi et al. / Computers and Electrical Engineering 37 (2011) 941–957 951

5.2.2. Adder componentFor each distance x equal to 2L, 2n+1 values of the received power must be calculated. We developed a pseudo-code using

Hardware Description Language (HDL) for 2n+1 added samples. The addition function reads 2n+1 samples from the memory(in_somme), adds these values and returns the Sum (Somme) as result. The function is generic able to support different sizesof inputs. In the mean extraction process, the main function of the adder is to calculate

PNk¼�N f iþk value after each 2L dis-

tance. Table 2 outlines the adder interfaces and describes their significations.

5.2.3. Divider componentWe developed a HDL pseudo-code for generic division. The function uses as inputs two unsigned numbers (num and den)

with the same size and delivers as division result the quotient with similar features as the input parameters. In the meanextraction process, the divider consists of calculating SðXiÞ ¼ 1

2Nþ1

PNk¼�Nfiþk values after every 2L propagated distance. The

main interface signals deployed for unsigned number division are described in Table 3.

5.2.4. Controller moduleIn this design, all the actions are controlled and organized by the control module (scheduler). The controller is mainly

responsible to handle information or data from the physical layer and to coordinate the interaction between all the othermodules especially arbitrating the traffic from/to the shared memory.

The controller schedules the tasks as follows:

� Activates, at the same time, the receiver and the memory to receive and store received data from the current AP.� Compares the value of the traveled distance with 2L.� When traveled distance is equal to 2L

Table 4FPGA Im

ReceAddeDividCont

Stops receiving dataMakes memory accessible in reading

� Enables Adder to calculatePN

k¼�Nfiþk

� Enables Divider to calculate SðXiÞ ¼ 12Nþ1

Pk¼Nk¼�Nfiþk

� Compares S(xi)new-S(xi)odd with the Hysteresis value

5.2.5. SRAM MemoryIt is an external memory generated by STMicroelectronics library. It is used as shared memory to store data delivered by

an AP and exchange them between the different components. This memory allows storing up to 256 words of 16 bits.

5.3. Synthesis results

In the RTL level, VHDL has been deployed as hardware description language allowing to translate the functionalities of thedifferent blocks realizing the mean extraction process. Recently, the FPGA circuit solution is considered as one of the mostused prototyping environments. In fact, with the increase of the available programmable cells in this circuit, it is possible toimplement a wide range of sophisticated algorithms as reusable IPs blocks. Xilinx ISE tool has been also used for synthesisand design implementation on Xilinx Virtex V FPGA circuits. This environment allows implementing and reconfiguring hard-ware and programmable systems. Table 4 shows synthesis results and power consumption estimations for all modules.

plementation results (VIRTEX V).

Nb. of Slice Registers Nb. used Flip Flops Nb. of Slice LUTs Nb. bonded IOBs Frequency (MHz) Power consumption (W)

static dynamic Total

iver 50 50 235 47 238 0.3 0.09 0.39r 557 557 539 44 157 0.4 0.09 0.49er 85 85 63 66 342 0.25 0.02 0.27

roller 9 9 9 30 424 0.3 0.009 �0.31

952 M. Zaidi et al. / Computers and Electrical Engineering 37 (2011) 941–957

6. Linear interpolation for decentralized Handoff

6.1. Linear interpolation

Linear interpolation is a topic usually well-covered in statistic courses since it is very important to any engineer. Linearregression is not a difficult task to carry out, but the process of understanding and deriving the equations used can be chal-lenging as much as it is tempting. Indeed, the calculators use the so-called linear regression systematically, i.e., they applythe least square method in cases of the affine function (y=ax+b).

We want to make linear interpolation automatically i.e., on each portion of the root the MS must interpolate the measuresthat it has collected from the current AP by a linear form. This linear form allows it to effectively perform the decentralizedHandoff that we will specify in the next section.

The linear regression process consists of deploying the distance between the AP and the MS to generate the signalstrength that will be received by the MS. This is a complex task, because in an indoor environment, several parametersare included in this process. Mainly, the linear regression represents, in a linear form, the received power by the MS as afunction of the traveled distance or the elapsed time (equation 3).

RSSðdBÞ ¼ m � DðmÞ þ b or RSSðdBÞ ¼ m � tðsÞ þ b ð3Þ

Where m is the line slope and b is the y-intercept. Usually D0 is chosen as the origin of movement. In this case, the y-inter-cept should be near to the LOS power.

6.2. The received signal representation

The data reported below correspond to the collections of the signal level leaving an AP and arriving to the MS. Note thatthe MS is moving in an Indoor environment.

Now, how does one find a calibration line that accurately describes the data? One could simply draw a line through thedata and assume that it describes the data accurately. This does not seem harsh enough. So, we need to come up with a wayto measure the error of our line. One logical way to measure the error is to take the difference of each data point with thecurve fit and add up all of these errors. These errors are shown on the Fig. 11. If the error is too large, the slope and interceptcould be changed. The equation 4 describes this context.

SSE ¼X

i

ðyreal � yestÞ2 ð4Þ

Where SSE is the sum of the squared errors and yreal and yest represent the measured and estimated powersrespectively.

The question remains, is there any way to find the best fit line for the data? The answer requires high knowledge ofcalculus, so the full derivation will be abridged. The squared error can be expressed in terms of the independent variablexi as outlines equation 5.

X

i

ðyreal � yestÞ2 ¼

X

i

ðyreal �m � xi � bÞ2 ð5Þ

0 50 100 150 200 250-130

-120

-110

-100

-90

-80

-70

-60

-50

-40

Rec

eive

d po

wer

(dB

m)

Elapsed time (s)

Fig. 11. Measured power as function of elapsed time or (traveled distance).

Fig. 12. The measured power and its linear regression as function of the elapsed time.

M. Zaidi et al. / Computers and Electrical Engineering 37 (2011) 941–957 953

To find the best fit line, the sum of the squared errors should be minimized. In Calculus, the minimum or the maximum ofa function can be found by considering its derivative and setting it to zero. In other words, the slope of a line at a maximumor minimum point is zero. This is dealt with thoroughly in the m-file program. For this problem, the derivative of SSE is takenwith respect to m then again with respect to b. This yields two equations with two unknown parameters m and b.

With proper rearrangement, the final result outlines two equations (6 & 7) evaluating m and b which depend on the sumsof data.

M ¼ nP

iXiyi � ðP

iXiÞðP

iyiÞnP

iX2i � ð

PiXiÞ2

ð6Þ

b ¼P

iyi

PiX

2i �

Pixiyi

PiXi

nP

iX2i � ð

PiXiÞ2

ð7Þ

In these equations, n is the number of data points. The sum of x2i is obtained by squaring all the elements of x and then

adding them all up. The sum of xiyi is computed by multiplying x and y elements and then summing them all up.The slope and y-intercept are found for each interval as (-0.0019,-60.0517), (-0.3356,-22.5582) and (-0.8700, 85.1815)

respectively (Fig. 12). These lines can then be plotted over the data to trace the linear form(s) that can describe effectivelythe whole repartition of points.

7. Decentralized Handoff in wireless communication based on linear interpolation

Handoff is defined as the process of changing the current radio channel to a new radio channel [29] which mainly takesplace because of the movement of MS and unfavorable radio conditions (deterioration of received signal quality) inside anindividual cell or between a numbers of adjacent cells.

7.1. Analytical solution for Indoor-Handoff

The higher value of hysteresis (Thmax-Thmin) effectively prevents unnecessary Handoffs but causes undesired cell drag-ging. This undesired cell dragging causes interference or could lead to dropped calls in microcellular environment.

When turning in a corner, the signal strength may drop by more than 20 dB at the MS [3] (Fig. 13). Especially, the signalfrom AP1, which is in line of sight, suddenly disappears when the MS turns the corner. However, the link with AP2, whichwas blocked, it becomes in a line of sight. In addition, the signals arriving from AP3 and AP4 interfere and will be received bythe MS. In some cases this interference can be handled by the MS as a good signal level .The MS can perform the Handoffbased on this interference that ultimately leads to a communication breakdown. Thus, there are Handoff issues that mustbe revived before the development in microcells.

In this section we present the Handoff on the basis of ratio of slopes of normal decaying signal to the actual signal, thereceived signal strength and the hysteresis value (Thmax-Thmin). In this work the emphasis given to the Handoff is due to thecorner effect. The rapid decrease in signal strength is due to the corner effect or any other NLOS condition in a cellular sys-tem. This may result in a dropped call if Handoff algorithm does not support. The decrease in the received signal strength isalways monitored by determining the ratio of the slopes of expected normal signal and the actual signal (Fig. 14).

The slope of the expected signal is obtained by the difference in the previous sample and the expected new sample deter-mined by the regression method (section 5).

ExpectedActual

1SΔ

2SΔ

RSS(dB)

Traveled distance(m)

Hes

teri

sis

A

Fig. 14. Slopes of actual and expected signals.

AP3

AP1

AP2

AP4

Mobile route

Fig. 13. Mobile station turning a corner in microcell.

954 M. Zaidi et al. / Computers and Electrical Engineering 37 (2011) 941–957

The nature of the decaying signal can be determined by the slope or tangent of angle subtended by the two correspondingpoints on the signal line with respect to two axes. The Handoff process initialization depends on the nature of the decayingsignal, the received signal strength and the hysteresis. In other terms, certain condition on these parameters leads initiatingthe Handoff process by the MS to maintain the communication over another AP. The Handoff process should be fast to reducethe call dropping probability.

� The slope of expected signal is evaluated by the equation 8.� The slope of actual signal after the corner effect at A is given by the equation 9.� The slope ratio of normal and actual signals is computed by the equation 10.

Tgh1 ¼DRSSDS1

ð8Þ

Tgh2 ¼DRSSDS2

ð9Þ

RP ¼Tgh1

Tgh2¼ DS2

DS1ð10Þ

Where, RSS is the received signal strength.If h1=h2 then DS1=DS2 and Rp=1DS1 and DS2 are small changes in distances of MS from AP with respect to the normal and actual signals respectively and

Rp is the slope ratio.For the different analytical values of h1 and h2 the various values of Rp are obtained. But for the Handoff to take place h2

must always be greater than h1. Thus, we have only taken the values for h2 > h1 into consideration. The ratio from h1=5� to

M. Zaidi et al. / Computers and Electrical Engineering 37 (2011) 941–957 955

h2=70� has been considered with high probability (Fig. 15). To avoid the overcrowding of data, the difference of two degreesin h1 and h2 is considered.

7.2. Fuzzy logic solution for decentralized Handoff

The fuzzy set theory allows a linguistic representation of the control and operational laws of a system. The main strengthof the fuzzy set theory is that it excels in dealing with imprecision. The fuzzy logic can be used to control a complex system[30,31]. The block diagram of the fuzzy logic system considered for this work is shown in Fig. 16.

For Handoff initiation there are three membership functions are used: Received Signal Strength (RSS), Slope ratio (Rp) andHysteresis value. The fuzzy sets contain elements that have a varying degree of membership in a set. The membership valuesare obtained by mapping the values obtained for a particular parameter onto a membership function. This function is a curveor line that defines how each data or value is mapped onto a membership value. It is represented graphically in Fig. 17, wherethe five lines represent the range available for a very low, low, Average, High and very high value.

The fuzzified data is passed to the inference engine, where the fuzzified data is matched against a set of fuzzy rules usingthe fuzzy techniques to produce output fuzzy sets. Fuzzy rules can be defined as a set of possible scenarios utilizing a seriesof IF-THEN rules, which decides whether the Handoff is necessary. Following this, a set of different Handoff decisions can beobtained. An example of IF-THEN rules is as follows:

IF signal strength is high and the slope ratio is average and the hysteresis is low, then execute the Handoff slightly.The output fuzzy sets are then passed to the defuzzifier which computes a crisp output value. The fuzzy IF-THEN rules

provide the knowledge basic to the system and results in proper Handoff. The simulation data obtained from Mumdani infer-ences system is shown in Fig. 18. These results are in coincidence with the results obtained by the analytical solution.

7.3. Comparison of results

From Fig. 14, it is evident that with the increase in slope ratio values, the curves become smoother indicating that Hand-off’s decrease. The higher value of slope ratio means decreasing denominator value in tgh1

tgh2or in other words h2 approaches h2

thereby the actual and normal signals approach coincidence. From Fig. 18, the slope ratio and Handoff factor act inverselyproportional to each other. Thus higher value of slope ratio produces lower Handoff’s and vice versa.

0 10 20 30 40 50 60 700

0.2

0.4

0.6

0.8

1

variable Teta2

slop

e ra

tio

Teta1=5°Teta1=8°Teta1=11°Teta1=14°Teta1=17°Teta1=20°Teta1=23°Teta1=27°Teta1=30°Teta1=32°

Fig. 15. Slope ratios with varying angles.

Fig. 16. Block diagram of fuzzy logic system.

00.10.20.30.40.50.60.70.80.910

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1RSSSlope ratioHesterisisHandoff action

Fig. 18. Handoff with varying RSS, Slope ratio and Hysteresis.

1

0Received signal strength

Very low AverageLow High Very high

μ

1

0 Slope ratio

Very low AverageLow High Very high

μ

1

0 hysteresis

Very low AverageLow High Very high

μ

Fig. 17. Various membership functions.

956 M. Zaidi et al. / Computers and Electrical Engineering 37 (2011) 941–957

8. Conclusion

In this work, three main parts are included. First, we presented a time-series analysis techniques which covers the basicsconcepts and mechanisms driving the wireless propagation channel. We proposed a method allowing to extract a significantsignal from the fast variations caused by the combined effects of shadowing and multipath. This method is well affordable bythe mobile device resources like power consumption and memory space. This overall signal was used to reduce significantlythe number of unnecessary Handoffs.

Second, we implemented our technique using the hardware co-design approach allowing a performance evaluation interms of frequency, area and power consumption. The Handoff latency is also evaluated compared to different proposals.

Third, we applied the linear regression method to the above time-series in order to better optimize the Handoff process.In addition, we developed a new fuzzy based Handoff algorithm capable of responding to the fast changes that occur in amicrocellular environment especially in indoor conditions. The results obtained by both analytical and fuzzy methods aresimilar and better than provided by conventional approaches. The Handoff is independent of the received signal strengthof neighboring access points, so it is fast and mobile controlled.

M. Zaidi et al. / Computers and Electrical Engineering 37 (2011) 941–957 957

References

[1] W.C.Y. Lee. John Wiley & Sons, Ltd, Chichester. Mobile Communications Design Fundamentals. Wiley Series in Telecommunications and SignalProcessing, UK, 1993.

[2] Michel C. Jeruchim, Philip Balaban, K. Sam Shanmugan. Simulation of Communication Systems: Modeling, Methodology, and Techniques. 2nd Edition2000.

[3] G. M. Mir, N. A. Shah, and Moinuddin. Decentralized Handoff for Microcellular Mobile Communication System using Fuzzy Logic. Proceding of WorldAcademy of Science, Engineering and Technology, Vol 38 Feb 2009.

[4] Ridha Ouni. Dynamic slot assignment protocol for QoS support on TDMA-based mobile networks. Computer Standards & Interfaces 2011. doi:10.1016/j.csi.2011.06.00.

[5] Haibo Xu, Hui Tian, Ping Zhang. A novel terminal-controlled handover scheme in heterogeneous wireless networks. Computers and ElectricalEngineering 2010;36:269–79.

[6] Nguyen-Vuong, Agoulmine N, Ghamri-Doudane Y. Terminal-Controlled Mobility Management in Heterogeneous Wireless Networks. IEEECommunications Society 2007;45(4):122–9.

[7] Zaidi Monji, Ouni Ridha, Torki Kholdoun, Tourki Rached. Low Power ASIC designs for fast Handoff in IEEE802. 11. International Journal of ComputersSystems and Signals 2009;10(1).

[8] Leu E, Mark BL. Analysis of Fast Handoff Algorithms for Microcellular Networks. Proc. 10th IEEE Symp. Modeling, Analysis and Simulation of Computerand Telecomm Systems 2003:321–8.

[9] Leu AE, Mark BL. An Efficient Timer-Based Hard Handoff Algorithm for Cellular Networks. Proc. IEEE Wireless Comm. And Networking Conf.2003;2:1207–12.

[10] Tang Shensheng, Li Wei. Modelling and analysis of hierarchical cellular networks with bidirectional overflow and take-back strategies under generallydistributed cell residence times. Telecommun Syst 2006:71–91.

[11] Xia Liu, Jiang Ling-ge, He Chen. A Novel Fuzzy Logic Vertical Handoff Algorithm with Aid of Differential Prediction Pre-Decision Method ICC’07. IEEEInternational Conference on Communications 2007:5665–70.

[12] Israt Presila, Chakma Namvi, Hashem MMA. A Fuzzy Logic-Based Adaptive Handoff Management Protocol for Next-Generation Wireless Systems.Journal of networks 2009;4(10).

[13] Majlesi A, Khalaj BH. An Adaptive Fuzzy Logic Based Handoff Algorithm for Hybrid Networks. Proc. IEEE Conf. Signal Processing 2002;2:1223–8.[14] Wang SS, Green M, Malkawi M. Adaptive Handoff Method Using Mobile Location Information. Proc. IEEE Emerging Technology Symp. Broadband

Comm. for the Internet Era Symp. 2001:97–101.[15] Teerapabkajorndet W, Krishnamurthy P. Comparison of Performance of Location-Aware and Traditional Handoff-Decision Algorithms in CDPD

Networks. Proc. IEEE Conf. Vehicular Technology 2001;1:212–6.[16] Markopoulos A, Pissaris P, Kyriazakos S, Dimitriadis C, Karetsos G, Sykas ED, et al. Increased Handover Performance in 2G and 3G Wireless Systems

Based on Combined Mobile- Location and Area. Proc. IEEE Int’l Symp, Wireless Personal Multimedia Comm. 2002;1:47–51.[17] Li Junyi, Shroff Ness B, Chong Edvin KP. Channel Carrying: A Noval Handoff Scheme for Mobile Cellular Networks. IEEE/ACM Transactions on

Networking 1999;7(1):00–1.[18] Ekiz Nasif, Salih Tara, Sibel, Fidanboylu Kermal. An Overview of Handoff Techniques in Cellular networks. International Journal of Information

Technology 2005;2(3):132–6.[19] Wie SH, Jang JS, Shin BC, Cho DH. Handoff Analysis of the Hierarchical Cellular System. IEEE Trans Vehicular Technology 2000;49:2027–36.[20] Li B, Wu CK, Fukuda A. Performance Analysis of Flexible Hierarchical Cellular Systems with a Bandwidth Efficient Handoff Scheme. IEEE Trans.

Vehicular Technology 2001;50:971–80.[21] Kassar Meriem, Kervella Brigitte, Pujolle Guy. An overview of vertical handover decision strategies in heterogeneous wireless networks. Computer

Communications 2008:2607–20.[22] Edwards George, Sankar Ravi. Microcellular Handoff using Fuzzy Techniques. Wireless Networks 1998;4:401–9.[23] Muaoz-Rodiguez D, Cattermole K. Handoff procedure for defined radio cells. Proc. IEEE Vehicular Technology 1987:38–44.[24] Kapralos Bill, Jenkin Michael RM, Milios Evangelos E. Acoustical diffraction modelling utilizing the Huygens-Fresnel principle. In IEEE International

Workshop on Haptic Audio Visual Environment and their applications 2005;11(4):416–21.[25] Zhang N, Holtzman JM. Analysis of handoff algorithms using both absolute and relative measurements. IEEE Transaction on Vehicular Technolgy

1996;45:174–9.[26] Pollini GP. Trends in handover design. Communications Magazine, IEEE Computer Society, Washington DC, USA 1996:82–90.[27] H. Park, S. Yoon, T. Kim, J. Park, M. Do, J. Lee. Vertical Hando Procedure and Algorithm Between IEEE802.11 WLAN and CDMA Cellular Network,

Springer, USA, 2003, 103-112.[28] Ei Thazin, Furong Wang. Trajectory-Aware Vertical Handoff Protocol Between WiMAX and 3GPP Networks. Information Technology Journal

2010;9(2):201–14.[29] Arunesh Mishra, Minho Shin, William Arbaugh, An empirical analysis of the IEEE 802.11 MAC layer handoff. ACM SIGCOMM Computer

Communications Review (ACM CCR) 33(2) 93-102.[30] Astrain JJ, Villadangos J, Castilo M, Garitagoitin JR, Farina F. Mobility Management in Cellular Communication Systems Using Fuzzy Systems.

International Federation for Information Processing 2004:79–91.[31] Habetha Jörg, Walke Bernhard. Fuzzy Rule-Based Mobility and Load Management for Self-Organizing Wireless Networks. International Journal of

Wireless Information Networks 2000;9(2).

Monji Zaidi received the Dipl.-Ing. in electrical engineering for automation and processes control in 2005 from the National engineers school of Sfax and theMastere degree in Nanostructures, devices and systems micro-electronics from the University of Monastir,, Tunisia 2007. He is currently working towardthe PhD degree in electronic and communication. His research interests include Management of the WLAN technologies.

Ridha Ouni is Assistant professor in the CCIS of the King Saud University, KSA, since Feb 2009. He was in the IPEIM, Tunisia, since 1999. His researchinterests include wireless communication, mobility, QoS management and sensor networks. Previously, he Received his MSc in Physic Micro-electronic, hisDEA degree and his PhD from the Faculty of Sciences of Monastir (Tunisia) in 1995, 1997 and 2002, respectively.

Rached Tourki received his B.S. degree in Physics from Tunis University in 1970, the M.S. and the Doctorat in Electronics from the Institut d’Electroniqued’Orsay, Paris-South University in 1971 and 1973, respectively. He received his Doctorat d’Etat in Physics from Nice University in 1979. Since this date, hehas been a Professor in Microelectronics and Microprocessors with the Faculté des Sciences de Monastir. His current research interests include digital signalprocessing and Hardware�Software Codesign for rapid prototyping in telecommunications.

A new energy-efficient neighbor discovery and load balancing protocols for

mobile sensor networks

Ridha Ouni1, Rafik Louati2

1 College of Computer and Information Sciences (CCIS), King Saud University, KSA

[email protected]

2 Ecole Nationale d’Ingénieurs de Monastir (ENIM), Tunisia

[email protected]

Abstract

The wireless sensor networks (WSNs) are formed by a large number of sensor nodes working together to provide a

specific duty. However, the low energy capacity assigned to each node prompts users to look at an important design

challenge which is lifetime maximization. Especially the availability of nodes, the sensor coverage, and the connectivity

have been included in discussions on network lifetime. Therefore, designing effective techniques that conserve scarce

energy resources is a critical issue in WSNs. In this regard, we are interested in developing various mechanisms to save

energy based on the constraints involved in the energy consumption in WSNs. Three mechanisms are proposed to

improve the management of control packets responsible for path discovery, self-organization, and balance the load

distribution in the network.

Keywords: Wireless Sensor Networks, lifetime, AODV Routing, Energy-aware routing

1. Introduction

With the proliferation of wireless sensor networks

(WSN), completely new application domains for

wireless ad hoc networks have emerged. These later

motivated an increasing demand for developing more

efficient sensor networks despite their limitations in the

available resources (energy, processing speed, storage).

Besides these restrictions, WSNs are also exposed to

various requirements dealing with dynamic topologies

and variable environmental conditions [1]. Moreover,

routing and data dissemination constraints [2], self-

organization issues [3] and the efficient deployment of

sensor nodes [4] have already been investigated. While

the study of network lifetime as a key characteristic of

WSNs is still in progress [5].

Energy is a critical factor in wireless sensor

networks (WSN). To increase the network lifetime, the

energy must be conserved in hardware as well as in

software that comprise the network architecture. The

data communication is the most responsible factor in the

consumption of energy budget in comparison with

sensing and computing [6]. Therefore, it is desirable to

use short-range nodes instead of long range due to the

power required in transmission. In most scenarios, the

events can be detected by several nodes close to the

source of the phenomenon. Then, using short-range

communication leads necessarily to a multi-hop data

packets transmission.

Consumption optimization is a crucial issue in WSNs

that requires optimizing radio communication

processing and traffic load. This includes digital

devices, a microcontroller, application software and the

various algorithms for energy management.

A great number of algorithms and methods were

proposed to increase the lifetime of a sensor network by

reducing energy consumption according to their

application types, constraints, and network architecture.

Some previous works discuss reliable multipath routing

with energy efficiency [7] and exploiting latency and

density [8]. Other works reduce radio activities as key

management protocols [9] and multiple base stations

[10].

In this paper, we are interested to propose an

Enhanced model of the Ad Hoc On Demand Distance

Vector (EAODV) protocol. EAODV is designed to

reduce the number of control packets, create an historic

routing data base and balance the network load which

result decreasing the energy consumption. Then, we

discuss a comparative study of capabilities offered by

both of AODV and EAODV protocol. Several metrics

are undertaken to evaluate performances of EAODV

protocol.

This paper is organized as follows. Section 2

summarizes the related works. Section 3 introduces the

concept of EAODV protocol and its mechanisms to

decrease energy consumption. Section 4 outlines the

simulation results evaluating the performances of

EAODV protocol compared to AODV. Finally,

section 5 concludes the paper.

2. Related work

Many techniques have been proposed for energy

aware routing. [11] proposed an energy-efficient

neighbor discovery protocol (ENDP) to reduce the need

of network scans by distributing synchronized

information of nodes in two-hop neighborhood. This

information is carried in the beacon payloads of

underlying MAC protocol and utilized for establishing

new communication links. In addition, ENDP

introduces an efficient network beacon signaling

scheme to make network scans more energy efficient.

ENDP can effectively minimize network energy

consumption in dynamic WSNs. The energy efficiency

and operation fidelity are verified by analytical

performance models and experimental measurements

using real WSN prototypes.

[12] proposed a Geographical and Energy Aware

Routing (GEAR) protocol based on energy aware

neighbor selection using localization system such as

GPS device. This protocol delivers packet towards the

target region and restricts flooding algorithm to

disseminate the packet only in the destination region. In

[13], the authors proposed controlling the sink

movements to improve network lifetime. The sink

movements depend on a Mixed Integer Linear

Programming (MILP); an analytical model whose

solution determines sinks position that maximize

network lifetime. The authors define the Greedy

Maximum Residual Energy (GMRE) technique that

heuristically moves the sink from its current location to

a new site where nodes have the highest residual energy.

They also introduce a simple distributed mobility

scheme (Random Movement or RM) which makes the

sink moves uncontrolled and randomly throughout the

network.

Xu and Hong proposed, in [14], a chessboard

clustering scheme to maximize network lifetime. To

achieve good scalability and performance, they

proposed to form a heterogeneous sensor network by

deploying a small number of powerful high-end sensors

beside a large number of lowed sensors.

In [15], a Probabilistic Forwarding Protocol (PFR)

is introduced to combine energy efficiency and fault-

tolerance. In PFR, next hop is always exactly selected;

therefore the number of transmitted packets is

optimized. PFR succeeds with smart dust architecture

since smart dust networks have a very high density and

robustness.

Authors in [16] proposed Variable Transmission

Range Protocol (VTRP) based on varying the range of

data transmissions. This protocol allows the

transmission range to increase in various ways. By

bypassing obstacles or faulty sensors, VTRP has a high

fault-tolerance capability and increases network

lifetime. Varying the range of data transmissions

presents better performance compared to typical fixed

transmission range. This occurs when using low density

network. In this case, a network using fixed range may

cause failure in delivering packets when a routing node

to the sink is not found. VTRP can avoid this situation

by increasing transmission range.

Many improvements for Ad-hoc On-Demand

Distance Vector (AODV) protocol are addressed. In

[17], the authors proposed an improved AODV routing

protocol based on node-grade to reduce the energy

consumption of nodes. G-AODV can reduce energy

consumption using two techniques; (1) avoids any

useless route request (RREQ) packet broadcasted; (2)

provides a path to the packet with fewer resources and

less number of hops. G-AODV assigns a grade to each

node according to the hop distance between the node

and the sink. Therefore, each node doesn’t accept any

route request packet from another one having a stronger

grade than itself.

DEAR [18], Dynamic Energy Aware Routing, is an

energy efficient routing algorithm for data querying

sensor networks that propagates routing instructions and

builds data paths by considering both the hop count to

the sink node and the minimum residual energy of that

path. Then, a node selects a data path with low energy

consumption and high residual energy.

3. Enhanced-AODV protocol design

In this section, we present our theoretical

foundations and algorithms to enhance AODV protocol

and improve energy efficiency. Three mechanisms are

involved for this goal. First, a partial diffusion

mechanism divides each node’s neighborhood into

sections to avoid flooding when sending control

packets. The node chooses the most likely section in

which the target could be present according to statistical

and historical data.

Fig 1. Decreasing number of involved nodes.

The second mechanism minimize search packet

lifetime by avoiding random packets, hence a target is

reached with less number of search attempts. The third

mechanism monitors the load distribution in order to

ensure connectivity and concentrates on consuming

energy equitably.

Partial diffusion method

TTL optimization

Charge

distribu-

tion

Sink node

As a result, every mechanism will limit the geographical

area of control packet flooding. Hence, the number of

nodes involved in data dissemination will decrease

(Fig.1).

3.1. Partial diffusion mechanism

EAODV routing protocol is based on the same

principle as AODV. Responding to a request, the

network establishes an instantaneous path to send data.

To discover the path, a certain number of control

packets is required. EAODV proposes a post simulation

of the basic idea in order to reduce the number of

control packets.

When establishing a path, the node sends a packet

(RREQ) to discover the shortest way. The node asks

neighbors whether the destination address exists in their

current routing tables. In turn, these nodes return the

same packet to their neighbors when the address does

not exist in their tables. This packet contains the desired

address (destination), the source node address, the

lifetime of this packet and a sequence number that

serves as a unique identifier of the packet. By mobility

effect of the destination node, this packet may flood the

entire network. RREQ packet is continuously

retransmitted until requested destination is reached,

unless the declared life time of the packet (TTL: Time

To Live) has expired.

In Figure 2, the source tries to send a message to

the destination. It sends a route request (RREQ) to its

three neighbor nodes with time to live equal to 5.

Fig 2. Route request packet.

The cost of this request is 10 packets of RREQ, 4

packets of RREP (Route REPly) and 6 packets of

RERR (Request ERRor), as shown in Figure 3. It

results in 20 packets with 85% of the routing tables are

updated. This reduces the number of discovery packets

by 6% in the future path requests. Figure 3 illustrates

the responses received according to the previous path

request.

If we reduce the number of RREQ (Route

REQuest) packets by requesting only two neighbors 2

and 3, the cost of discovery will be 10 packets. This

reduces 50% of energy consumption for the request

operation but only 45% of routing tables are updated

with the destination path. It also reduces, by 3%, the

number of discovery packets in the future path

requests. The neighbors are not selected randomly but

according to the occurrence of the target node in the

routing tables of neighbors. The source node starts with

neighbors which has the highest number of occurrence.

This method highly reduces the number of search

packets for networks with low node mobility

constraint.

Fig 3. Route request response.

Checking the number of occurrence is not always

efficient because the routing tables may be blank {I

insist on “blank” not empty} at the launch of network,

or a part of it may be not discovered yet. In this case,

the source randomly selects the neighbors, and then

diffuses packets partially through it. Information

collected in the search task is stored then used in a

future search attempts. This information is about the

energy level of neighbors and the occurrence of

addresses that appear in each routing table.

3.2. RREQ life time: TTL (Time To Live)

Time To Live (TTL) is defined by the number of

hops followed by a control packet while searching the

destination. This number increases when the packet

does not reach the destination, and then the source

restarts the search operation with a new higher number

of hops. In this work, we propose to reduce the search

attempts of the destination by selecting the optimal

number of hops. As a result, the control packet reaches

the destination from the first cycles.

When sending data, EAODV protocol proceeds as

the figure 4 illustrates. TTL value is chosen according

to historical data stored in routing tables; when a node

lunches a search attempt, it selects the last successful

TTL value. If no RREP packet received, the node

selects a higher value of TLL which is the result of an

earlier successful attempt. But the packet can find its

path earlier (figure 5, right path); in this case EAODV

proceeds as explained in what follows.

RREP

RREP

RREP

RREP

RERR

RERR

RERR

RERR

RERR

RERR

RERR

1

2

3

RREQ

RREQ

RREQ

RREQ

RREQ

RREQ

RREQ

RREQ

RREQ

RREQ

RREQ

Fig 4. Discovering mechanism involving TTL.

The neighbor leading to the desired destination

stops routing packets even if the control packet did not

achieve the number of hops. But, this occurs only in the

exact path because the packet completes the number of

hops in case of wrong path as shown in figure 5. For

example, if a node knows that the destination is through

its neighbor A with X hops, it returns the RREP packet

and cuts the dissemination of RREQ packet to its

neighbors, while other RREQ packets complete their

courses in other directions according to its lifetime

value TTL (figure 5).

Fig 5. Request through two neighbors (TTL= 6).

We assign bits representing an integer in the RREP

packet in order to calculate the number of hops toward

the destination. This number is incremented by one hop

and saved at each node on its path back to the source.

Therefore, each traversed node will have an idea about

the number of jumps needed to reach the desired

destination. As a result, every node can assign the

optimal TTL value when sending a discovery request

packet. Then, the new format of RREP is:

Fig 6. RREP packet.

3.3. Load distribution

To ensure good connectivity in a sensor network, it

is essential to keep alive all the links between different

parts of the network. The elements responsible for the

connectivity of the network parts may be similar (flat

network) or nodes with highest hardware performance

(hierarchical network). In this section, we propose

optimizing the management of collaborative work

between the flat network nodes to ensure a distributed

consumption and to share delivering data load between

nodes. When more neighboring nodes are organized to

share the work, the more we avoid redundancy of

packets and losing connections. Using AODV protocol,

redundancy of packets can occur when many

neighboring nodes detect the same stimulus.

Fig 7. Event detection.

Figure 7 shows an event S1 in the monitoring field

of three nodes and S2 in the monitoring field of node N3.

The contribution needed here consists of optimizing the

number of generated and delivered packets as well as

distributing the load for more energy consumption

efficiency. The following sections clarify how nodes

react when detecting event and delivering data.

S2 S1

N1

N2 N3

ID Source Destination Number of hops

Right path

Bad paths S

D

Node leading to desired destination

Translate data TTL0<=TTL1; TTL1<=TTL2…

Data to send !

Path discovery attempt

History?

TTL = TTL0

RREP packet received?

……

TTL0 = Nb of hops

b c

TTL0 TTL1 TTL2

AODVproc

Sending data

EAODV AODV

a

3.3.1. EAODV behavior for event detection

According to EAODV protocol, the nodes transmit

periodically their energy levels to their neighbors with

each Hello message. Each node can classify its capacity

in terms of energy and then can assign a priority order

for each neighbor to deliver the data to the sink node.

Therefore, the node which has the highest energy level

is allowed to deliver data.

We consider ti the time interval between detecting the

event and starting the transmission, and Cn is the class

in terms of energy assigned to the node n. N nodes are

considered as neighbors if each one can see the (N-1)

other nodes. We consider the radius RS of monitoring

field to be less than the range of transmission radius RP.

RS < RP

The process code for event detection is as follows:

1. IF (Cn=1) THEN {

2. EAODV transmission attempt 3. Broadcast (Hello !)

} 4. ELSE

{ 5. Wait (ti* (Cn-1)) AND Listen 6. IF (no transmissions)

{ 7. EAODV transmission attempt 8. broadcast (Hello !)

} 9. ELSE

{ 10. Wait for(Hello !) 11. Classify new energy data

} END IF

} END IF

Notes.

Cn=1 considers the highest power level (line 1).

Update energy level after transmission activity

(line 3).

Wait and listen if any of the neighbors initiates

transmission (line 5).

Only one node detected the event (line 7).

The node having full power, immediately launches the

transmission of the packet. Otherwise, the node n waits

a period (Cn-1)×ti in order to allow another higher class

neighbor to deliver the data. If so, the node waits for the

Hello message broadcasted by the neighbor which

performed the work and announced its new energy level

and then updates its energy level classification.

However, the node is required to deliver the packet and

announces its new power level whether none of the

neighbors has detected the event.

Figure 8 illustrates the activities of four neighboring

nodes where N3 and N4 only detect the same event. E1

to E4 are respectively the energy levels of N1 to N4 in a

decreasing order.

Fig 8. Sequence of event detection process in

EAODV.

3.3.2. EAODV behavior for packet delivery

If routing data can be done through only one path, it

must be through the shortest while load distribution is

maintained to avoid losing connections. EAODV

provides a direct solution as follows. Each node can see

only its neighbors and does not care about what will

happen after providing the data through them. This

creates a problem if traffic has a high priority and it may

decrease the rate of successful delivered packets. But

this problem disappears when network is dense with

nodes.

After determining the possible paths by adopting

the partial diffusion method shown above, the node

provides the packets to the neighbor which has the

highest energy level and admits a link to the destination.

Information about the estimated charge levels are then

transmitted using Hello packets.

4. Simulation environment and performance

evaluation

Several scenarios including fixed destination nodes,

various speeds of mobile sensors and different covered

area are developed to simulate our approach for routing

and energy optimization.

Table 1. Simulation scenarios.

sink

nodes

sensor

nodes

target

nodes

Scenario 1 Fixed 8 moving at low speed

Mobile

Scenario 2 Mobile

different speeds

Fixed Mobile

Performance evaluation of AODV and EAODV

protocols are realized following four aspects: (1)

energy consumption estimator model (2) discovering

N1

N2

N3

N4

E1

Sensing and listening to channel

Event Wait & listen

Sensing and listening to channel

Event Detection

Wait & listen

Listen

Hello!

Data

receiving

Transmitting

Data receiving

Data receiving

E2

E3

E4

2 T

3T

attempts optimization (3) time to live effect

optimization and (4) network survivability.

4.1. Simulation metrics

Many metrics are deployed to evaluate and

compare performances of these protocols.

The number of discovering attempts is a statistical

metric affecting the number of control packets.

EAODV protocol improves decreasing control

packets depending on the speed of nodes and

represented by the improvement rate (Impr%)

(Equation 1). The purpose of this metric is to

specify to which limit of speed the improvements

of EAODV algorithm are significant.

𝐼𝑚𝑝𝑟 % =𝑅𝑅𝐸𝑄𝐴𝑂𝐷𝑉 − 𝑅𝑅𝐸𝑄𝐸𝐴𝑂𝐷𝑉

𝑅𝑅𝐸𝑄𝐴𝑂𝐷𝑉 × 100 Equation 1

Network survivability is tested based on two

aspects. In one hand, this metric reflects the

network lifetime and how faster the nodes die in

full consumption regime. In the other hand, the

percentage of nodes remaining alive reflects the

fairness of energy consuming and the network

capability for maintaining connections. The

lifetime of a sensor node basically depends on

two factors: how much energy it consumes over

time, and how much energy is available for its

use.

4.2. Energy consumption estimator model

We have adopted a purely statistical energy

consumption estimator. At the beginning of simulation,

the power level in each node is initialized to the full

charge by using a real number. We assume that all

nodes have the same hardware architecture and

therefore behave similarly. But, considering the flat

architecture, nodes consumes different energy levels as

they operate in:

Transmission mode.

Receive mode.

Idle mode.

Sleep mode.

In order to update the power level in each node, we

developed a routine responsible to detect both the

starting and the ending times for each operating mode.

As result, the routine measures the period in the

appropriate operating mode which allows calculating

the consumed energy. Then, the remaining power in the

node is updated by subtracting the consumed energy

from the initial power level per cycle.

Ec = (t end – t begin) * Pm

Er = Ei – Ec

(a)

Equation 2

(b)

Where:

Ec: energy consumed during the current cycle.

Ei: remaining energy after the previous cycle.

Er: remaining energy after the current cycle.

Pm: power level dedicated to the appropriate operating

mode.

The state of the node is permanently updated

whether it is still alive (energy > 0) or exhausted

(energy = 0). In the last case, the node no longer appears

in the topology and the network must adapt to this new

change from the first search request sent by the

neighbors.

4.3. Optimization of the discovering attempts

In AODV protocol, the TTL value is randomly

initialized. Then, it increases if the search result is

negative. At the beginning of simulation, TTL is

dynamically changing due to the virginity of the routing

tables. Table 2 shows the number of attempts for

discovering path every 20 minutes when simulating

AODV protocol.

Table 2. Number of attempts during 2 hours: AODV

Delay Number of attempts

From 0 to 20 mn 724

From 20 to 40 mn 740

From 40 to 60 mn 708

From 60 to 80 mn 660

After two hours, the total number of attempts

becomes almost constant. With EAODV protocol, we

set up a history-based approach which stores

successively the state of node and topology. Figure 9

shows how the number of discovering attempts evolutes

in both protocols AODV and EAODV for the same

scenario during 120 minutes. AODV and EAODV

behave similarly until minute 70, due to the absence of

historical data in the nodes. However, EAODV allows

optimizing significantly the number of attempts in the

second part of the simulation (after 70 mn).

Consequently, this result leads to save energy in nodes.

Fig 9. Number of discovering attempts.

275

295

315

335

355

375

10 30 50 70 90 110

Nu

mb

er

of

dis

cove

rin

g at

tem

pts

Simulation time (mn)

AODV

E-AODV

4.4. Time To Live optimization effects

Scenario 1 (see table 1) has the ability to create

dynamic topology needed to test TTL optimization.

Nodes start discovering paths in the network by using

queries across the entire field. A sensor network with

dynamic topology is very greedy in energy. This is due

to the huge number of control packets that will be

periodically transmitted between nodes to discover the

paths. Such mobility decreases EAODV protocol

performances as the node speed increases outlined in

figure 10.

Figure 10 shows the variation of the improvement

rate related to the number of RREQ packets depending

on the speed of sink nodes. A strong constraint of

mobility (see table 1, scenario 2) requires a very recent

history where the age has not exceeded the time set by

the mobile node in order to admit a new neighborhood.

Even if this is feasible, it does not bring significant

improvements in number of discovery packets from

3 m/s. These results depend on the bandwidth, traffic

rates, density of nodes in the field and the required

Quality of Service (QoS).

Fig 10. Rate of improvement in the number of RREQ

packets: EAODV (Mobility constraints).

4.5. Network survivability

In order to increase the rate of traffic and ensure a

full energy consumption regime, we placed targets

moving across the entire field with different speeds.

Section 4.1 has described how calculating the

consumed energy in each sensor. The remaining energy

is therefore deducted easily and the node is dead when

this energy is null. Table 3 specifies when the first and

the tenth nodes are dead and lost from the topology for

both AODV and EAODV protocols starting with

different initial levels of energy. The survivability of the

network with EAODV is significantly improved

especially when comparing the time of the tenth dead

nodes. These protocols behave similarly at the

beginning. That’s why, we obtain the same time for the

first dead node with both protocols. But, the historic

concept introduced by EAODV allows increasing the

lifetime of the network performed by extending the

lifetime of the 10th dead node (table 3).

Table 3: Time of 1st and 10th node dies for several

energy values (minute).

Energy/

node (J) Protocol

1st node

dead in

10th node

dead in

25 AODV 23 56

EAODV 25 73

50 AODV 42 119

EAODV 44 148

100 AODV 91 249

EAODV 90 303

Figure 11 shows the percentage of nodes alive

according to a heavy traffic-based simulation scenario.

EAODV allows keeping the totality of the nodes in life

until 270 mn i.e. 75 % of the total network lifetime. But,

the curve shows an abrupt fall after 320 mn, that the

network disappears within a short time from the first

died node.

Fig 11. EAODV/AODV network lifetime.

0

5

10

15

20

25

30

35

0 0.5 1 3 10 20 30

Rat

e o

f im

pro

vem

en

t %

Node speed (m/s)

0%

10%

20%

30%

40%

50%

60%

70%

80%

90%

100%

10 60 110 160 210 260 310 360

Rat

e o

f al

ive

no

de

s

Simulation time (mn)

E-AODV

AODV

(a) (b) (c)

Zone (a): shows similar results for both protocols

because EAODV behave yet as AODV in the majority

of nodes.

Zone (b): shows linear decreasing regime in terms of

alive nodes for the AODV protocol while EAODV

keeps alive the totality of nodes in the network. At the

end of this phase AODV loses 40 % of the total number

of nodes. Thus, the network connectivity may not be

possible and clusters may appear to interrupt the

network operation.

Zone (c): EAODV keeps alive the total number of

nodes until the minute 270 while AODV keeps only

37%. If we assume that the network lifetime

corresponds to 80% of nodes remaining alive, EAODV

network operates 2 times the AODV network lifetime.

However, there is a difference in existing

definitions of sensor network lifetime that are used in

relevant publications. Some of them focus on the

coverage or connectivity rate, while other combine the

coverage and connectivity to form a single requirement

called connected coverage. In many publications, a

specific rate of nodes remaining alive measures the

network lifetime. Figure 12 represents the improvement

realized by EAODV compared to AODV towards a

generic definition of sensor network lifetime based on

different rate of the remaining node alive (i.e.

threshold). As result, EAODV allows higher network

lifetime especially when keeping high the generic

threshold.

Fig 12. EAODV vs AODV network lifetime with

generic definition.

4.6. EAODV vs DEAR

Dynamic Energy Aware Routing (DEAR) is an

enhanced version of Energy Aware Routing (EAR)

protocol which propagates routing instructions and

builds data paths using a Routing Decision Function,

Path Building Process and Path Revising Process. Those

techniques depend on hops count and residual energy,

which make it closer to EAODV in terms of behavior

than any other protocols. DEAR protocol consists of a

single sink node and lots of sensor nodes; that’s why we

adopted scenario 2 with single sink node for a

comparative simulation with EAODV. A high data

density is considered to be at the level of DEAR

efficiency.

Fig 13. Comparative test: EAODV vs. DEAR.

Figure 13 shows that the time of first node loss

decreases with nodes density. DEAR protocol is more

efficient in a topology with low density. However,

EAODV acquires better performance with high nodes

density which is the typical topology of WSN.

Moreover EAODV does not show a remarkable

variation with nodes density constraint comparing to

DEAR protocol.

5. Conclusion

In this paper, we presented an enhanced version of

AODV protocol in terms of energy management.

EAODV protocol introduces three new algorithms

allowing (1) minimizing control packets using partial

diffusion method, (2) decreasing RREQ packets life

time and (3) ensuring a distributed consumption in the

network.

According to several evaluation metrics, simulation

results show that EAODV is able to reduce control

packets, keep alive the totality of node during sufficient

period and improve the network lifetime compared to

AODV.

Acknowledgement

This work is supported by the research center of the

college of Computer and Information Sciences – King

Saud University.

References

[1] Chong, C.-Y. Kumar, Sensor networks: Evolution,

opportunities, and challenges. Proc. IEEE Vol 91,

No8, 2003, pp.1247–1256.

[2] Akkarya, K. Younis, A survey of routing protocols

in wireless sensor networks. Elsevier Ad Hoc

Network. Vol3, No3, 2005, pp.325–349.

[3] Dressler, A study of self-organization mechanisms

in ad hoc and sensor networks. Elsevier Computer.

Communication. Vol 31, No13, 2008, pp.3018–

3029.

[4] Bai, X., Kumary, S., Xuany, D., Yunz, Z., Lai, T.

H., Deploying wireless sensors to achieve both

Coverage and connectivity. In Proceedings of the

7th ACM International Symposium on Mobile Ad

0

50

100

150

200

250

300

350

400

40 50 60 70 80 90

ne

two

rk li

feti

me

(m

n)

Generic threshold - rate of remaining node alive

EAODVAODV

20

30

40

50

60

70

80

90

100

110

50 100 150 200 300

Tim

e o

f th

e f

irst

no

de

die

s

Node density

EAODV

DEAR

Hoc Networking and Computing (ACM Mobihoc),

2006, pp.131–142.

[5] Dietrich, I. and Dressler, On the lifetime of wireless

sensor networks. ACM Transaction on Sensor

Networks. Vol 5, No.1, 2009, 39 pages. [6] J. Hill, et al. System Architecture Directions for

Network Sensors, Proc. of the 9th International

Conference on Architectural Support for

Programming Languages and Operating Systems,

pp. 93–104, Nov. 2000.

[7] U.B. Mahadevaswamy, M.N. Shanmukhaswamy,

An Energy Efficient Reliable Multipath Routing

Protocol for Data Gathering In Wireless Sensor

Networks, (IJCSIS) International Journal of

Computer Science and Information Security, Vol.

8, No. 2, May 2010.

[8] C. Schurgers, V. Tsiatsis, S. Ganeriwal, and M.

Srivastava. Topology management for sensor

networks: Exploiting latency and density. In

Proceedings of MOBICOM, 2002.

[9] Sungha Pete Kim Bo-Cheng Charles Lai, David D.

Hwang. Reducing radio energy consumption of

key management protocols for wireless sensor

networks. ACM 1-58113-929-2/04/0008, pp. 9-11,

August 2004.

[10] Rao, S., Gandham, S., Dawande, M., Prakash, R.,

and Venkatesan, S. (2003). Energy efficient

schemes for wireless sensor networks with

multiple mobile base stations. In Proc. IEEE

Globecom, volume 22, pp. 377–381, San

Francisco, USA.

[11] Mikko Kohvakka , Jukka Suhonen, Mauri

Kuorilehto, Ville Kaseva, H. Marko, Timo D.

Energy-efficient neighbor discovery protocol for

mobile wireless sensor networks, ACM/Elsevier

Ad hoc Networks, 2007.

[12] R. G. Yan Yu and D. Estrin. Geographical and

energy aware routing: a recursive data

dissemination protocol for wireless sensor

networks, May 2002.

[13] S. Basagni, A. Carosi, E. Melachrinoudis, C.

Petrioli, and M. Z.Wang. Controlled sink mobility

for prolonging wireless sensor networks lifetime.

ACM/Elsevier Wireless Networks, 2008.

[14] X. Du, and Y. Xiao. Energy efficient chessboard

clustering and routing in heterogeneous sensor

networks. International Journal of Wireless and

Mobile Computing, 121–130, 2006.

[15] I.Chatzigiannakis, T. Dimitriou, S. Nikoletseas,

and P. Spirakis. A probabilistic algorithm for

efficient and robust data propagation in smart dust

networks. In Proceedings of the 5th European

Wireless Conference on Mobile and Wireless

Systems Beyond 3G (EW 2004), 2004.

[16] T. Antoniou, A. Boukerche, I. Chatzigiannakis, G.

Mylonas, and S. Nikoletseas. A new energy

efficient and fault-tolerant protocol for data

propagation in smart dust networks using varying

transmission range. In Proceedings of the 37th

Annual ACM/IEEE Simulation Symposium

(ANSS ’04), 2004.

[17] Fei Tong Wan Tang Li-Mei Peng Rong Xie

Won-Hyuk Yang Young-Chon Kim. A Node-

Grade Based AODV Routing Protocol for

Wireless Sensor Network. In Proceeding of the

Second IEEE International Conference on

Networks Security Wireless Communications and

Trusted Computing (NSWCTC), 2010, pp. 180–

183, 2010.

[18] Li-Min Sun, Ting-Xin Yan, Yan-Zhong Bi, and

Hong-Song Zhu. A Self-adaptive Energy-Aware

Data Gathering Mechanism for Wireless Sensor

Networks. ICIC 2005, Part II, LNCS 3645,

pp. 588 – 597, Springer 2005.

Papiers publiés dans des

JOURNAUX INTERNATIONAUX

1. Ridha OUNI, Graph splitting based self-organization approach for energy and routing optimization,

International Journal of Digital Information and Wireless Communications (IJDIWC) 1(3): pp 738-

744, 2012.

2. Jamila BHAR, Ridha OUNI, Monji ZAIDI, Salem NASRI, A new TDMA-CR model for dynamic

resource allocation in wireless networks, IJCSES International Journal of Computer Sciences and

Engineering Systems, Vol.4, No.1, January 2010.

3. Monji ZAIDI, Ridha OUNI, Jamila BHAR, Rached TOURKI, New approaches reducing handoff

latency in 802.11 wireless LANs, IJCSES International Journal of Computer Sciences and Engineering

Systems, Vol.3, No.3, July 2009.

4. Monji Zaidi, Ridha OUNI, Kholdoun Torki and Rached Tourki, Low power ASIC designs for fast

Handoff in IEEE802.11, International Journal of Computers, Systems and Signals, Vol. 10, No.1,

pp 27-39, 2009.

5. Jamila BHAR, Ridha OUNI, Abdelhamid HELALI, Salem NASRI, Evaluation of Handover protocols

in Wireless ATM networks, Information Technology Journal (Asian Network for Scientific

Information), Vol 6, N°2, pp 275-282, 2007.

6. Jamila BHAR, Ridha OUNI, Kholdoun TORKI, Salem NASRI, Handovers strategies challenges in

wireless ATM networks, International Journal of Applied Mathematics and Computer Sciences, Vol 4,

N°2, pp 636-641, April 2007.

International Journal of Digital Information and Wireless Communications (IJDIWC) 1(3): 738-744

The Society of Digital Information and Wireless Communications, 2012(ISSN 2225-658X)

738

Graph splitting based self-organization approach for energy and routing optimization

Ridha OUNI

College of Computer and Information Sciences, King Saud University, KSA.

[email protected]

ABSTRACT

Recent advances in wireless sensor networks

have led to many new protocols specifically

designed for sensor networks where energy

awareness is an essential consideration. Both

self-organization and routing protocols

significantly impact the energy consumption

and therefore the network life time. This

paper surveys recent self-organization and

routing protocols for sensor networks and

proposes enhanced approaches for low duty

cycle and more reliable environment. We

compare some of the relays-based protocols

in a random graph model. Simulation results

will show the impact of a graph splitting

approach on the active node set and the

topology connectivity. Moreover, we analyze

the performance of that approach in terms of

transmitted and received packet rate.

KEYWORDS

WSN, MPR, MPR-CDS, Graph split.

1. INTRODUCTION

Smart environments represent the next

evolutionary development step in building,

utilities, industrial, home and transportation

systems automation. The information needed

by smart environments is provided by

Distributed Wireless Sensor Networks

(WSN), which are responsible for sensing as

well as for the first stages of the processing

hierarchy. The individual devices in a WSN

are inherently resource constrained: They

have limited processing speed, storage

capacity, and communication bandwidth.

These devices have substantial processing

capability in the aggregate, but not

individually, so they must organize

themselves and provide a means of

programming and managing the network as

an ensemble, rather than administering

individual devices.

Energy conservation is one of the most

challenging problems because batteries have

very limited capacities. Two particular

important problems are activity scheduling

and broadcasting. In activity scheduling

problem, some nodes decide to sleep to

preserve the energy, but should have an active

neighbor to collect messages for them or take

over some sensing tasks. In broadcasting

problem, one host needs to send a particular

message to all the other ones in the network.

Broadcasting is applied for publication of

services, alarming and other operations. In a

straightforward solution to broadcasting,

hosts only need to blindly relay packets at

least once to their neighborhood. However,

this leads to the well-known broadcast storm

problem as redundancy and collisions [1,2].

Self-organization protocols are proposed in

literature trying to avoid these problems by

choosing active and connected nodes set

charged of broadcasting and routing [3,4,5,6].

The concept of multipoint relaying [7,8]

consists to reduce the number of duplicated

re-transmissions when forwarding a broadcast

packet. This technique restricts the number of

re-transmitters to a small set of neighbor

nodes, instead of all neighbors, like in pure

flooding. This set is kept small as much as

possible by efficiently selecting the neighbors

which covers (in terms of one-hop radio

International Journal of Digital Information and Wireless Communications (IJDIWC) 1(3): 738-744

The Society of Digital Information and Wireless Communications, 2012(ISSN 2225-658X)

739

range) the same network region as the

complete set of neighbors does. This small

subset of neighbors is called multipoint relays

(MPR) for a given network node. The

technique of multipoint relays (or MPRs)

provides an adequate solution to reduce

flooding of broadcast messages in the

network, while attaining the same goal of

transferring the message to every node in the

network with a high probability.

With so many potential applications,

researchers are interested in algorithms to

develop "backbones" within these networks

reliably and quickly. A backbone, more

technically, is a dominating, independent set

in the graph of nodes, meaning that the nodes,

themselves, are out of one another's range, but

would be able to relay information between

intermediate nodes. Several graph models

have been proposed to impact energy but are

connectivity constrained. In this paper, a

graph splitting model will be proposed and

evaluated.

In this work, we propose to split the

entire network into two sub-networks before

applying self-organization protocols to

minimize the dominating set which leads to

reduce the number of retransmission. The

paper is organized as follows. Section 2

presents and analyzes different protocols used

for self-organization especially, MPR and

MPR-CDS (Connected Dominating Set).

While, section 3, develops an optimized

MPR-CDS model based on a graph splitting

approach and evaluates its performances.

Finally, section 4 concludes the paper.

2. WSN SELF-ORGANIZATION

PROTOCOLS

Self-organization allows devices to

recognize their surroundings, cooperate to

form topologies, and monitor and adapt to

environmental changes, all without human

intervention. Subsequently, self-organization

in wireless sensor networks provides a variety

of functions: sharing processing and

communication capacity, forming and

maintaining structures, conserving power,

synchronizing time, configuring software

components, adapting behavior associated

with routing, with disseminating and querying

for information, and with allocating tasks, and

providing resilience by repairing faults and

resisting attacks.

2.1. Flooding

A network consists of many nodes, each

with multiple links connecting to other nodes.

Information moves hop by hop along a route

from the point of production to the point of

use. In WSNs, each node has a radio that

provides a set of communication links to

nearby nodes. By exchanging information,

nodes can discover their neighbors and

perform a distributed algorithm to determine

how to route data according to the

application’s needs. A basic capability in such

networks involves disseminating information

over many nodes. This can be achieved by a

flooding protocol in which a root node

broadcasts a packet with some identifying

information. Receiving nodes retransmit the

packet so that more distant nodes can receive

it. However, a node can receive different

versions of the same message from several

neighboring nodes.

Fig.1. Primitive flooding WSN.

Primitive network is based on blind

flooding where the packet is retransmitted by

all the intermediate nodes (Fig.1). It is simple,

Source node Transmitted packet

International Journal of Digital Information and Wireless Communications (IJDIWC) 1(3): 738-744

The Society of Digital Information and Wireless Communications, 2012(ISSN 2225-658X)

740

easy to implement, and gives a high

probability that each node, which is not

isolated from the network, will receive the

broadcasted message. However, it consumes a

large amount of bandwidth and energy due to

many redundant retransmissions.

2.2. Multipoint Relay (MPR)

Many techniques are described in the

literature to reduce traffic flooding in WSNs.

But, each technique is developed for a target

application and characterized by its own

advantages and weaknesses. Here, we will

discuss the “multipoint relaying” mechanisms

(MPR and MPR-CDS) as possible solutions.

These mechanisms are based on two-hop

neighbors’ knowledge using HELLO

messages defined by the Mobile Ad hoc

Network (MANET) [9].

HELLO messages are broadcasted to all

neighbors at regular intervals. They contain

information about the neighbors and the link

state. Fig. 2 describes the process for three

nodes A, B and C. Two rounds of HELLO

messages are needed to establish the whole

one-hop and two-hop neighborhood.

Fig.2. HELLO process.

Multipoint relay was presented as a

technique to reduce the number of redundant

re-transmission in the wireless sensors

networks by electing a special node set to

cover the entire network based on the 2-hop

neighbors’ knowledge. Several rules and

algorithms are proposed for this calculation.

In this paper, we resort to the greedy [7] MPR

set computation described in the algorithm

below.

MPR Algorithm [10]

1. Start with an empty multipoint relays

set.

2. Add nodes which are the only neighbor

of some nodes in the 2-hop neighbors.

3. If there still exist some two-hop nodes

which are not yet covered, compute the

one-hop nodes degrees and choose the

maximum one.

4. Repeat step 3 until all two-hop

neighborhoods are covered.

Fig. 3 shows an example where a

broadcast message is diffused in the network

using the multipoint relays where

7 retransmissions are needed to reach all

nodes.

Fig.3. WSN deploying MPR protocol.

Fig.4. WSN deploying MPR-DS protocol.

Dominant node Source node

Transmitted packet

MPR node Source node

Transmitted packet

A 1

B 3

C 2

Hello (Empty) Hello (Empty)

Hello (A, C) Hello (A, C)

1-hop: A,C

2-hop: Ø

1-hop: B

2-hop: A

1-hop: B

2-hop: C

International Journal of Digital Information and Wireless Communications (IJDIWC) 1(3): 738-744

The Society of Digital Information and Wireless Communications, 2012(ISSN 2225-658X)

741

2.3. Multipoint Relay – Connected

Dominating Set (MPR-CDS)

Adjih and al. proposed a novel extension

of the MPR to construct a small CDS source

independent using two simples rules based on

the node ID and the greedy algorithm [5]. In

the present work, the node is selected into the

dominating set of the network if:

It has the largest degree than all its

neighbors.

It is a multipoint relay selected by its

neighbor with the largest degree.

The multipoint relays are selected using

the greedy algorithm. Nodes with highest

degrees calculate their relays and call them to

join the CDS at the third round of HELLO

messages. Fig. 4 shows the MPR-CDS

application for a wireless sensor network

composed by 12 nodes where five

retransmissions are required to reach the

entire network.

3. CDS OPTIMIZING

Bridging the gap between the hardware

technology’s raw potential and the broad

range of applications presents a systems

challenge. The network must allocate limited

resources to multiple concurrent activities,

such as sensing, processing, network

supervision and data communication. The

potential interconnections between devices

must be discovered and information routed

effectively from where it is produced to

where it is used. In this section, a graph

splitting method is developed to meet these

requirements and constraints.

3.1. Graph creation

The graph creation algorithm is an iterative

process which creates n vertices with random

x and y coordinates between 0 and 1. When

working with a square, all coordinates within

[0,1] are acceptable. We compute the

Euclidian distance from the origin of the

square in order to know whether or not a

coordinate is within the acceptable bounds of

that area (square). An efficient method to

connect the nodes is to divide the graph into

smaller pieces and connect the nodes only

within these pieces or "cells". An intelligent

graph division can minimize the number of

connections which would overlap between

"cells" and save even computation.

3.2. Graph splitting

Let G = (V,E) be a graph with a set of

nodes V and a set of edges E. The number of

nodes in G is denoted by N. The degree d(u)

of a node u is the number of edges adjacent to

u (number of neighbors). L and l are the

length and the width of the random graph,

respectively. All nodes have the same

coverage radius R.

We define p as:

The setting of ensures that

generated graphs are connected with high

probability [10,11]. In these simulations, we

study the impact of p on the CDS size. For

N=200, l=200 and R=80 and a variable L.

The simulation results of the MPR-CDS are

shown in the figure 5.

0 2 4 6 8 10 12 14 16

x 104

0

0.1

0.2

0.3

0.4

0.5

0.6

0.7

Graph surface

% o

f dom

inant

Fig 5. The CDS for the MPR-CDS in a variable graph

Length.

International Journal of Digital Information and Wireless Communications (IJDIWC) 1(3): 738-744

The Society of Digital Information and Wireless Communications, 2012(ISSN 2225-658X)

742

We observe that the percentage of dominants

decreases with the length because p increases

and therefore the probability of graph

connectivity increases too. We conclude that

by reducing the length of the graph, we

optimize the CDS set. Therefore, we will

focus, in the rest of this paper, on the impact

of the global graph splitting into many

elementary sub-graphs.

3.3. Rank split

We assume that during HELLO message

process, nodes are able to calculate their

ranks defined as follow:

Definition: The rank of node u, rank(u), is

the minimum number of hops between source

node and node u.

The source node (sink node) has the rank

zero. HELLO packet contains the number of

hops between the node and the sink. The

nodes will receive many distances and they

have to take the minimum. The MaxRnk is

the greatest rank in the network.

We split the global graph G into two sub-

graphs G1 and G2. For each node u:

Fig.6. Graph decomposition concept.

Applying the MPR-CDS for G1 (CDS1)

and G2 (CDS2). The CDSs are connected

while the global CDS for the graph G is not

connected. We propose to create a new sub-

graph Gi (CDSi) in the interface of G1 and

G2 to connect the CDSs. The global CDS

becomes:

3.4. Simulation environment

To simulate the graph splitting approach,

a simulator was developed in MATLAB. It

generates a random topology in a rectangular

area with L=1000, l=200 and R=80. The

global graph connectivity is checked by a

simulation of blind flooding. CDS

connectivity check uses the same process as

global graph where only the dominants have

the right to diffuse. The delivery rate (DR)

describes the number of nodes which receive

at least one copy of message used in the

connectivity checks. The simulation process

is described by the following flowchart:

Fig.6. Simulation flowchart.

3.5. Results analysis

Figure 7 shows the simulation results of

100 connected graphs which have been

decomposed with ranks. For low density

(N < 100), the probability to keep DR = 100%

is around 50%. While, for N ≥ 100 nodes, this

probability increases substantially reaching

Rank = 0

Rank = 1

Rank = m

Rank = m+1

Rank = n

G1

G2

Gi

Graph generation G

DR = 100% ?

CDS = MPR-CDS(G)

CDS DR = 100% ?

CDS' = MPR-CDS(G1,G2,Gi)

Data Gathering

No

No

Yes

Yes

International Journal of Digital Information and Wireless Communications (IJDIWC) 1(3): 738-744

The Society of Digital Information and Wireless Communications, 2012(ISSN 2225-658X)

743

more than 95%. Also, we note that during the

splitting process, a risk to create isolated

clusters appears for low density graphs. This

risk decreases with the increasing of the

number of deployed nodes.

60 80 100 120 140 160 180 200 220 2400

10

20

30

40

50

60

70

80

90

100

Number of nodes (N)

Gra

ph (

%)

DR=100%

DR<100%

Isolated clustering

Fig.7. Connected Graphs face to decomposition.

Figure 8 shows the difference between

the MPR-CDS with and without graph

splitting. The CDS size is performed after the

graph splitting. This difference is due to the

reduced graph area and to the nodes which

don’t consider many of one-hop and two-hop

neighbors in the CDS calculation.

200 205 210 215 220 225 230 235 240 24560

70

80

90

100

110

120

130

140

150

160

Number of nodes (N)

Num

ber

of

dom

inants

MPR

MPR-CDS

Split-MPR-CDS

Fig.8. Dominants set for MPR, MPR-DS and sub

graphs with MPR-DS.

The CDS set is responsible to control the

network. It allows transmitting and

forwarding both traffic and control messages

[9] to reduce the number of passive listening

(while not concerned). Figure 9 shows the

number of received message in the entire

network per cycle assuming that only one

node sends a message every cycle.

Consequently, the received messages are

reduced by 40% when splitting the graph and

applying MPR-CDS compared to the classic

MPR-CDS.

200 205 210 215 220 225 230 235 240 245 250 255500

1000

1500

2000

2500

3000

3500

Number of nodes (N)

Num

ber

of

recceiv

ed m

essages

MPR-CDS

Split-MPR-CDS

Fig.9. Received messages per cycle.

4. CONCLUSIONS

This paper introduced a new concept to

optimize the MPR-CDS by splitting the

network graph into many elementary sub-

graphs. It reduces the dominant set in order to

minimize the number of retransmitted packet

in the network. The idea has been simulated

using different scenarios and comparisons

with MPR and MPR-CDS are established.

The results confirm that an amount of

dominants may be removed with connectivity

guarantee. The new approach is more

efficient for dense networks that are

composed by hundreds or even thousands

nodes.

REFERENCES

1. Rahim Kacimi, “Technique de conservation

d’énergie pour les réseaux de capteurs sans fils”,

PhD thesis, Polytechnic of toulouse, 2010.

2. Ozan K.Tonguz, N. Wisitpongphan, Jayendra S.

Parikh, F. Bai, P. Mudalige, and Varsha K.

Sadekar, “On the broadcast storm problem in ad

hoc wireless networks”, Broadband

Communications, Network and Systems, 2006.

International Journal of Digital Information and Wireless Communications (IJDIWC) 1(3): 738-744

The Society of Digital Information and Wireless Communications, 2012(ISSN 2225-658X)

744

3. Karel Heurtefeux and Fabrice Valois, “self-

organization protocols: behavior during the sensor

networks life”, The 18th Annual IEEE

International Symposium on Personal, Indoor and

Mobile Radio Communications, 2007.

4. Jie Wu, Wei Lou and Fei Dai, “Extended

Multipoint relays to determine connected

dominating sets in MANET’s”, IEEE transaction

on computer, vol. 55, NO. 3, MARCH 2006.

5. Xiao chen and Jian Shen, “Reducing connected

dominating set size with multipoint relays in ad

hoc wireless networks”, Proceed. of the 7th

international Symposium on parallel architecture,

algorithms and networks, 2004.

6. Rajiv Misra, “On self-stabilization of multipoint

relays for connected dominating set in ad hoc

networks”, IEEE region 10 conference, TENCON

2009.

7. Yongsheng Fu, Xinyu Wang, Wei Shi and

Shanping Li, “Connectivity based greedy

algorithm with multipoint relaying for mobile ad

hoc networks”, The 4th international conference

on mobile ad-hoc and sensor network, 2008.

8. Cedric Adjih, philipe Jacquet and Laurent

Viennot, “Computing connected dominated sets

with multipoint relays”, Technical report, INRIA,

Oct.2002, www.inria.fr/rrrt/rr-4597.html.

9. T.Claussen, P.Jacquet, C. Adjih, A. Laouiti, P.

Minet,P. Muhlethaler,A. Quayyam and L. Viennot,

“Optimized link state routing protocol (OLSR)”,

RFC 3626, Oct. 2003, Network Working Group.

10. C. Bettestetter, “On the minimum node degree and

connectivity of a wireless multi-hop network”, in

Proc. ACM MobiHoc, Lausanne, Switzerland, Jun.

2002.

11. S. Crisostomo, J.Barros and C. Bettstetter,

“Flooding the network: Multipoint relays versus

network coding”, Circuits and Systems for

Communications, 2008.

IJCSES International Journal of Computer Sciences and Engineering Systems, Vol.4, No.1, January 2010 CSES International ⓒ2010 ISSN 0973-4406

1

A NEW TDMA-CR model for dynamic resource allocation in

wireless networks

Jamila BHAR, Ridha OUNI, Monji ZAIDI and Salem NASR I

Electronic and Micro-Electronic laboratory (EµE) Faculty of Sciences of Monastir (FSM), Tunisia

E-mail: [email protected]

Abstract

Wireless networks architecture contains mobile terminals randomly placed in cells managed by different APs (Access Points). Terminals are considered node generating different traffic types according to specific service classes. Supporting heterogeneous traffics over AP poses many questions about medium access and resource allocation. In this way, the present work study and analysis these constraints and proposes a novel technique for resources distribution. This technique, called TDMA-CR (Time Division Multiple Access-Compensation Reward) is designed at the mac layer of the AP. TDMA-based systems are considered the efficient access solution for resources allocation in wireless networks. A proposed TDMA/FDD-based mechanism is designed by a generic model in which time on the uplink and the downlink channels are divided into adjacent series of fixed-size TDMA frames. Each frame is further subdivided into a fixed number of slots to be dynamically allocated for different service classes (CBR, VBR). In this context, the solution may provide the ability to support multiple traffic types and to process them according to generic parameters. The basic idea is to provide slots reassignment, and to dynamically adjust connection parameters based on signalling information processing approach. This approach, based on resources compensation-reward, performs the WCAC (Wireless Call Admission Control) and gives solution to ameliorate link rate and traffic conditions. Simulation shows that it achieves optimal resources allocation, low connection reject probability, especially for CBR connections, and resources degradation avoidance for VBR and ABR connections, in comparable with TDMA technique. Key words: Wireless networks, TDMA, Resources allocation, performances evaluation.

1. Introduction

TDMA (Time Division Multiple Access) allows multiple users to access on a single frequency channel without interference by allocating time slots to each user. TDMA shares the available bandwidth in the time domain. Each frequency band is divided into several time slots (channels). A set of such periodically repeating time slots is known as the TDMA frame. Each terminal is assigned in

those slots. In addition to increasing the efficiency of transmission, TDMA offers the advantage to be easily adapted to the transmission of data as well as voice communication. There are different MAC schemes proposed in the literature to improve channel access based on TDMA mechanism. [3,9,11,13,17] give more details about different MAC frames structure and allocation strategies. In this paper, we are interested to evaluate a frame reservation strategy allowing efficient transmission of multi-service traffic over TDMA/FDD channels in wireless networks. This scheme is based on a dynamic bandwidth allocation model for connections carrying different types of traffic. The model strategy is to reserve bandwidth (which changes dynamically) for each type of traffic during each frame-time. The distribution of bandwidth on the corresponding VCs depends on parameters of each traffic type. Compared to classic TDMA mechanism, the simulation results using TDMA based on a compensation-reward model (TDMA-CR) shows more efficient resources allocation. Performances of TDMA-CR model are evaluated in terms of connection reject probability and traffic load, for various data traffic scenarios. The proposed MAC protocol uses fixed duration frames. It controls terminals according to traffic service class. The MAC mechanism requires negotiation of connections parameter. Unfortunately, the efficiency of such scheme can significantly decrease when the number of terminals to be served is large and/or their rates are high. Therefore, our principal goal, in this paper, is to increase the traffic load and ameliorate QoS. Even if the MAC protocol has no resources to satisfy connection request, it can compensate slots from others connections. These last can re-establish data transmit with their pic cell rate in next frames duration. This approach makes then priorities for different connections corresponding to service classes.

IJCSES International Journal of Computer Sciences and Engineering Systems, Vol.4, No.1, January 2010

2

The paper is organised as follows. Section 2 presents the protocol aspect of TDMA scheme and invokes the WATM architecture. Section 3 gives details of the proposed algorithm and the experimental design. Regarding the impact of resource allocation procedure we present our simulation model and the derived performance results. Finally, we present some concluding remarks.

2. TDMA scheme Description

Typical dynamic TDMA protocol is always selected for resources allocation in wireless networks. It is suitable to provide QoS for real-time multimedia traffics [9]. With TDMA, the bandwidth is distributed using time-slot allocation according to the service classes and leads to link scheduling.

time

Fixed frame duration (cycle)

. . . . . .

Frame header Signalling

mini-slots

Dynamic allocated ABR, VBR and

UBR slots

Fixed allocated CBR slots Idle slots

Fig. 1 Dynamic TDMAUPLINK access control frame format.

As shown in figure 1, the TDMA frame is fixed and divided into three sessions. They consist of a frame header, a signalling session, a data transmission session and an idle session. The header transport information for dynamic access control synchronisation. Data transmission session is variable because source terminal doesn’t always have data to send. The number of data slots allocated for each connexion depends on the characteristics of the service class. Four service classes (CBR, VBR, ABR and UBR) are defined according to specific traffic and QoS parameters. In this paper, we assume that the slot size is equal to a WATM cell. When a signalling session achieved, the AP knows all the terminals that have data to transmit and calculate the slots number to be assigned for each connexion. Data transmission session is composed by dynamic allocated VBR, ABR and UBR slots and fixed allocated CBR slots. Finally, the idle session is proceeded when there are no data to send after that a new TDMA frame begins.

3. Target architecture

Asynchronous transfer mode (ATM) based technology can provide high speed wireless multimedia communications. In fact, the fine-grain multiplexing provided by ATM due to the fixed small cell size is well suited to slow-speed wireless links since it leads to lower delay jitter and queuing delays [1]. The wireless ATM protocol architecture incorporates wireless access and mobility related functions into the standard ATM stack. A high speed and low complexity wireless access technique is crucial for providing bandwidth-on-demand multimedia services to mobile terminals. Typical target bit rates for the radio physical layer of wireless ATM are around 25 Mbps. A modem must be able to support burst operation with relatively short preambles as well as short control packets and ATM cells [10]. For efficient sharing the available wireless bandwidth between multiple wireless terminals, a radio MAC layer is required. A novel TDMA approach is adopted for medium access control where several virtual circuits are multiplexed in a single radio channel. The TDMA frame structure supports constant bit rate (CBR), available bit rate (ABR), variable bit rate (VBR) and unspecified bit rate (UBR) services within each access point transmission cell area.

Wireless Control

+ Signaling

W-Data Link Control

W-Medium Access Control

W-Physic control

Standard ATM Physical Layer

User service

ATM Network Layer

ATM Adaptation Layer

User service

ATM Network Layer

ATM Adaptation Layer

W-Physic control

W-Medium Access Control

Wireless Control

+ Signaling

W-Data Link Control

WATM NNI

ATM-Switch

Wireless Terminal

Access Point

Fig. 2 WATM networks architecture.

4. Design model

4.1 Wireless Terminal MAC Model

The Wireless Terminals (WT) generates CBR, VBR, ABR and UBR traffic models. The ATMF’s Traffic

IJCSES International Journal of Computer Sciences and Engineering Systems, Vol.4, No.1, January 2010

3

Management specification defines four cell-based traffic parameters namely the Peak Cell Rate (PCR), Sustainable Cell Rate (SCR), Maximum Burst Size (MBS) and Minimum Cell Rate (MCR) [13]. The PCR is a maximum rate at which the user may transmit cells. Its inverse, the minimum cell inter arrival time (1/PCR), may be easier to measure in practice and it is useful to evaluate network performances. The SCR is a possible ‘‘average rate’’ for an ATM connection. The average rate is the number of transmitted cells divided by the connection’s “duration”. For ideal Constant Bit Rate (CBR) traffic, the PCR equals the SCR. For Variable Bite Rate (VBR) traffic, the SCR is typically less than the PCR. For CBR VCs, slots are allocated according to their required bit rates. A CBR traffic convention includes the PCR and the Cell Delay Variation Tolerance (CDVT) factors. For VBR source model, we consider an “on-off” that transmits a number of cells at its SCR. Then, slots allocated to different sources depend on traffic parameters (Table 1).

Table 1: Service classes parameters

Service class

Traffic parameters QoS parameters

CBR PCR CLR+CDV+CDT VBR PCR+SCR CLR+CDT ABR PCR+MCR UBR

4.2. Access Point MAC model

The crucial networking algorithm is placed at the AP. It includes receiving (data/signalling) packet, FCFSs queuing, resources managements, etc. Hence, signalling and data WATM cells are multiplexed and processed according to resources allocation scheme. The AP controls the uplink bandwidth allocation for WATM cells from each WT, taking into account the number and the type of active connections and their bandwidth requirements. The medium bandwidth of WATM networks is divided into two separate channels: uplink and downlink. The uplink channel transfers information from WT to the AP. Each channel is further partitioned into several sub frames, carrying different classes of traffic. A set of buffer per-VC cell scheduling schemes are used as first-come first-served (FCFS) (figure 3). The FCFS cell-scheduling algorithm could be easily hardwired with low cost, however it is efficient only for homogeneous traffics. Consequently, in order to meet this weakness, several weighted FCFSs are allocated for different service classes queuing.

The radio resource manager, located at the AP, takes part in the connection admission control (CAC) process for a WATM terminal originated or terminated connection. It performs the wireless connection admission control (WCAC) and bandwidth allocation for ATM connection over the radio interface. The scheduler meets problems related to the allocation of a limited amount of shared resources (buffer memory and output port bandwidth) to support all users, applications and service classes. It allows managing access to a fixed amount of output bandwidth by selecting the next cell which will be transmitted on a port [15]. CDV parameter can be controlled since queuing data cells is required at AP.

ATM Interface

Data Cells

Scheduling Module

Queues (FCFS)

(2)

(n)

(1)

Signalling cells

Reception

Emission

Control Unit

. .

.

...

Signalling module

MAC level Physical level

Fig. 3 AP radio medium architecture in WATM.

5. TDMA-CR proposal for dynamic resource allocation

In our proposal, radio spectrum is divided into time slots which are assigned to different connections. User applications can send data only in their dedicated slots. Due to the FDD duplexing technique, integrating the MAC protocol, two distinct carrier frequencies are used for the uplink and downlink channels. Results given here are performed with symmetric traffic in both directions (between AP and WT). The AP scheduler allocates the same number of slots for uplink and downlink channels. Uplink includes signalling mini-slots, followed by allocated CBR, ABR, VBR and UBR data slots. The signalling session allows the wireless terminals sending their bandwidth requirements to the access point. Terminals keep their radios on, since every signalling session of the TDMA frame. In fact, a WT attempting to communicate with another, it sends firstly a connection request message to the AP. According to the required QoS, the AP assigns adequate

IJCSES International Journal of Computer Sciences and Engineering Systems, Vol.4, No.1, January 2010

4

number of time slots for this connection. Network parameters are manipulated with an algorithm based on characteristics typed ATM service. If there are not enough slots for the request, a connection can not be established with the required QoS guarantees. However, AP tries to adjust resources through a compensation-reward mechanism applied to all active connections. This mechanism, called TDMA-CR, attempt to avoid reject of new connections, especially CBR service class. The proposal mechanism consists of rewarding time slots from active ABR and VBR connections, without degrading their performances, in order to serve a new connection to be established. This mechanism integrates computational steps in order to offer the desired resources in an optimal rewarding way distributed on all the active service classes. In other terms, ABR, UBR and VBR connections can reward some of theirs slots to satisfy requirements (or some of them) of new connections. Thereafter, time slots of liberated connections will be used to compensate time slots offered by those connections. Then, time slots of TDMA-CR frame are actualized whether a new event occurs (connection or disconnection). However, when requirements are not satisfied, connection request is rejected. Due to their strict requirements, reject probability for CBR class could be higher than the others classes. Moreover, ABR, UBR and VBR connections can start with a lower rate which may increase during next frames. Figure 4 shows a finite state machine of signalling process.

Yes Yes Signaling packet in

wait

Start

No

Disconnection packet

Disconnection notification and parameters actualisation

No

Yes Connection Packet

Extract and save parameters of WT (slots number, service class, MVCI, ..

Fig. 4 Signaling process steps.

TDMA-CR approach starts to identify the type of request messages. Disconnection request allows actualizing available resources. However, a connection request requires activating the corresponding VCs, in the AP, and storing the reserved parameters. Second, the AP estimates the resource needed by WT in order to decide, over a calculation step, whether there are sufficient resources to establish this connection (Figure 5). Finally, The AP

returns, to all the terminals, signalling cells describing them the time slots allocation (number and position in the frame). WT sends data to the AP within the allocated time slots. If it has no data to send, the terminal operates in idle mode.

Yes Yes

. .

No

No

No

Yes

Yes

No

CBR service

Sufficient remaining

slots

No

Yes Sufficient remaining

slots

Connection reject

Start

Compensate needed slots from others connections (UBR, ABR and VBR)

Sufficient compensated

slots

VBR service

Compensate needed slots: • from others connections

(UBR, ABR and VBR) • with minimal resources

Accept a connection and send a notification

Fig. 5 Compensation-Reward protocol proposal.

6. Simulation results and performance analysis

Different extension schemes of TDMA are proposed in the literature for a fair and efficient operation of the MAC protocol. Research strategies focus on resolving difficulties to distribute carefully AP resources between WTs. Difficulties are related to various traffic conditions like buffer occupancy, connection parameter requirements, etc.. . Various solutions are proposed in the literature [6,9,11,13,17]. [11] proposes that the access point traits the average queue size. Then, information about wireless terminals queues must be sent in signalling packets over a special short control slots. It will be useful to distribute the suitable number of slots for each WT. We mention also that a scheduling technique, used for multiplexing terminals data, impacts the average buffer queue.

IJCSES International Journal of Computer Sciences and Engineering Systems, Vol.4, No.1, January 2010

5

Another challenge studied in this context takes part to improve handoff performances. Then, buffer management and optimal reservation of radio resources allows ameliorating handoff efficiency. Many admission control strategies have been discussed in the literature to give priorities to handoff requests compared to the new connection requests as shown in [3,5]. When a mobile terminal moves from one area to another, the new AP area should provide sufficient resources to this handoff connection. Because, the premature termination of established connections, due to insufficient resources, is usually more objectionable than reject new connection request. In this work, we consider frame duration of 2 ms with a rate of 25 Mbps. We evaluate the proposed protocol to ameliorate some traffic conditions. Figure 6 shows the proportionality between output and input flows for different channel utilization. Channel utilization is defined in [1] as the ratio of the number of slots allocated for WATM data cells to the total available slots. This figure depicts the influence of the service class on the output data rate. CBR traffic is particularly served with a higher flow ratio than VBR traffic. This is explained by a priority given by TDMA-CR to CBR sources. These lasts can support applications with strict temporal constraints (Real Time).

0

10

20

30

40

50

60

70

80

15 30 50 70 85

input (%)

outp

ut (

%)

CBR

VBR

Fig. 6 Traffic Variation in function of service class.

Resource allocation protocol is useful to efficiently distribute available bandwidth to active connections. TDMA-CR performs to satisfy QoS parameters for each connection and to increase the percentage of resources utilisation as shown in figure 6. The resources utilisation improvement explains that compensation approach avoid wasting resources which allow increasing the number of served connections. Consequently, it decreases the reject probability, using the remainder and the compensated resources to be available for connecting new terminals. TDMA-CR is, then, a resource allocation protocol witch affect the connection reject probability. Figure 7 compares,

for the same considered traffic scenario, a reject probability between classical TDMA and TDMA-CR schemes. We mention that the large gap between curves during the first period explains the compensation efficiency introduced by TDMA-CR. This is due to the resource availability which could be compensated between connections. In the remained simulation time, the gap of reject probabilities becomes small. This means that resources become limited or a big number of terminals need to be served. However, the average reject probability is significantly lower for the TDMA-CR scheme compared with TDMA scheme.

0

0,02

0,04

0,06

0,08

0,1

0,12

0,14

0,16

0,18

0,2

0 1 2 3 4 5 6 7 8 9

time (s)

Rej

ect

pro

bab

ility

TDMA

TDMA-CR

Fig. 7 Connection reject probability.

Presented results show that a compensation mechanism does not decrease a reject connections number only, but it also increase the percentage of resources utilisation as shown in figure 8. This figure outlines a traffic variation of 22 terminals equally distributed between CBR and VBR sources. Simulation results show that TDMA-CR schemes gives more than 25% of band regarding to TDMA. The improvement of resources utilisation explains that compensation approach avoid resources wasting and increase a number of served connections.

0

10

20

30

40

50

60

70

80

90

1 2 3 4 5 6 7 8

time (sec)

%in

put

TDMA

TDMA-CR

Fig. 8 Resources utilization percentage.

IJCSES International Journal of Computer Sciences and Engineering Systems, Vol.4, No.1, January 2010

6

In this work, we have considered a priority aspect between HandOver connection and new connection and a priority according to a service class category (CBR, VBR). Figure 9 shows that reject probability depends on a proportion of CBR connections. CBR service class is a unique class that doesn’t accept compensation of its resources. In consequence, connexion CBR requests must be served according to their traffic parameters or it is rejected. As shown in figure 9, CBR connections presents minimal reject probability when they are all established. In this case, it is possible to use resources compensation (minimal CBR traffic percentage). Otherwise, reject probability increase because when CBR traffic is dominant there will be little resources reserved for others classes to make compensation.

0

0,01

0,02

0,03

0,04

0,05

0,06

0,07

0,08

0,09

15 30 50 70 85

CBR traffic (%)

Rej

ect p

roba

bilit

y

Fig. 9 CBR connection reject probability.

TDMA-CR is also designed to ameliorate HandOver performances maintained by a transparent transition between APs. In this way, it gives priority for HandOver requests compared to the new connection requests. As a result, the HandOver reject probability is notably decreased (figure 10). Moreover, disconnecting Handover terminal in order to serve a new connection is usually not preferred such as explained in [3,4,15].

0

0,02

0,04

0,06

0,08

0,1

0,12

0,14

0,16

0,18

0,2

0,06

0,55

1,05

1,56

2,08

2,58

3,08

3,58

4,08

4,58

5,08

5,57

6,07

6,58

7,07

7,58

time (sec)

reje

ct p

roba

bilit

y

Total connections

Handover connections

Fig. 10 Reject probability of HandOver connections.

The Cell Delay Variation (CDV) is a sensitive QoS parameter which depends on the type of service class. CDV should take on almost constant value especially for CBR classes. Figure 11 presents the CDV of CBR connections characterized respectively by PCR of 500 kbps and 1 Mbps. TDMA-CR minimizes CDV fluctuations which allow ameliorating QoS to be offered to mobile terminals and meets application delay constraints. It gives a sufficient resources distribution strategy that arranges fairly all the connections.

1,47

1,49

1,51

1,53

1,55

1,57

1,59

1,61

0

0,31

0,61

0,92

1,22

1,53

1,83

2,14

2,45

2,75

3,06

3,36

3,67

3,97

4,28

4,58

Time (ms)

CD

V (

µs)

CBR(500kbps)

0,69

0,71

0,73

0,75

0,77

0,79

0,81

1,36 1,6

1,83

2,07

2,31

2,54

2,78

3,01

3,25

3,49

3,72

3,96 4,2

4,43

4,67 4,9

Temps (ms)

CD

V (

µs)

CBR (1 M bps)

Fig. 11 CDV variation of CBR connections.

IJCSES International Journal of Computer Sciences and Engineering Systems, Vol.4, No.1, January 2010

7

The overhead is defined by signalling messages introduced by TDMA-CR to insure compensation and negotiation of desired resources. Signalling messages are automatically and proportionally increased according to network traffic conditions and active terminals number (figure 12).

0

2

4

6

8

10

12

14

16

18

20

15 30 50 70 90

traffic level (%)

Ove

rhea

d (%

)

Fig. 12 Overhead variation in function of traffic percentage.

7. Synthesis results

7.1 Layout

Resource allocation process necessitates functions to the extraction and the manipulation of traffic parameters. It needs also functions to compute desired resources according to saved parameters. Complex models including arithmetic operators as addition, division and multiplication are, then, required to be employed in the resource allocation process.

Physical conception and verification present significant steps for integrated circuits conception procedure. Figure 13 shows a layout of the obtained resource allocation circuit. It indicates the complexity level of this circuit. Regarding to circuits complexity, some routine are applied to give fan-out trees of interconnections and generate clock trees for adequate distribution.

Fig. 13 Layout in silicon level.

7.2 Clock Distribution

The quality of the clock Distribution in a circuit plays a significant role in the performances of a synchronous circuit. The majority of numerical applications are implemented in synchronous logic, because the current tools for synthesis do not allow the automation for every design. These tools allow the automation for design with combinative or sequential descriptions which rest on one or more clock. It is vital for a certain implementation that clock must be known and fixed in all the physical circuit, and its geometrical propagation does not imply distortion and dephasing. The solutions to guarantee a uniform clock distribution without skew dephasing are multiple. The best solution used today to reduce the clock dephasing is based on the concept of clock tree, it inserts on each level of hierarchy, buffer or reverser which rectifies the clock signal locally. This solution has the advantage of producing a geographically distributed and optimized consumption. Figure 14 presents clock trees of resource allocation circuits designed to be integrated in the APs. Clock trees quality play an imported role to increase synchronous circuit performances.

IJCSES International Journal of Computer Sciences and Engineering Systems, Vol.4, No.1, January 2010

8

Fig. 14 Clock tree in silicon level.

8. Conclusions

The MAC level should provide QoS management based bandwidth allocation to multiple traffic classes. In fact, various applications such as voice, video and high quality multimedia services need QoS guarantees in order to ensure delay constraints, prescribed data rate and loss. In this paper we have evaluated an algorithm to distribute the resources provided by the access point (AP) at the MAC layer in wireless networks. We consider a classical TDMA/FDD mechanism. It is designed by a generic model in which time on the uplink and downlink channels are divided into a contiguous sequence of fixed-size TDMA frames. Each frame is further subdivided into a fixed number of slots to be dynamically allocated to different ATM traffic classes: CBR, VBR, ABR, and UBR. This approach uses a compensation-reward process called TDMA-CR. It controls all signalling information of connected terminals in order to compute the suitable allocation of slots according to the service classes. Simulation results show the efficiency of such compensation-reward approach to improve traffic conditions.

References [1] Ekram Hossain and Vijay K. Bhargava; Link-Level Traffic

Scheduling for Providing Predictive QoS in Wireless Multimedia Networks; IEEE transactions on multimedia, Vol 6, N°1, Feb 2004.

[2] Xiaohua Li; Contention Resolution in Random-Access Wireless Networks Based on Orthogonal Complementary Codes; IEEE transactions on communications, Vol 52, N°1, Jan 2004.

[3] P. Ramanathan, K. M. sivalingam, P. Agrawal and S. Kishore; Dynamic resource allocation schemes during handoff for mobile multimedia wireless networks; IEEE

journal on selected areas in communications, Vol 20, July 1999.

[4] Bih-Hwang Lee Hsin-Pei Chen Su-Shun Huang; Dynamic Resource Allocation for Handoff in WATM Networks; 11th International Conference on Parallel and Distributed Systems (ICPADS'05) IEEE 2005.

[5] Maria C. Yuang, Po L. Tien, and Ching S. Chen; A Contention Access Protocol with Dynamic Bandwidth Allocation for Wireless ATM Networks; p149-153, IEEE 2000.

[6] P. Narasimhan, S.K. Biswas, C.A. Johnston, R.J. Siracusa & H. Kim; Design and Performance of Radio Access Protocols in WATMnet, a Prototype Wireless ATM Network; Book: Advances in Wireless Communications; book series: The International Series in Engineering and Computer Science, Vol. p 435, 2002.

[7] Tarek Bejaoui1, Véronique Vèque, Sami Tabbane; Combined Fair Packet Scheduling Policy and Multi-Class Adaptive CAC Scheme for QoS Provisioning in Multimedia Cellular Networks; International Journal on Communication System, 2005.

[8] Jaime Sánchez, Jorge Flores Troncoso, José R. Gallardo; Retransmission Algorithm based on Power Priorities for Wireless Networks; PIMRC; IEEE 2002.

[9] Celal Ceken, Ismail Erturk, Cuneyt Bayilmis; A new MAC protocol design based on TDMA/FDD for QoS support in WATM networks; Computer Standards and Interfaces Vol 28, p 451-466, 2006.

[10] H. Kim, S.K. Biswas, P. Narasimhan, R. Siracusa and C. Johnston; Design and Implementation of a QoS Oriented Data-Link Control Protocol for CBR Traffic in Wireless ATM Networks; Wireless Networks, Vol 7, p 531–540, 2001.

[11] Rolf Sigle, Thomas Renger; Fair Queueing Wireless ATM MAC Protocols; Computer Networks 31(9-10): p 985-997 (1999).

[12] Wojciech Burakowski, Halina Tarasiuk, Andrzej Beben and Marek Dabrowski; EuQoS IST project: Overview of the QoS framework for EuQoS; IST-1999

[13] Ahcene Bouzoualegh, Thierry Val, Eric Campo and Fabrice Peyrard; Study and simulation of an efficient medium access control protocol for local area underwater networks; first International Workshop on Wireless Communication in Underground and Confined Area; 2005 Val d’Or, Canada.

[14] Michael Wolf, Rolf Sigle; Medium Access in Wireless ATM Systems for Industrial Applications: Requirements and Solutions, International Performance, Computing, and Communications Conference, p 18-22, IEEE1998.

[15] Jongho Bang, Sirin Tekinay, Nirwan Ansari; A novel capacity maximisation scheme for multimedia Wireless ATM systems providing QoS guarantees for handoffs; VTC2000.

[16] Tae-Hee Kim, Kwan-Woong Kim, Jae-Hoon Kim, Ho-Jin LEE; Adaptative CDV compensation algorithm for satellite networks; IEICE Trans. Commun, pp 3401-3407, Vol E88-B, N°8, 2005.

[17] Sami A. EL-Dolil, Mohammed Abd Elnaby; An intelligent resource management strategy for the next generation WATM personal communication networks; Proceedings of the 46th IEEE International Midwest Symposium on

IJCSES International Journal of Computer Sciences and Engineering Systems, Vol.4, No.1, January 2010

9

Circuits and Systems, Vol 1, p 133-136, IEEE 2004. [18] Der-Rong DIN; Wireless ATM Backbone Network Design

Problem; IEICE trans. Fundamentals, special section on Multi-dimensional Mobile Information Networks; Vol E88-A, N°7, July 2005.

[19] Sungjin Lee, Optimal Loading Control Based on Region-Time Division for Uplink Broadband Cellular Networks; IEICE trans. fundamentals, special section on Wide Band System, Vol E89-A, N°11, Nov 2006.

IJCSES International Journal of Computer Sciences and Engineering Systems, Vol.3, No.3, July 2009

CSES International ⓒ2009 ISSN 0973-4406

1

New approaches reducing handoff latency in 802.11 wireless New approaches reducing handoff latency in 802.11 wireless New approaches reducing handoff latency in 802.11 wireless New approaches reducing handoff latency in 802.11 wireless

LANsLANsLANsLANs

Monji ZAIDI, Ridha OUNI, Jamila BHAR and Rached TOU RKI

Electronic and Micro-Electronic Laboratory (EµE, IT -06) FSM, Monastir, Tunisia

[email protected]

Abstract Wireless local area networks (WLAN) have seen rapid growth and deployment in the recent years. It has become the state-of-the art campus networking option in many academic and corporate campuses. As Wi-Fi technology becomes ubiquitous, it is important to understand trends in the usage of these networks. As the mobile clients are moving from one access point to another, the convectional layer-2 handoff consumes more time in the channel-scanning process. The proposed handoff mechanism for mobility management is designed to minimize the handoff latency in IEEE 802.11 wireless local area network. It reduces the discovery phase according to two models extended from the basis model. There are two methods to implement Handoff functions in the MAC layer. The first method is CPU-based solution. It uses software for protocol analysis and CPU, such as DSP, for process management. It is more flexible in design stage and easy to modify, however the low processing speed and the higher cost present its major weakness. The second method means that all functions are processed by hardware circuits. The advantage of this method is circuit reconfiguration and processing speed very high, but it needs long developed time. We propose the last method to implement handoff functions in the MAC layer. Key words: Handoff, Latency, MAC, 802.11, Mobility, FPGA.

1. Introduction

IEEE 802.11 based wireless LANs have seen a very fast growth in the last few years [1]. Voice over IP (VoIP) is one of the most promising services to be used in mobile devices over wireless networks [2]. One of the main problems in VoIP communication is the handoff latency introduced when moving from one Access Point (AP) to another [3]. Then, the amount of time needed for the handoff in 802.11 environments is too large for seamless VoIP communications [4]. The definition of new mobile network architectures able to improve the Internet experience to the mobile users is becoming the primary objective of the wireless research community. The future 4G access technologies will inevitably have to cooperate with the existing cellular environments (e.g. 3G) and indoor environments (e.g. 802.11 WLAN). These

technologies have been developed for provisioning different specific services and thus they widely vary in terms of bandwidth, latencies, coverage capability, etc. The complementariness of these radio access technologies can be an advantage, in order to offer adaptive and flexible services to mobile users. The incompatibilities between heterogeneous systems will be overcome by using both new hardware solutions (for example FPGAs solutions for providing physical layer reconfigurability) and new software solutions (algorithms and protocols for providing mobility management across heterogeneous systems). We were able to reduce the handoff latency using extended handoff mechanisms, with modifications being limited to mobile devices and compatible with standard 802.11 behaviors.

This paper is organized as follow. Section 2 presents a wireless communication environment based on IEEE 802.11 standard. In section 3, we describe the existing layer-2 handoff mechanism. In section 4, we detail handoff mechanisms proposed for campus wide networks. The simulation, analysis and synthesis are dealt in Section 5. Finally, section 6 concludes the paper.

2. IEEE 802.11 Standards

There are currently three IEEE 802.11 standards [5]: 802.11 a, b and g. The 802.11a standard operates in the 5 GHz ISM band. It uses a total of 32 channels of which only 8 do not overlap. Both 802.11b and 802.11g standards operate in the 2.4 GHz ISM band and use 11 among the 14 possible channels. While 802.11b can operate up to a maximum rate of 11 Mbit/sec, the 802.11g and 802.11a standards can operate up to a maximum rate of 54 Mbit/sec. The 802.11g standard is backwards-compatible with the 802.11b standard while the 802.11a standard, because of the different ISM band, is not compatible with the two other.

IJCSES International Journal of Computer Sciences and Engineering Systems, Vol.3, No.3, July 2009

2

2.1. Wireless LAN architecture

In this section, we briefly summarize the network functions and services of the 802.11 standard, in order to better clarify the Handoff Process and the innovative contributions. We outline this architecture as described in [6]. A traditional WLAN architecture can be considered as a type of cellular architecture, where each cell is called Basic Service Set (BSS) and is controlled by a base station called Access Point (AP). Each network has a name called Service Set Identifier (SSID) which is advertised by the AP in special control messages called beacons. When two or more APs using the same SSID are connected via a broadcast layer 2 network, called Distribution System (DS), an Extended Service Set (ESS) is created (figure 1). The standard also defines a set of networking services, which are categorized into station services and distribution services. Specifically, station services are the authentication, desauthentication, confidentiality, and MAC Service Data Unit (MSDU) Delivery services, while the distribution services include association to the access point, disassociation, reassociation, distribution in the whole ESS, and integration towards non-802.11 networks. Additional MAC services are defined in the standard and in some extensions (e.g. 802.1le, 802.11i, 802.1lf) for optimizing and protecting the use of the wireless resources through rate adaptation, quality of service differentiation, encryption/decryption, and so on. IEEE 802.11 specification focuses on the two lowest layers of the OSI model while they incorporate both physical and data link components. The data link layer is partitioned into the logical link control (LLC) and the media access control (MAC). All 802.11 networks have both a MAC and a physical component. The PHY layer consists of the radio and the radio’s shared channel. The MAC layer maintains communications among 802.11 stations by managing the operation of the PHY and by utilizing protocols that support and enhance communications over the radio medium.

ESS

BSS BSS

Distribution Network

AP AP

MT MT

Fig. 1 IEEE 802.11 architecture.

2.2. IEEE 802.11 Management Frames

The IEEE 802.11 management frames enable stations to establish and maintain communications. The following are common IEEE 802.11 management frame subtypes, with the description quoted from [7]. Probe request: A mobile terminal (MT) sends a probe request frame when it needs to obtain information from another station. For example, a MT would send a probe request to determine which access points (APs) are within range. Probe response: A MT will respond with a probe response frame, containing capability information, supported data rates, etc., after it receives a probe request frame. Authentication: The 802.11 authentication is a process whereby the AP either accepts or rejects the identity of a MT. The MT begins the process by sending an authentication frame containing its identity to the AP. With open system authentication (the default), the MT sends only one authentication frame, to the selected AP which could accept or reject the connection through an authentication frame.

MT Active AP Old AP

New AP

Probe request

Probe response

Probe response

Probe response

Probe request

Probe response

Probe response

Probe response

...

...

Chann

el 1

Cha

nnel N

Authentication request

Authentication response

Association request

Association response

Exchange

Stop accepting Traffic

Start accepting Traffic

Hand

off La

tency P

robe

dela

yA

uth

ent

icatio

n a

nd

Ass

oci

atio

n d

ela

y

Fig. 2 Handoff latency in IEEE 802.11 Networks.

Reassociation request: If a MT roams away from the currently associated AP and finds another AP having a stronger SNR, it will send a reassociation frame to the new AP. This last then coordinates the forwarding of data frames that may still be in the buffer of the previous AP waiting for transmission to the MT.

IJCSES International Journal of Computer Sciences and Engineering Systems, Vol.3, No.3, July 2009

3

Reassociation response: An AP sends a reassociation response frame containing an acceptance or rejection notice to the MT requesting reassociation. Similar to the

association process, the frame includes information regarding the association, such as association ID and supported data rates.

AP AP APCh_1 Ch_NCh_2

Probe Request (broadcast)

Probe R

esponse

Probe R

esponse

Probe Request (broadcast)

Probe Request (broadcast)

Probe Request (broadcast)

Probe R

esponse

Probing Latency

….…..

….…..

Min Channel Time

Max Channel Time CST

CST

CST

Wasted Channel

Max Channel Time

Wasted Probe-Wait

MT

AP…

Fig. 3 Probing process in IEEE 802.11.

3. Existing layer-2 handoff mechanisms

The conventional Handoff process is divided into three phases namely (a) Scan (b) Authentication and (c) association as illustrated in figure 2 [5]. Scanning phase is the dominating factor in handoff latency, accounting for more than 90% of the overall latency [4]. The probing process (or scanning process) finds a new available AP with the best signal quality with respect to the station. Figure 3 illustrates the probing procedure as described in the IEEE Standard 802.11. In this figure, N distinct channels are selected to probe. Once the channels to be probed are determined, the MT switches to each selected channel and broadcasts a probe request frame. We call this latency the Channel Switch and Transmission overhead (CS&T). In figure 3, the arrows toward APs represent such probe request frames broadcast on a channel (numbered in a circle). Upon receiving a probe request, APs respond with probe response frames to the MT (downward arrows). After the transmission of the probe request, the station waits for a certain amount of time (probe-wait time) before switching to the next channel. After probing all selected channels, the next AP is determined from the information received in the probe responses and their associated Signal to Noise Ratio (SNR). During the transition phase (authentication and association), a MT identifies a suitable candidate AP, breaks its association with the current AP and then reassociates with the targeted AP. Existing handoff mechanism is based on Scanning channels, authentication and association or reassociation phases. This model is described with a hardware

description language using a Finite State Machine (FSM). In this model, handoff starts when the SNR drops than a specific threshold. Figures 3 explain, with more details, the basis handoff model and its steps latencies. Prior research has focused on improving handoff performance using a single radio interface. Shin et al. [14] in the Neighbor Graphs work explore techniques to improve handoffs by implementing a topology inferencing technique in both clients and APs. Ramani et al. [15] defined a technique called SyncScan that requires appropriate time synchronization between APs and clients. SyncScan also requires synchronization of Beacon broadcast times for different APs and periodic channel hopping of clients. Both schemes seek to reduce the time spent in the channel scanning phase when a handoff occurs. In [16] authors proposed a method to completely eliminate handoff time using two radio interfaces in wireless devices. This method requires a high cost, significant power consumption and increases the interference rate, thus a high congestion.

4. Handoff proposal: New approaches

4.1. Model with reduced Scan phase

In this work, the objective consists of reducing handoff latency. As a first solution, we propose to alleviate the scan delay since it takes the major part of the handoff latency. In fact, this solution consists of transmitting Probe requests which the scanning channels, stops once a Probe response indication is received with an adequate SNR. An SNR threshold level has been defined to select AP that provides

IJCSES International Journal of Computer Sciences and Engineering Systems, Vol.3, No.3, July 2009

4

QoS guarantee. Figure 4 explains the first approach based on reduced scan phase. During Scan phase of basis handoff model, the MT must sweep the total number (N) of channels. The time allocated to scan each channel is called MaxChannelTime. Thus, the time of Scan is given by the Eq. 1.

eChannelTim*mberChannelsNuScanTime = (1) MaxchannelTime is the time interval separating the Probe Request and the last Probe Response on each channel. The scan time can be reduced when minimizing the channel number to scan. By being unaware of negligible times, the idealized latency of this active Scan is given by the Eq. 2.

)2(*)(*))(1(1∑

=

=

+−=NumChannelc

c

MaxcpMincpScantim

Where P(c) is the probability of one or more APs operating in the same channel (c) . Whether Min Channel Time and Max Channel Time values are respectively 1 ms an 11 ms ideal latency should extend from 11 ms to 110 ms. Based on Eq. (1), it becomes unuseful to sweep all channels while the most adequate AP belongs to a channel already scanned. In others terms, scanning the rest of channels doesn’t serve to find useful AP, but it loses time which causes to higher scan latency. The implementation of this model takes into account the specific threshold once reached, the MT stops the scan process and follows the rest of the basis handoff phases. Then, it is obviously that the reduced scan model, described in figure 4, leads to a fast communication establishment.

Scan Channel i

AP(Ch i) selectionSNR i >Thershold

The rest of basismodel phases

Nex

t ch

anne

l

Transmit probe Request on channel i.Receive probe Response from channel i.

YesNO

Fig. 4 Second model: reduced Scan phase.

4.2. Predictive model

The second model, based on predictive approach, can be adopted in two hypotheses. The first one occurs when supported applications meet temporal constraints or significant QoS level. Then, the Handoff process should be achieved without (a) generating communication rupture at the applicative level and (b) degrading QoS guaranties. The second situation occurs when mobile stations follow

predefined trajectories. The solution consists of selecting the future AP before handoff setup. Then, the AP is selected in an advanced step in order to allocate resources needs useful for the next MT hop and to minimize handoff latency. This solution is a probabilistic based approach since we predict AP. However, it takes into account several arguments and parameters to outlines decision for the probable AP that can be chosen to maintain an established connection. The mobile station achieves its first attachments using the basis model. For each transition from one cell to another, the MT records AP addresses which can be used to determinate its trajectory. The future AP can be predicted using addresses of the old APs present in the direction of the MT. As well as the number of AP meted by the MT becomes higher, so its trajectory is strictly defined. We propose here that three successive attachments or AP addresses allow discovering the MT trajectory. Figure 6 presents a cellular network and predefined trajectories followed by MT [13].

AP 4

AP 10

AP 5

AP 6

AP 2

AP 9

AP 1

AP 7

AP 8

AP 3

First attachment(AP4, - , -)

Snd attachment(AP4, AP10 , -)

3rd attachment(AP4, AP10 , AP9)

MT 1MT 2

Fig. 5 Target cellular topology and mobility trajectory for predictive

handoff model.

Figure 6 represents the predictive algorithm flowchart which outlines two main parts: basis model part and predictive part. The basis model part is similar than the model described in section 3. The predictive part works with two threshold levels: Thmin and Thmax. When the connection is established, the prediction of the next AP starts when the current AP SNR degrades to the Thmax threshold. The prediction phase takes place in an advanced time to allocate resources within a predicted AP. Furthermore, once the current AP SNR drops and reaches the Thmin threshold, the MT initializes the authentifica-tion and the association phases with the predicted AP.

5. Implementation

Our contribution for reducing handoff latency reposes on the lower layers of the 802.11 networks (MAC and PHY). Physical layer is divided into two sub-layers: the Physical

IJCSES International Journal of Computer Sciences and Engineering Systems, Vol.3, No.3, July 2009

5

Layer Convergence Procedure (PLCP) and the Physical Medium Dependent (PMD) [11,12]. We assume that a specific data was done by PLCP. The PLCP is the bridge between MAC and radio transmission layers over which it translates MPDU to PMD frames. The PMD is responsible

for transmitting any bits it receives from the PLCP to the wireless medium by using antenna. The major efforts of the handoff processing are almost in the MAC layer, which we did consider new approaches to be integrated in this level.

Connection established

(N < 3)

SNR drops Thmin

Basis Handoff

Connection established (N >= 3)

SNR drops Thmin

SNR drops Thmax

Prediction Authentification

Association

Yes

Yes

Yes

Fig. 6 Predictive model state diagram.

In this section, we outline the implementation of the MAC layer in a mobile terminal. A modular architecture proposal of the MAC layer, based on receiver and transmitter component, is represented in figure 7. It details interaction between MAC layer and both LLC and PLCP layers. Various types of handshaking signals are integrated to manage and control transmission in both directions. Table 1 defines the interfacing signals and briefly describes their operations. The receiver component receives PMDUs from PLCP and decodes them into various types of packets [8,9,10]. First, it identifies the type of frames (signalization, data or control) and next processes them accordingly. For the handoff initialization and operation, the main task of the MAC receiver component consists of processing probe response frames and controls SNR level. The transmitter component allows (a) events detecting (b) parameters buffering and (c) message generating. Furthermore, it maintains a permanent interaction with the receiver component in order to manage events (SNR, New connection…) and satisfy requirements (service classes, addresses…). The transmitter is mainly responsible first,

for handoff initialization by generating probe requests over different channels. Second it allows automatizing handoff phases according to the specific approaches described in section 4.

Table 1: Receiver/transmitter component interface signals.

Signals (interf ports) Description

Clk Operation clock Canal_val Sets Channel value to physical layer Order Used to schedule responses in a specific order

Phy_start Physical layer notifies starting to receive data

Sig_level Indicates the SNR of the AP

Prob_resp MT receives Probe Response frames from APs

Phys_data Data signals from physical layer

Prob_reqst Notifies that the transmitter sends probe request frame

Ack Notifies that the transmitter sends an acknowledge frame

Scan_fini Indicates that all channels have been scanned.

Phy_

start

Pro

b_re

sp

Sig_leve

l

Phys

_dataP

rob_re

qst

Ack

Canal_va

l

OrderS

can_fin

i

Physical Layer:PLCP and PMD

MAC

LLC: Logic Link Control

Clk

Transmitter Part Receiver Part

16 4 2 4

16

Fig. 7 Modular architecture proposal of the MAC layer.

IJCSES International Journal of Computer Sciences and Engineering Systems, Vol.3, No.3, July 2009

6

Probe Response FramesProbe Request Frame(First channel)

MT Address AP Address SNR

Probe Request Frame(2nd channel)

Fig. 8 Simulation of the Scan Phase on the first channel (basis model).

Probe Request Frame(First channel) Probe Response Frames Authentication frame Association frame

Association responseAdequate thershold on the first channel Authentication response

handoff finished

Fig. 9 Simulation results of the reduced scan model.

5.1 Simulation and results

5.1.1 Basis model

A mobile station broadcasts probe request over three channels. On each channel, it expects to receive responses from three access points. Response frames as well as their SNR are buffered and then used to select the AP that satisfies the mobile requirements. Figure 8 gives an example of an active scan timing diagram. It shows also probe response frames identification, addresses extraction and SNR measurement. The rest of the handoff process reposes on authentication and association phases while each one a frame is sent to the selected AP and a response is received.

5.1.2 Handoff with reduced Scan

Figure 9 shows the simulation of a fast handoff processing model. Optimal handoff latency is improved by reducing the scanning phase, which finishes once an adequate AP is detected. A higher detected SNR avoids scanning the other channels and allows joining the corresponding AP. Authentication and association phases are similar than those of the basis model. This approach remains probabilistic opposite of the adequate AP order while another AP may be detected within the rest of channels. In worst case, this approach improves the basis model performances.

5.1.3 Predictive model

The predictive handoff model is similar than the basis model during the first three transitions. This period serves as training phase in order to discover the MT trajectory

IJCSES International Journal of Computer Sciences and Engineering Systems, Vol.3, No.3, July 2009

7

over an historical setting created with signaling messages between the MT and the meted AP. This model could

predict the future AP since the fourth handoff execution. The MT authenticates with this AP without scanning step.

SNR drops

5th handoff initialisation

Adresses of the three last APs whichaccomodated the MT

Old connection New connection

Handoff finished

...

Fig. 10 Attachment within the predictive model.

Figure 10 shows the predictive model simulation at the 5th handoff initialization. At this level, the MT trajectory is discovered and the future AP is predicted according to the historical transitions. When the SNR drops, the MT authenticates and joins with this AP without scanning. This approach improves reducing handoff latency compared to the two others models as outlined in figure 10. This study enables to conclude that the handoff latency depends on scan period or in other terms on the number of AP which operates under several channels. In fact, minimizing one among N channels to be scanned allows reducing almost 1/N of the total handoff latency. The handoff latency measures the time between a probe requests is sent until an association reply is received. The basis model requires to seen all channels. It needs 184 clock cycles without counting the Channel Switch and Transition overhead (CST). The second model provides, in general three responses according to the probe response order of the adequate AP. • Scenario 1: We suppose that the adequate signal is

received during Scan of the third channel (the last). In this case, the latency of the handoff is equivalent than the basis model.

• Scenario 2: means that the adequate signal is received on the second channel (Half-time). In this case, the scan of the third channel is useless.

• Scenario 3: when the MT detects an adequate signal, on the first channel such as outlined in figure 9. Then, the second and the third channels are useless. It is clear that there is significant decrease of handoff latency by the proposed models (figure 11).

In subsequent, we consider five scenarios in order to evaluate the handoff latency. Each scenario presents six

successive handoff executions. In our results, the k+1th handoff latency (k = 1, 2, 3, 4 or 5.) is equal to the sum of all latencies of the earlier handoff executions.

18

14

81

8

18

99

18

18

51

18

18

14

81

8Scan AssociationAuthentication

18

51

8

Basis Model Model With reduced Scan Predictive Model

Han

do

ff L

aten

cy (

Clo

ck C

ycle

)

0

200Scenario 1

Scenario 2

Scenario 3

Fig. 11 Handoff latency for the three models.

For the basis model, the scan phases are similar for all executions while the MT is required each time to scan all available channels on the network. For the predictive model, we note that during the first three attachments, the handoff latency is similar to the basis model. The predictive model starts during the third attachment since the terminal has a history reflecting its trajectory. From the third attachment, the MT may provide the next AP without conducting the scan phase. Consequently, the handoff execution becomes transparent due to its short duration. Then, the handoff latency of the

IJCSES International Journal of Computer Sciences and Engineering Systems, Vol.3, No.3, July 2009

8

predictive model becomes lower than 25 % of the basis model. This is more suitable for real time applications. The reduced scan model depends on the detection of the adequate SNR that can be received over the first, the

second or the third channel. In fact, the reduced scan model remains a probabilistic model. The following figures present the handoff latencies for the three models using five scenarios.

1 2 3 4 5 60

200

400

600

800

1000

1200

Basis model Model with reduced scan Predictive model

Tota

l late

ncy

of h

ando

ffs (cloc

k cy

cle)

Initialization numbers of handoff 1 2 3 4 5 6

0

200

400

600

800

1000

1200 Basis model Model with reduced scan: Proposed Predictive model: Proposed

Tota

l latenc

y of han

doffs

(clock

cyc

le)

Initialization numbers of handoff

Scenario 1 Scenario 2

1 2 3 4 5 60

200

400

600

800

1000

1200 Basis model Model with reduced scan Predictive model

Tota

l late

ncy

of h

ando

ffs (cloc

k cyc

le)

Initialization numbers of handoff 1 2 3 4 5 6

200

400

600

800

1000

1200 Basis model Model with reduced scan Predictive model

Tota

l latenc

y of hand

offs (c

lock

cyc

le)

Initialization numbers of handoff

Scenario 3 Scenario 4

1 2 3 4 5 6

0

200

400

600

800

1000

1200 Basis model Model with reduced scan Predictive model

Tota

l late

ncy

of han

doffs

(clock

cyc

le)

Initialization numbers of handoff

Scenario 5

Table 2: Handoff latencies of the proposed mechanisms.

Models Handoff latency

Model with reduced Scan 4 - 6 ms

Predictive model ~ 2 ms

Table 3: Synthesis results.

Number of Slices

Number of Flip Flops

Nb of 4 input LUTs

Nb of bonded IOBs

Frequency (MHz)

Basis Handoff 782 604 1381 40 132

Reduced model 705 608 1313 40 124

Predictive model

1165 995 816 41 150

IJCSES International Journal of Computer Sciences and Engineering Systems, Vol.3, No.3, July 2009

CSES International ⓒ2009 ISSN 0973-4406

9

5.2 Synthesis results

During the synthesis step, we have exploited FPGA xilinx virtex II pro environment. This environment allows implementing communication systems on programmable circuits. The advantage of using FPGAs circuits is mainly the system re-scheduling. For our application, RTL synthesis is achieved using the ISE 8.1 of the Xilinx FPGA virtex II pro environment. Synthesis results, of the three approaches, are shown in table 3. These results should be exploited in order to study their impact on the support of the technological parameters specified in IEEE 802.11. IEEE 802.11b Standard proposes a theoretical flow of 11 Mbps (5 to 7 Mbps in real case according to the environment), thus, an average of 6 Mbps. In free environment, the frequency band is the 2.4 GHz with three available channels radios. Moreover, 802.11b proposes MinChannelTime equal to 670 µs, DIFS equal to 50 µs and SIFS equal to 10 µs. Using these technological parameters and the values of frequencies obtained in table 3, our circuits reduce the handoff time for each model as outlined in table 2. As result, the average of the handoff latency is maintained between 4 and 6 ms for the reduced scan model and slightly lower than 2 ms for the predictive model. Both schemes in [14] and [15] attempt to reduce the time spent in the channel scanning phase when a handoff occurs. By changing the APs and the clients, and by increasing coordination between them, Neighbor Graphs achieves handoff latency of about 40 ms, and SyncScan handoffs take 2-3 ms. But, the technique requires periodic suspension of communication that could last more than 10 ms, depending on hardware. Table 4 shows more details allowing a simple comparison of the different handoff mechanisms cited in this paper.

Table 4: Comparison of different handoff mechanisms.

Wireless interface

Handoff latency

Infrastructure modification

Neighbor Graphs [14] 1 ~ 40 ms Yes

SyncScan [15] 1 2 – 3 ms Yes

MultiScan [16] 2 0 ms No

Reduced scan model 1 2 – 6 ms No

Predictive model 1 ~ 2 ms No

6. Conclusions

In this paper, IEEE 802.11 convectional handoff process has been implemented on FPGA circuit using the high level design technique and based on IEEE 802.11b specifications. The convectional layer-2 handoff consumes more time in the channel-scanning process. For this reason,

we have proposed two others handoff mechanisms for mobility management. Our results show that the network, using reduced scan or predictive model, may improve suitable performances for MT transitions. Several scenarios have been employed in order to evaluate handoff latencies spent for each model compared with others mechanisms for the conventional layer-2 handoff process. The handoff steps are reduced from 184 to 41 clock cycles becoming more suitable for real time applications. We adopted the high level design for the implementation of these models. In fact, we have used VHDL as high level description language, ModelSim as a simulation tool to check the behavior of each model at the RTL level and ISE 8.1 of the FPGA xilinx environment for synthesis step.

References [1] M. Gast, 802.11 Wireless Network: The Definitive Guide,

Second Edition, O’Reilly, 2005. [2] Fayza A. Nada, On using Mobile IP Protocols, Journal of

Computer Science 2 (2), 2006, pp.211-217. [3] H. Velayos and G. Karlsson, Techniques to reduce the IEEE

802.11b handoff time, IEEE ICC , 27(1), June 2004, pp.3844–3848.

[4] Arunesh Mishra, Minho Shin, William Arbaugh, An empirical analysis of the IEEE 802.11 MAC layer handoff. ACM SIGCOMM Computer Communications Review (ACM CCR), 33(2), April 2003, pp.93-102.

[5] Bob O’Hara, AI Petrick, IEEE 802.11 handbook – a designer’s companion, second ed., March 2005.

[6] IEEE Std 802.11-1997.Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications, 1997.

[7] A. Jain. Hando delay for 802.11b wireless LANs, Technical report, University of Kentucky, 2003.

[8] Y. Kim, H. Jung, H. H. Lee & K. R. Cho, MAC implementation for IEEE 802.11 wireless LAN, Router Technology, Department, Electronics & Telecommunications Research Institute, 2001.

[9] XILINX, Configurable LocalLink CRC Reference Design, Nov. 2004.

[10] T. H. Meng, Design and implementation of an all-CMOS 802.11a wireless LAN chipset, Communication magazine, IEEE, 41(8), Aug. 2003, pp.160-168.

[11] IEEE 802.11, IEEE wireless LAN medium access control (MAC) and physical layer (PHY) specifications, Aug. 1999.

[12] IEEE 802.11b, Wireless LAN medium access control (MAC) and physical layer (PHY) specifications: High-speed Physical Layer Extension in the 2.4GHz Band, IEEE Std 802.11b-1999.

[13] Shiang-Chun Liou, Yueh-Min Huang; Trajectory prediction in mobile networks. International Journal of Information Technology, vol. 11, No. 11, 2005, pp.109-122.

[14] M. Shin, A. Mishra and W.A. Arbaugh, ”Improving the Latency of 802.11 Hand-offs using Neighbor Graphs” Mobisys 2004 June, Boston, USA.

[15] I. Ramani and S. Savage,”SyncScan: Practical Fast Handoff for 802.11 Infrastructure Networks” Proceedings of the IEEE Infocom, March 2005.

IJCSES International Journal of Computer Sciences and Engineering Systems, Vol.3, No.3, July 2009

10

[16] Vladimir Brik, Arunesh Mishra, Suman Banerjee, Eliminating handoff latencies in 802.11 WLANs using Multiple Radios, Applications, Experience, and Evaluation, Internet Measurment Conference 2005: 299-304.

International Journal of Computers, Systems and Signals, Vol. 10, No.1, 2009 27

LOW POWER ASIC DESIGNS FOR FAST HANDOFF IN

IEEE802.11

Monji Zaidi, Ridha Ouni, Kholdoun Torki and Rached Tourki

Electronic and Micro-Electronic Laboratory (EµE, IT-06)

FSM, Monastir, Tunisia

CPM, 46, Avenue Felix VIALLAET 38031 GRENOBLE cedex, France

E-mail: [email protected]

ABSTRACT The Handoff process is a key problem in many wireless network processing applications. Current

implementations of this process using software implementation are time consuming and cannot

meet the gigabit bandwidth requirements. Implementing this process within the hardware

improves the search time considerably and has several other advantages like reducing power

consumption. In this paper we present an array based hardware implementation of this time consuming process for network mobility. A new mechanism for mobility management to

minimize the handoff latency in IEEE 802.11 wireless local area network is also presented.

Compared to the basis model and at 1GHz, this new mechanism allows a profit of 60% in power

consumption and 20% in silicon area. Those two designs are described in VHDL at the RTL level

language and implemented on an ASIC (Application-Specific Integrated Circuit) and are evaluated

in terms of speed, area and power consumption.

Keywords: IEEE 802.11, Handoff, MAC, design, ASIC

1. INTRODUCTION

The world of WLANs is truly an exciting area, with major activity worldwide,

challenging traditional service providers and business models. Initially, WLANs were meant to be

an augmentation, not a replacement, of wired LANs and premises telephone systems. WLANs

were deployed in enterprise or corporate locations where there might be a number of factors that

limited or prevented wired systems from being installed. Today, we see much greater utility for

WLANs, as evidenced by the emergence of thousands of hotspots around the world. In some

cases, it is cheaper to deploy wireless in an office than to replace a crumbling old token-ring cable

plant with shiny new Ethernet. In general, WLANs operate over short ranges, anywhere from 10 to

500 feet (3 to 150 m), so their coverage areas are microcells or piccocells.

Mobility is the most important feature of a WLANs system. Undoubtedly the future perspective of networking will demand to support mobile users traveling all over the world. In

addition to that, the number of portable devices that need access to the Internet is exponentially

increasing. Users on the other hand are no longer required to work in their company's home

network while they may be moving from place to place. Usually, continuous service is achieved

by supporting handover from one cell to another. Handover is the process of changing the channel

(frequency, time slot, spreading code, or combination of them) associated with the current

connection while a communication is in progress. It is often initiated either by crossing a cell

boundary or by deterioration in quality of the signal in the current channel.

In IEEE 802.11 based wireless LAN, when the Mobile Terminal (MT) changes its point

of attachment to the internet, it may produce a service interruption, since the MT cannot send or

receive any packets from the time at which it disconnects from one point of attachment to the time

ISSN 1608-5655 (Online), Category: Research articles, Publisher: IAAMSAD

28 International Journal of Computers, Systems and Signals, Vol. 10, No.1, 2009

at which it registers with a new point of attachment. Such an interruption would be unacceptable

for real time services such as voice-over IP, which demands a further optimization of the mobility

management in IEEE 802.11 based WLAN. Our motivation is to study the impact of the handoffs

for delay of the sensitive applications. Our evaluation results show that the conventional handover

is not totally effective for QoS requirements. So, we propose a hardware implementation for the

handoff process in WLAN networks, using an ASIC circuit. The paper will be organized as follows: in section 2, an overview of related works is

provided. Section 3 presents an environment with a wireless communication based on

IEEE 802.11 standard. In section 4, we describe the existing layer-2 handoff mechanism.

Section 5, highlights the hardware implementation of handoff mechanisms (basis and proposed)

for campus wide networks. Results are dealt in Section 6. Finally, section 7 is the concluding part

of the paper.

2. RELATED WORKS

The literature contains several efforts proposing a mobility modeling and management

approaches aiming at improving the handoff management and at optimizing resource reservations.

In (Choi C.H. et. al., 2002), the authors suggest the use of an adaptive bandwidth reservation based on a mobility graph and 2-tier cell structure to determine the amount of

bandwidth to be reserved in the cell. Another resource reservation approach is presented in (Islam

M.M. et. al., 2002) and (Islam M.M. et. al., 2003), where the authors propose a bandwidth

reservation scheme that uses a mobility parameter-based resource reservation estimator function

(RREF). This nonlinear function uses distance, direction, and velocity to calculate the probability

of a MT visiting a particular cell. The authors, in (Liu T. et. al., 1998), propose a predictive

mobility management scheme that models the MT, as a linear dynamic system driven by time

varying forcing functions that simulate subjective moving intentions from the user and objective

random perturbations from the environment. The mobility management model proposed in (Liang

B. and Haas, Z.J., 1999), is based on Gauss–Markov model where an MT’s velocity is correlated

in time to various degrees in order to predict the future location of a MT. In (Hou, J. and Fang Y., 2001), authors initiated the idea of taking the mobility into account for call admission control

algorithms. They explore many important points for mobility-based call admission control. They

indicate that it is important to make the reservation at the appropriate time to save the reserved

bandwidth.. In this model, the authors did not use the mobility history of the users to enhance the

estimation accuracy. In (Yu, F. and Leung, V.C.M., 2002), a mobility-based predictive algorithm

for call admission control was presented. This algorithm is motivated by a computational learning

theory, which has shown that prediction is synonymous with data compression. The main

limitation of this approach is that it is not applicable for a soft handoff, which makes this approach

unsuitable for most of the existing and future mobile telecommunication. Moreover, this approach

requires every adjacent Access Point (APs) to reserve the channels for all the users.

Based on the observation that the movement behaviors of the majority of people are

performed repetitively process, the author in (Tabbane, S., 1995), models the user inter-cell mobility as a time-dependent (location, probability) pair. This work uses the probability that the

user is found in a certain location during a given period of time as a base parameter. The (location,

probability) pair is derived from the long-time observation statistics. While providing a good

starting, enabling the regularity in a user’s daily movement, Tabbane’s model does not reflect an

instantaneous movement behavior, and the (location, probability) pair is not totally efficient in

representing the itineraries which are usually present in a user’s movement pattern. As a possible

solution to improve the call connectivity, the Current implementations of this process using

software methods are time consuming and cannot meet gigabit bandwidth requirements. A few

works have addressed the hardware implementation of the mobility in WLANs networks. The

authors in (Chiang, M.H, 2006), proposed a design flow system and function module of active

scan in WLANs. In (Zaidi, M et. al., 2008), we have proposed the hardware transformation and implementation of the handoff protocol from its initial software description. We have

implemented two models that reduce Scan phase during the handoff execution. These models have

been implemented on a FPGA circuit. Implementing this process in the hardware circuits

International Journal of Computers, Systems and Signals, Vol. 10, No.1, 2009 29

improves considerably the search time and has several other advantages like the reduction of

power consumption and the silicon area minimization.

3. HANDOFF PROCESS

The operation destined to change an association from one AP to another is known as a

handover. Original design of the IEEE 802.11 standard ( IEEE 802.11. Part 11, 1999), has just

considered the handoff signaling in the wireless part. Figure 1 shows the main elements involved

in a layer-2 handoff: the MT, the old AP, the new AP, and the distribution system (DS). It can be

observed that basic service sets (BSS1 and BSS2) must belong to the same extended service set

(ESS1). In the same way, radio channels of each cell (CHX, CHY) shall be none mutually

interfering channels. The handover procedure can be divided into three phases: discovery,

reauthentication, and reassociation ( IEEE 802.11. Part 11, 1999) and ( Mishra AS and Arbaugh

W, 2003).

Old AP New AP

CHX CHY

BSS1 BSS2

Handoff

ESS1

Distribution system

MT

Figure. 1 Involved elements in the layer 2 handover

The discovery process involves handoff initiation and scanning phases. As signal strength and signal-to-noise ratio from a station’s current AP get weaker, a MT loses connectivity and

initiates a handoff. Then the client is not able to communicate with its current AP, so the client

needs to find the other APs available. This scan function is performed at a MAC layer, and the

station can create the available AP list ordered by the received signal strength.

For the scan phase, a MT can perform scan operation either in passive or active mode. In

passive scan mode, using the information obtained from beacon frames, MT listens to each

channel of the physical medium to try and to locate an AP. In the active mode (the wireless NICs

do by default), as shown in Figure. 2, MT broadcasts additional probe packets on each channel and

receives responses from APs. Thus the MT actively probes for the APs, and the actual number of

messages varies from 3 to 11. Figure. 2 shows the sequence of messages typically observed during

a handoff process. The handoff process starts with the first probe request and ends with a reassociation response from the new AP. The probe function follows the IEEE 802.11 MAC active

scan function and the standard specifies a scanning procedure as follows.

1. Using CSMA/CA, acquire the access right to the medium.

2. Transmit a probe request containing the broadcast address as destination, SSID, and

broadcast BSSID (Basic SSID).

3. Start a Probe Timer.

4. If medium is not busy before the Probe Timer reaches MinChannelTime, scan the next

channel. Otherwise, process all received probe responses.

5. Move to next channel and repeat the above steps.

After all channels have been scanned, the informations received from probe response are

scrutinized by a MT to select a new AP. Once the STA decides to join a specific AP, authentication messages are exchanged between the STA and the selected AP, and after a

successful authentication, the STA sends a reassociation request and expects a reassociation

response back from the AP.

30 International Journal of Computers, Systems and Signals, Vol. 10, No.1, 2009

4. HANDOFF ARCHITECTURE

In this section, we describe the hardware implementation of the Handoff process. We

focus on the MAC receiver and transmitter part. Figure. 2 illustrates the system architecture. We

try to divide handoff functions to 5 parts: a controller module, a selection module, a receiver part,

a transmitter part and the SRAM with 256 words of 16 bits.

Figure. 2 Top level structure of the IEEE 802.11 Handoff

4.1. Existing layer-2 handoff mechanism We are interested in using the handoff phases, according to models which offer a

transparent transition from one AP to another within a minimum delay. The IEEE 802.11 a/b/g

series offers a Wireless connectivity to the users at high rates. An AP provides connectivity for the

mobile users.

MT Active AP Old AP

New AP

Probe request

Probe response

Probe response

Probe response

Probe request

Probe response

Probe response

Probe response

...

...

Channel 1

Channel N

Authentication request

Authentication response

Association request

Association response

Exchange

Stop accepting Traffic

Start accepting Traffic

Handoff

Lat

ency P

robe d

ela

y

Auth

enticati

on a

nd

Ass

oci

ati

on d

ela

y

Figure. 3 Active discovery example

International Journal of Computers, Systems and Signals, Vol. 10, No.1, 2009 31

The 802.11 wireless devices allow the user to move freely between APs within, the

coverage area, commonly known as the hotspot. The operation of changing from one AP to

another AP is known as Handoff.

The conventional Handoff process is divided into three phases namely (a) Scan (b)

Authentication and (c) Association (O’Hara, B. and Petrick, A.I, 2005). The Scanning phase is

the dominating factor in handoff latency, accounting for more than 90% of the overall latency (Arunesh, M. et. al., 2003). The probing process (or scanning process) finds a new available AP

with the best signal quality. Figure 3 illustrates the probing procedure as described in the IEEE

Standard 802.11. In this figure, N distinct channels are selected to probe. Once the channels to be

probed are determined, the MT switches to each selected channel.

4.2. MAC Frame Format IEEE 802.11 MAC frame contains three fields:

• A MAC header, which comprises frame control, duration, address, and sequence control

information.

• A variable length frame body, which contains information specific to the frame type.

• A frame check sequence (FCS), which contains an IEEE 32-bit cyclic redundancy code (CRC).

The frame control field is composed of:

-Protocol Version: The Protocol Version subfield is two bits in length. For 802.11 standards the

value of the protocol version is 00.

Frame Control Duration Adress1 Adress2 Adress3 Ssquence control Adress4 frame Body FCS

Protocol Type Subtype To DS From DS More frag Retry Pwr mgt More data WEP Ordervesion

b0b1 b12b11b10b8b4b5b6b7b2b3 b13 b14 b15b9

2 2 66 6 2 6 0-2312 4

2 2 4 1 1 1 1 1 1 1 1

MAC Header

Octets:

Bits:

Figure. 4 Frame control field with MAC frame format

• Type and Subtype: The Type and Subtype fields together identify the frame function.

There are three frame types: control, management and data frame. Each of the frame

types has several defined subtypes. We present, in the table 2 only the screens of control and management frame, since the data frames are not discussed in this work.

• To DS/From DS: It is described in Table 1.

Table 1: To DS/From DS combinations in data type frames

To/From DS value Meaning

To DS=0and From DS=0 A data frame moves from one STA to another STA within the same IBSS, as

well as all management and control type frames

To DS=1 and From DS=0 Data frame destined for the DS

To DS=0 and From DS=1 Data frame exiting the DS

To DS=1 and From DS=1 The wireless distribution system(WDS) frame being distributed from one AP

to another AP

32 International Journal of Computers, Systems and Signals, Vol. 10, No.1, 2009

Table 2: Valid type and subtype combination used in Handoff execution

Type value

b3b2

Type description

Subtype value

b7b6b5b4

Subtype description

00 Management 0000 Association Request

00 Management 0001 Association Response

00 Management 0010 Ressociation Request

00 Management 0011 Ressociation Response

00 Management 0100 Probe Request

00 Management 0101 Probe Response

00 Management 1000 Beacon

00 Management 1010 Disassociation

00 Management 1011 Authentication

00 Management 1100 Deautauthentication

01 Control 1011 RTS

01 Control 1100 CTS

01 Control 1101 ACK

• More Fragments: If the value is “1”, it means that there are still other fragments waiting

for transmission.

• Retry: If the value is”1”, it means that the Data frame (or Management frame) is the

retried frame.

• Power Management: A value of 1 indicates that the STA will be in a power-save mode.

A value of 0 indicates that the STA will be in the active mode.

• More Data: The More Data field is set to 1 in broadcast/multicast frames transmitted by

the AP, when additional broadcast/multicast MSDUs, or MMPDUs, remain to be

transmitted by the AP during this beacon interval.

• WEP: It is set to 1 if the Frame Body field contains information that has been processed

by the WEP algorithm.

• Order: It is set to 1 in any data type frame that contains an MSDU, or fragment thereof,

which is being transferred using the Strictly Ordered service class.

5. HANDOFF PROCESS: DESIGN AND IMPLEMENTATION

In this section, we describe the implementation of handoff process. Five MAC

components have been used in order to design the proposed circuit. Figure 5 illustrates Handoff

system architecture divided into five parts. Those are controller module, receiver part, transmitter

part, selection component and memory (256 words of 16 bits).

5.1. Building blocks specifications

5.1.1 Receiver Module The receiver module receives MPDUs from PLCP (physical layer) and decodes packages.

Table 3 lists MAC receiver part interface signals. The following notations are used to describe the

signal type: I: Input signal; O: Output signal and I/O: Bi-directional Input / Output signal

International Journal of Computers, Systems and Signals, Vol. 10, No.1, 2009 33

Table 3: Receiver part interface signals

Name Type Description

CK I:bit Operation clock.

CN I:bit Sets receiver to receive data.

Recep_valiv I:bit Input from the controller module, it gives order to receive data.

Rts_recep I:bit Notifies transmitter that receiver got (RTS) frame.

Sig_level I[15:0] Input from the physical layer, it indicates the link quality with the

corresponding AP.

In_recep I[15:0] Data from physical layer :( Probe Responses).

End_recep O:bit Notifies Controller that reception is complete.

Cts_recep O:bit Notifies that transmitter send Clear To Send (CTS) frame.

Write O:bit Output signal towards memory, it makes memory accessible in writing.

Out_recep O:[15:0] Output signal towards memory, to save all Probe response in the

memory.

Adr_recep O:[7:0] Output signal towards memory, it selects the writing address.

5.1.2 Transmitter Frame Module Transmit Frame Module is used as an interface to the physical layer that transmits frames.

In this Transmit Frame Module, the frames are stored in buffer first, and then in order to be

interfacied to Base-band module, used in physical layer. When transmission is completed,

Transmit Frame Module will issue an “End_em” signal to inform the Controller Module that the

transmission is finished. Table 4 gives more details about this component (input/ output signals).

Table 4: Transmitter part interface signals

Name Type Description

CK I:bit Operation clock.

CN I:bit Sets receiver to receive data.

Em_valiv I:bit Input from the controller module, it gives order to send data.

Cts_e I:bit The transmitter notifies that the corresponding AP is ready to receive

data.

Sig_level I[15:0] Input from the physical layer, it indicates the link quality with the

corresponding AP.

End_em I:bit Notifies Controller that the transmission is complete.

Rts_recep O:bit Notifies physical layer that the transmitter wants to send data.

Out_em O:[15:0] Data towards the physical layer :( Probe Request).

5.1.3. Control Module All the actions are controlled or arranged by the Control Module in this design. The main

function of the Control Module is to handle information or data from the physical layer and to

coordinate all the other modules that include the receiver Module, the transmitter Module,

selection component and the memory.

The probing process (or scanning process) finds a new available AP with the best signal

quality. In this process, N distinct channels are selected to probe. Once the channels to be probed

are determined, the Controller informs the transmitter to switch to the selected channel and

broadcasts a probe request frame. After transmitting a probe request, APs respond with probe

response frames to the MT and the controller must inform the receiver to accept data from the

network, and it enables the memory to save data. This procedure is repeated until each selected

channel to be probed. At the end of the probing phase, (a probe requests from APs are stored in the memory).

The controller activates the selection component to find the appropriate AP with the appropriate

SNR and the suitable channel. Once the good AP and channel are found, the controller

communicates again with the receiver and the transmitter in order to finish the authentication and

the association phases.

34 International Journal of Computers, Systems and Signals, Vol. 10, No.1, 2009

Transmitter, receiver and control module provide the interface to external memory as a

mailbox to exchange data. This memory has the capacity to store 256 words of 16 bits.

5.2. Handoff proposal: Model with reduced Scan phase Using this model, the objective consists in reducing the handoff latency. We propose to

alleviate the scan delay since it takes the major part of the handoff latency. In fact, this solution consists in transmitting the Probe requests on each scanning channels and stopping once a Probe

response indication is received with an adequate SNR. An SNR threshold level has been defined

to select an AP that provides a QoS guarantee. Figure 5 explains this approach based on reduced

scan phase.

During the Scan phase based on the basis handoff model, the MT must sweep the total

number (N) of the channels. The time allocated to scan each channel is called MaxChannelTim.

Thus, the time of Scan is given by the following equation.

�canTime Number of Channels. MaxchannelTime

Where, MaxchannelTime is the time interval separating the first Probe Request and the last Probe Response on each channel.

The scan time can be reduced when minimizing the channel number to be scanned. By

being unaware of negligible times, the idealized latency of this active Scan is given by the

following relation

ScanTime � �1 � p�c� MinchannelTime ! p�c�. MaxchannelTime"#N%& "'())*+

"#,

Where:

p(c) is the probability of one or more APs operating in the same channel (c), the Min Channel

Time and the Max Channel Time values are respectively 1 ms an 11 ms. The ideal latency should

extend from 11 ms to 110 ms. Taking the first equation account, it becomes unuseful to sweep all

the channels while the most adequate AP belongs to an already scanned channel. In other terms,

scanning the rest of the channels doesn’t serve to find a useful AP, but it loses time which causes

higher scan latency. The implementation of this model takes into account the specific threshold

once reached, the MT stops the scan process and follows the rest of the basis handoff phases.

Then, it is obviously that the reduced scan model, described in figure 5, leads to a fast

communication establishment.

{ Scan a channel i

AP (Ch i) selectionSNR i > Thershold

YesNoThe rest of basis model phases

Transmit Probe request on channel i

Receive Probe response from channel i

Next cha

nne

l

Figure.5 Handoff with a reduced Scan phase.

6. DESIGN RESULTS

6.1 Logic Synthesis The designs were synthesized based on the 130 nm CMOS technology by using the

Synopsys design_vision tool. We have written scripts that perform an automatic bottom-up

synthesis of the design. The Synthesis results of the proposed circuits are presented in Table 5.

International Journal of Computers, Systems and Signals, Vol. 10, No.1, 2009 35

These results show that these circuits can operate with 1 GHz, which makes it more suitable for

real time communications.

Table 5: Synthesis results.

Basis Handoff

Handoff with reduced

Scan: proposed

gain compared to

Basis Handoff

Estimated

area

(mm2)

Estimated power

(mW)

Estimated

area

(mm2)

Estimated

power

(mW)

Power

gain

(%)

Area

gain

(%)

500 MHz 0.114 22.8606 0.0917 18.2151 20.34 20.17

660 MHz 0.128 30.0922 0.0941 18.2972 39.20 26.56

1 GHz 0.133 46.1526 0.0986 18.3241 60.30 26.31

6.2 Clock Distribution: (Skew problem and clock times in the circuit) The quality of the clock Distribution in a circuit plays a significant role in the

performances of a synchronous circuit. The majority of numerical applications are implemented in synchronous logic, because the current tools for synthesis do not allow the automation for every

design. These tools for synthesis allow the automation for design with combinational or sequential

descriptions which rest on one or more clock. It is vital for a certain implementation that clock

must be known and fixed in all the physical circuit, and its geometrical propagation does not imply

distortion and dephasing. The solutions to guarantee a uniform clock distribution without skew

dephasing are multiple. The best solution used today to reduce the clock dephasing is based on

the concept of clock tree, it inserts on each level of hierarchy, buffer or reverser which rectifies the

clock signal skew locally. This solution has the advantage of producing a geographically

distributed and optimized consumption.

Figure. 6 Clock tree in silicon level

6.3. Layouts Complete layout designs of the chips are performed by using the Cadence tools (Encounter)

at the frequency of 1 GHz. We have used the one-block approach in order to meet the timing

requirements and to generate the clock tree efficiently. The chip of basis handoff a circuit contains

77 signal pins in total, 0.0567 mm2 for Combinational area and 0.073 mm2 for No combinational

area. While, handoff with reduced scan contains 77 signal pins in total, 0.0314 mm2 for

Combinational area and 0.0672 mm2 for No combinational area.

36 International Journal of Computers, Systems and Signals, Vol. 10, No.1, 2009

Figure.7 a: layout of the basis Handoff b: layout of the modified Handoff

The IEEE 802.11b Standard proposes a theoretical flow of 11 Mbps (5 to 7 Mbps in real

case according to the environment), thus, an average of 6 Mbps. In a free space environment, the frequency band is the 2.4 GHz with three available radio channels. Moreover, 802.11b proposes a

MinChannelTime, equal to 670 µs, DIFS equal to 50 µs and SIFS equal to 10 µs. Using these

technological parameters and the values of frequencies obtained in table 8, our circuits reduce the

handoff time for each model as outlined in table 9. As a result, the average of the handoff latency

is maintained between 0.74 and 2.22 ms for the reduced scan model. Both schemes in (Shin, M. et.

al., 2004) and (Vladimir, B. et. al., 2005) attempt to reduce the time spent in the channel scanning

phase when a handoff occurs. By changing the APs and the clients, and by increasing coordination

between them, Neighbor Graphs achieve a handoff latency of about 40 ms, and SyncScan handoffs

take 2-3 ms. But, the technique requires periodic suspension of communication that could last

more than 10 ms, depending on the given hardware. Table 6 provides more details allowing a

simple comparison of the different handoff mechanisms cited in this paper.

Table 6: Comparison of different handoff mechanisms

Wireless

interface

Handoff latency

(ms)

Infrastructure

modification

Neighbor Graphs (Shin. M et. al., 2004) 1 ~ 40 yes

SyncScan (Ramani,I. and, and Savage, S.,

(2005) 1 2 – 3 yes

MultiScan (Vladimir B, et. al., 2005) 2 0 no

Basis Handoff (hardware) 1 ~ 2.2 no

Reduced scan model (Hardware) 1 0.74 – 2.22

no

In the following scenario, an MT must sweep three channels. On each channel, three

APs are active. The Handoff latency, according to the number of APs and the channels, is then as

follows:

First, a TM performs the scan of three channels. On each channel, it expects to receive three answers from three APs. The signal level detected during the reception will be recorded.

After consulting the first channel, the TM changes its frequency and sends probe request on the

next channel to collect the parameters characterizing the access point communicating on the same

frequency (channel 2). This scenario is repeated for all channels to scan.

International Journal of Computers, Systems and Signals, Vol. 10, No.1, 2009 37

With reduced scan, the objective consists in reducing the time scan phase. So a TM stops the scan

since it detects a suitable signal with a guarantee of the QoS parameters.

Figure.8 Handoff latency vs. Channels and APs number

If the adequate signal level is received in the first channel or in the second channel; the

scan time can be reduced to 1 / 3 or 2 / 3 respectively.

7. CONCLUSION

In this paper, the IEEE 802.11 convectional handoff process has been implemented on an

ASIC circuit using the high level design technique and based on the IEEE 802.11b specifications.

The conventional layer-2 handoff consumes more time in the channel-scanning process. For this

reason, we have proposed an other handoff mechanism, using a reduced scan phase. Several

scenarios have been employed in order to evaluate the handoff latencies spent for each model

compared with others mechanisms for the conventional layer-2 handoff process. Reducing handoff

latency in WLAN becoming more suitable for real time applications. For this reason we adopt the

high level design for the implementation of these models. In fact, we have used VHDL as a high

level description language, ModelSim as a simulation tool to check the behavior of each model at

the RTL level. Synopsys and cadence tools are used for synthesis, place and route step

respectively.

Other interactions between the 802.11 MAC layer and IP protocols need further study. Since 802.11 will be the dominant technology for WLANs, a fresh look at integrating the IP stack

and the wireless MAC must be justified to design a SOC (System on Chip) of IEEE 802.11 MAC

layer.

References

Arunesh, M., Minho, S. and William, A (2003), An empirical analysis of the IEEE 802.11 MAC

layer handoff, ACM SIGCOMM Computer Communications Review (ACM CCR),

33(2), pp.93-102.

Vladimir, B., Arunesh M. and Suman B. (2005), Eliminating handoff latencies in 802.11 WLANs

using Multiple Radios, Applications, Experience, and Evaluation, Internet Measurment

Conference, 299-304.

Chiang M.H. (2006), Implementation of IEEE 802.11 MAC using FPGA: Receiver part,

Departement of Electrical Engineering Tatuang University.

38 International Journal of Computers, Systems and Signals, Vol. 10, No.1, 2009

Choi C.H., Il Kim, M. and JoKim, S. (2002),Call admission control using the moving pattern of

mobile user for mobile multimedia networks, Proceedings of the 27th Annual IEEE

Conference on Local Computer Networks, 2002.

Hou, J. and Fang, Y. (2001), Mobility-based call admission control schemes for wireless mobile

networks, Wireless Comm. Mobile Comput. 1 (3), 269–282.

IEEE 802.11. Part 11(1999), Wireless LAN medium access control (MAC) and physical layer

(PHY) specifications, IEEE Standard 802.11.

Islam, M.M., Murshed, M. and Dooley, L.S. (2002), A direction-based bandwidth reservation

scheme for call admission control, International Conference on Computers and

Information Technology’2000 , Dhaka, Bangladesh, pp. 345–349.

Islam, M.M., Murshed, M. and Dooley, L.S. (2003), New mobility based call admission control

with on-demand borrowing scheme for QoS provisioning, IEEE International Conference

on Information Technology: Coding and Computing’2003 ( ITCC’2003), Las Vegas,

Nevada, USA, pp. 263–267.

Liang, B. and Haas, Z.J. (1999), Predictive distance-based mobility management for PCS

networks, IEEE INFOCOM’99, New York.

Liu, T., Bahl, P. and Chlamtac, I. (1998), Mobility modelling, location tracking and trajectory

prediction in wireless ATM networks, IEEE J. Selected Areas Comm. 16. O’Hara, B. and Petrick A.I. (2005), IEEE 802.11 handbook – a designer’s companion, second ed,

Ramani, I. and Savage, S. (2005), SyncScan: Practical Fast Handoff for 802.11 Infrastructure

Networks, Proceedings of the IEEE Infocom.

Shin, M., Mishra, A., and Arbaugh, W.A. (2004), Improving the Latency of 802.11 Hand-offs

using Neighbor Graphs, Boston, USA.

Tabbane, S. (1995), An alternative strategy for location tracking, IEEE J. Selected Areas in Comm,

13, 880–892.

Yu, F. and V.C.M. Leung (2002), Mobility-based predictive call admission control and bandwidth

reservation in wireless cellular networks, Computer Networks, 38 (5), 577–589.

Zaidi, M., Bhar, J., Ouni, R. and Tourki, R. (2008), A new solution for micro-mobility

management in 802.11 Wireless LANs using FPGA, . SCS 2008. 2nd International

Conference on Signals, Circuits and Systems, Hammamet Tunisia.

Received: July 8th 2009

Accepted in final form: January 5th 2010 after two revisions

About the authors: Monji Zaidi received the Dipl.-Ing. in electrical engineering for automation and processes control

in 2005 from the National engineers school of Sfax and the Mastere degree in Materials,

Nanostructures, devices and micro-electronics systems from the University of Monastir, Faculty of

Sciences of Monastir (FSM), Tunisia 2007. He is currently working toward the PhD degree in

electronic and communication in the Electronic and Micro- Electronic laboratory (EµE) University of Monastir. His research interests include Management of the WLAN technologies.

Rihha Ouni received his DEA in Matériaux et Dispositif pour l'électronique and his PhD degree

in Physics (Electronics option) from the Science Faculty of Monastir, Tunisia, in 1997 and 2003,

respectively. Currently he is an assistant professor in the College of Computer and Information

Sciences (CCIS), King Saud University. His research interest is in the field of mobility

management in Wireless communication.

Kouldoun Torki received the Ph.D. degree from the INPG, Grenoble in 1990 and the DEA microelectronics from INPG in 1986. Currently he is the Technical Director of CMP and Project

Coordinator for PhD students exchange with the University of Monastir (Tunisia).

International Journal of Computers, Systems and Signals, Vol. 10, No.1, 2009 39

Rached Tourki was born in Tunis, on May 13 1948. He received the B.S. degree in Physics

(Electronics option) from Tunis University, in 1970; the M.S. and the Ph.D. in Electronics from

Orsay Electronic Institute, Paris-south University in 1971 and 1973 respectively. From 1973 to

1974 he served as Microelectronics Engineer in Thomson-CSF. He received the Doctorat d’etat in

Physics from Nice University in 1979. Since this date he has been Professor in Microelectronics

and Microprocessors with the Physics department in the Faculty des of Sciences of Monastir. His researches interests are digital signal processing and hardware–software codesign for rapid

prototyping in telecommunications.

Handover Strategies Challenges in Wireless ATM

Networks Jamila Bhar, Ridha Ouni, Kholdoun Torki, and Salem Nasri

Abstract—To support user mobility for a wireless network new

mechanisms are needed and are fundamental, such as paging, location updating, routing, and handover. Also an important key feature is mobile QoS offered by the WATM. Several ATM network protocols should be updated to implement mobility management and to maintain the already ATM QoS over wireless ATM networks. A survey of the various schemes and types of handover is provided. Handover procedure allows guarantee the terminal connection reestablishment when it moves between areas covered by different base stations. It is useful to satisfy user radio link transfer without interrupting a connection. However, failure to offer efficient solutions will result in handover important packet loss, severe delays and degradation of QoS offered to the applications.

This paper reviews the requirements, characteristics and open issues of wireless ATM, particularly with regard to handover. It introduces key aspects of WATM and mobility extensions, which are added in the fixed ATM network. We propose a flexible approach for handover management that will minimize the QoS deterioration. Functional entities of this flexible approach are discussed in order to achieve minimum impact on the connection quality when a MT crosses the BS.

Keywords—Handover, HDL synthesis, QoS, Wireless ATM.

I. INTRODUCTION HE Asynchronous Transfer Mode (ATM) is a data transport technology that supports a single high speed

infrastructure for integrated broadband communication involving voice, video and data. ATM technology combines some important features: short fixed-size packets or cells, virtual circuits, statistical multiplexing, and integrated services. All these concepts together provide a uniform framework that guarantees traffic with quality of service (QoS) [8].

Wireless ATM (WATM) is mainly considered as an extension of ATM network issue. WATM will be advantageous to support the seamless delivery of multimedia flows with high Quality of Service (QoS). WATM must in all cases allow the network to guarantee a connection continuity of MT.

To support user mobility for a wireless network additional protocols are needed and are fundamental. They mainly refer to handover protocols, routing, and location management. Thus, maintaining QoS guarantees demands to integrate mobility support functions.

This paper introduces the mobility management solutions characteristics of Wireless ATM network. It presents an extended Handover technique for terminal mobility support in

WATM networks. WATM is able to deploy different Handover types, which are intended to manage different network event scenarios. For this purpose, several specific functionalities and algorithms are proposed. In our approach, improved backward and forward hard handover protocols were been developed for switching MT active connections from one base station to another. This approach aimed at defining a solution with optimal method for applying handover in WATM environment. The emphasis was especially on deploying innovative process while maintaining Qos parameters. So, some details of the proposed idea are explained and performed by synthesis and validation phase.

The paper is organized as follows. First, we give an overview of handover protocols. The second section outlines the testing approach adopted for our architecture. Technical challenges are presented and discussed. Then, Handover buffering performances are analyzed and their requirements are explained. Finally, description of our design, synthesis and simulation phases are described and conclusions are given.

II. HANDOVER PROTOCOLS SPECIFICATIONS Handover term refer to different approaches to supporting

mobility aspects. Distinctions between different propositions can be made according to the performance characteristics, diversity steps, state transitions, and control modes of handover techniques. Generally, Handover can be defined as the process by which an active MT changes its point of attachment to the network, or when such a change is attempted. The access network may provide features to minimize the interruption to sessions in progress.

There are different types of handover classified according to different aspects involved in the handover. We can then identify handover types such as backward and forward. This distinction refers to handover steps and to the BSs through which the handover signaling information will be exchanged. In backward handover, signaling messages are exchanged via the old BS (the BS the MT has been attached to during the recent past). Handover scenario, in this case is composed of two stages: setup and handoff. In forward handover, the link with the old base station is suddenly lost. Thus, the MT is forced to seek connectivity through other, neighboring BSs.

In this paper, hard backward and forward handover will be supported by WATM. Backward handover is usually used as first solution. When the radio link is suddenly degraded, the MT will be notified by the signal level, and a forward handover procedure will be initiated to recover the connection.

T

INTERNATIONAL JOURNAL OF APPLIED MATHEMATICS AND COMPUTER SCIENCES VOL. 4 NO. 2 2007 ISSN 1305-5313

ENFORMATIKA VOL. 4 NO. 2 2007 ISSN 1305-5313 636 © 2007 WASET.ORG

In this case, the terminal interrupts the old connection and tries to connect to a new BS. In the following section, we present handover management strategy based on inband signaling.

III. HANDOVER MANAGEMENT STRATEGY

A. Proposal Architecture The handover algorithm integration, in wireless ATM,

presents several technical challenges that need to be resolved. This paper is focused on the handover decision making process which satisfies the objectives mentioned above. This process may lead to decide whether handover is necessary and whether additional adaptation needs to be applied. Objectives include satisfying the user’s devices preferability, supporting important bandwidth for their respective applications and avoiding data loss which may affect the applications.

The integrated architecture defines the following main entities: - Entity at base station: depending on a traffic situation, it can play a role of old or new BS. - Entity at switch node: it is responsible to collect traffic parameters. It manages information from different BSs. - Entity at mobile terminal: it makes final Handover decision. Terminal decides about handover type and which BS is to be selected for the handover. We use the MT because it is more scalable to make decision by itself, especially in degraded situation.

Handover entities are integrated at layer 2 when a handover appears in the same clustered area (BSs attached to the same switch). This type of handover is transparent to the routing functionalities (it requires a simply link layer reconfiguration without any mobility implications) [8].

Entities listed below are described with VHDL language. Implementing handover mechanism with VHDL description poses some specific constraints. The development of several nodes of the network (BSs, MTs) requires traffic management of simultaneous connexions. Other constraint that must be considered is to provide to mobile terminal parameter for handover decision at the right time, with most newly information about traffic conditions. For this purpose, traffic collected parameters are sent periodically to MT.

The steps for handover algorithm are detailed at the following.

B. Phases of Handover Strategy To define our architecture while maintaining optimal

resources to the mobile terminal, the following approaches are adopted: A handover approach adopts a mobile-initiated handover type. The MT makes the initial decision to initiate the handover. However, the WATM network participates to trigger handover by informing MT about traffic management parameters in order to select suitable BS candidates.

In a prediction phase, the mobile terminal monitors traffic quality and controls signal strength indicators and error probability of the channel. It is then periodically informed

with collected information using handover cell. When receiving these parameters, MT actualizes few stored parameters for handover decision algorithm. The MT initiates Handover when the signal drops below than a threshold.

If the switch is informed through old BS about a new handover procedure, it requests BSs about information relevant to the Handover Decision. Collected information will be filtered. The switch sends, to the MT, a BSs list prioritized by the signal power of each one. The Handover Decision process at MT entity is parameterized with this information. In consequence, the MT sends via the old base station to the switch, a Handover Setup Request message notifying the intention to change to the selected BS. Otherwise, communication efforts with the current BS will be wasted. The BS list increases probability for handover successful. However, it may cause additional delay.

From these steps, we can see that this process ensures that the most up-to-date information is used for handover decision.

During handover, control messages are exchanged between different components of the WATM network. They are required to handle functions as begin, confirm, and end of the connection with network nodes. They inform nodes also about handover protocols type and QoS negotiation. Handoff signaling enables wireless terminals to move seamlessly between BSs while maintaining connections with their negotiated QoS. Bad handovers signaling lead to degraded power quality. They also have a deep impact on the transport functions and band occupancy.

In our model, resource allocation is done after the switch decision. In fact, it is not necessary to reserve resources in each BS for the connection when they receive the HOR message because only one BS will be finally chosen. Switch needs to send only one Handover message to the selected BS for resources allocation. This solution reduces the message processing time of other BSs. The efficiency of the whole network will thus be improved.

IV. ANOTHER ISSUES AND CHALLENGES IN WATM

A. Signaling Strategies Handoff signaling enables wireless terminals to move

seamlessly between BSs while maintaining connections with their negotiated QoS. Bad handovers signaling lead to degraded power quality. They also have a deep impact on the transport functions and band occupancy. [1] Presents a scheme for handover provisioning in Wireless ATM networks based on in-band signaling. Signaling information is carried using fixed cell size equal to data cell. Handover signaling message integrates control channel for some signaling functions. Therefore, in proposal [8], the handover protocol is entirely based on dedicated cells that are transmitted with the data flow. The dedicated cells, termed Mobility Enhancement Signaling (MES) cells, are Resource Management (RM) cells similar to those used in the Available Bit Rate (ABR) ATM transfer capabilities. We propose to use the in-band signaling technique as explained in [1]-[8]. The goal is to efficiently collect and manage the network information. This choice has

INTERNATIONAL JOURNAL OF APPLIED MATHEMATICS AND COMPUTER SCIENCES VOL. 4 NO. 2 2007 ISSN 1305-5313

ENFORMATIKA VOL. 4 NO. 2 2007 ISSN 1305-5313 637 © 2007 WASET.ORG

significant advantages such as modification requests avoidance in WATM signaling functions. It also guarantees in-sequence cell delivery over the connection during handover procedure.

B. A Survey of Buffering Issue The main complexity of WATM arises from the functions

and protocols for handover. Thus, an important issue in WATM that needs further investigation is to maintain QoS parameters for connections during handover. As WATM has these critical characteristics, a main consequence is the need for reducing data loss. An optimal handover procedure must enable the network with a guaranteed level of QoS being protected against cell loss, cell duplication, and loss of cell sequence. An optimal design of handover should give a lossless mechanism that also has low delay and delay variation. [11] Consider that the main consideration during handover is to maintain connection quality. Ensuring the completion of handover procedure by preventing any cell loss and avoiding cell duplication or cell reordering with very low delay is of primary importance.

To ensure these conditions, Handover procedure should guarantee an in-sequence cells delivery to terminals, with desired QoS parameters. Since, the connections must be handed over new BS while QoS requirements must be satisfied. For this purpose, fixing optimal handover steps are useful (Fig. 1).

Handover type

HO measurement -Signal power threshold -Network parameters

SETUP: Check for BSs resources

MT =>New BS=>SW

Backward Handover

Forward Handover

MT =>Old BS=> SW

Handover Decision

Good traffic conditions T

Fig. 1 Handover stages

A promising approach to meet QoS requirements is based on the storage of data cells in the selected BS buffer, while the connection is being reestablished. Indeed, until the new wireless link is created, cells cannot be transmitted between the MT and the BSs. During this time, it may be necessary to transfer stored data cells from old BS to new one. The reason is that MT is disconnected from current BS and not yet connected to the selected one. The old BS sends a handover confirmation when their buffers are being emptied. Then the switch notifies BSs that the handover is in final progress step. It informs old BS to disconnect from the MT by sending the HandOver End (HOE) message. New BS is also informed to establish a new wireless link with the MT.

There are different choices with which MT should establish the new connection. Discussions about the deployment of efficient buffering mechanisms have taken place. In [5] data is sent simultaneously to MT from old and new BS. This approach minimizes buffer occupancy but it needs more resources. This approach is called Make-before-break (MBB). However, in [3] MT can wait for current BS to send all buffered cells to new one. This is a Break-before-make (BBM) approach. This is a good choice for connections without critical timing requirements. However, when there is no end buffering confirm message, data loss can appear. Thus, we think that it is important to indicate the number of cell buffered in the old BS. Else, a cell transfer in old BS to new one may be not guaranteed. Here we assume that MT can wait for current BS to send all buffered cells. Old BS transmits to the switch end buffering information allowing the new BS to start transmission so that the cell order is maintained (figure 2). Old BS informs the switch about the last quantity of the data stored in the buffer. Data are measured in multiple NRM user cells followed by a numbered RM cell. However, [7] considers that MT should establish connection with new BS before disconnecting from the old one. In this way, old BS can be asked for another handover if MT cannot establish the new radio link, thus ensuring a lossless handover. This approach minimizes also buffer occupancy but it needs more resources.

HO Begin

5

64

3

2 ‘‘

2’

2

1

Data transfert

MT

Up BS2 Down

Up BS1 Down

HO Begin

HOC (N cells in the memory)

Switch

HO End

HO End

HO End

HO Confirm

Fig. 2 Handover buffer occupancy issue

INTERNATIONAL JOURNAL OF APPLIED MATHEMATICS AND COMPUTER SCIENCES VOL. 4 NO. 2 2007 ISSN 1305-5313

ENFORMATIKA VOL. 4 NO. 2 2007 ISSN 1305-5313 638 © 2007 WASET.ORG

In a successful Handover case, MT and new BS exchange

cells via the newly established wireless link. Otherwise, the switch sends a HandOver Denied (HOD) message, and the handover procedure can be re-initiated by the Terminal. One of the disadvantages of an incremental re-establishment handover algorithm is that all nodes in a network have to support the augmented signalling protocol.

V. CONTRIBUTION OF THIS PAPER This paper proposes a handoff solution for a WATM

environment. The proposed solution has for goal to meet the challenges of wireless ATM and to reduce the number of control signals required for handoff and the volume of buffered information packets during handoff. It tries to significantly improve the radio link transmission accuracy. Performance results reported in the literature are mostly obtained via analytical models [5]. Simulative study is planned and it leads to characterize the effectiveness of the handover protocols by testing several network situations.

In this work, each of the components is designed using a hardware description language and synthesized to an FPGA. A HDL description defines details of each of the different components. Network architecture includes Switch, BSs and

MTs. The performance of the entire system is also dependent on the interactions of these components when they are being used by different traffic patterns. For this purpose, we introduce a flexible architecture that supports dynamic behavior of the system.

The objective of our methodology is to provide a rigorous design flow for high-performance processing networks. For accuracy, we have designed and implemented our components using the VHDL hardware description language. To evaluate system performances, we have synthesized our VHDL design. The synthesis tool performs a detailed timing analysis and reports a maximum clock frequency.

VI. SIMULATION AND SYNTHESIS RESULTS Our approach of handover has been transposed on a concise

description which supports different Wireless ATM simulation scenarios. The efficiency of this description for several network situations evaluates the Handover algorithm performances. Handover algorithm has been implemented in an FPGA environment based on simulation and synthesis tools. This algorithm has been integrated, in three parts, on the base station, the MT and the switch according to their specific tasks. Simulation environment contains two base stations

Fig. 3 Handoff from BS1 to BS2

Handover Ready

Handover End

Handover Start Handover End

Data cells from BS1 Data cells from BS2

Interrupted period

Fig. 4 Handoff Setup stage

BS1 informations

Data cells from BS1

Maintain connection Handover Request announcement

Request to information collect

INTERNATIONAL JOURNAL OF APPLIED MATHEMATICS AND COMPUTER SCIENCES VOL. 4 NO. 2 2007 ISSN 1305-5313

ENFORMATIKA VOL. 4 NO. 2 2007 ISSN 1305-5313 639 © 2007 WASET.ORG

(BS1, BS2), one mobile terminal (MT) and one switch (SW). This architecture is based on two channels that could be established from the switch to the MT. Our proposed handover model is extensible for multi-channel architecture based on multi-hierarchical level (MTs, BSs, SWs).

In Fig. 3 multiple Handover messages are omitted, we give here an overview of critical sequences of Handover process. Fig. 3 shows a network scenario that we consider for performance evaluation of handover procedures. It presents a BS switching through which a terminal receives data. The BS converts cell data in order to adapt ATM and WATM cell formats. Data cell transmission is initialized by Request To Send (RTS) signal. Data are transmitted over (32 bits) port accompanied with four control bits. A control bit is set to ‘1’ to indicate delimiter and special characters and ‘0’ to indicate data bits. Fig. 4 shows that for some traffic condition, handover setup algorithm can maintain the current base station as more suitable to support the requested MT connection. In this case, handover procedure is interrupted.

TABLE I

SYNTHESIS SUMMARY RESULT MT BS SW

I/O put ports 154 224 224

Number of cells 6783 16208 15350

Total area (mm2) 3.706 8.192 7.567

Fig. 5 Layout of BS entity

Table I summarizes implementation parameters for the handover contribution in each system (MT, BS and SW). It contains synthesis results obtained by synopsys tool. Implementation parameters are explained with the needed in/out put ports, the integrated equivalent cell number and the occupied area. At this design level, a powerful tool for placing and routing outlines the layout of the designed systems (Fig. 5).

Finally, results obtained from handover protocol implementation reveal that implementing mechanism is feasible, as it maintains the QoS characteristics and fails at higher data rates. Since, it is essential to evaluate the handover protocol in an environment with multiple mobile terminals. It is also important to apply routing algorithm to provide a robust handover mechanism.

VII. CONCLUSIONS AND FUTURE DIRECTIONS This paper has presented a work for designing, synthesizing

and simulating networks service. By using a hardware design flow, each component can be designed and characterized separately. By using FPGAs technology, we have presented performance results. The hardware synthesis tools provide a maximum frequency of the device, and from simulations we can determine the latency in terms of clock cycles.

This work has involved the impact of handover protocols in a wireless ATM environment. For this purpose, developed algorithms collect information to allow mobile nodes to execute handover decisions in an optimal way. These algorithms explain also a complexity of implementing handover mechanism with VHDL description language. To increase the efficiency of handovers, a survey of buffering issue is considered when MT switches from BS to another. The proposed architecture shows that necessary signalling information must be available at the right place and at the right time to reduce handover failure. In fact, intelligent handover decisions are important in mobile networks with different capabilities. Our solution ensures not only that it handles diverse, and dynamic traffic situation but also a hardware feasibility.

REFERENCES [1] Carla-Fabiana Chiasserini, Renato Lo Cigno “Handovers in Wireless

ATM Networks: In-band Signaling Protocols and Performance Analysis”, IEEE Transactions on Wireless Communications, Vol. l1, pp. 87-100, January 2002.

[2] Qing Wei et al “Context-aware handover using active network technology”; Computer Networks; November 2005.

[3] Udo R.Krieger and Michael Savoric “Performance evaluation of Handover protocols for data communication in a Wireless ATM network”, International Teletraffic Congress (ITC16), vol. 3a & 3b, pp. 1261-1270, 1999.

[4] A. Pitsillides, F. N. Pavlidou “A Survey of Wireless ATM Handover Issues”, Proceedings of the International Symposium of 3G Infrastructure and Services, Athens, Greece, pp. 34-39, 2001.

[5] J.R. et al “Radio channel emulation and multimedia communications Handover support in an experimental WATM network ”, EUNICE’99.

[6] Dimitrios D. et al “Simulation, Modeling and Analysis of Path Rerouting Algorithms for Handoff Control in Wireless ATM Networks”, Int. Conf. SCS’2002.

INTERNATIONAL JOURNAL OF APPLIED MATHEMATICS AND COMPUTER SCIENCES VOL. 4 NO. 2 2007 ISSN 1305-5313

ENFORMATIKA VOL. 4 NO. 2 2007 ISSN 1305-5313 640 © 2007 WASET.ORG

[7] Fan Jiang “Microcellular Handover in Wireless ATM”, Proceedings of the 32nd Hawaii International Conference on System Sciences, 1999.

[8] Marco Ajmone Marsan, et al “Local and Global Handovers Based on In-Band Signaling in Wireless ATM Networks”, Wireless Networks, Vol. 7, No.4, pp. 425-436, ISSN: 1022-0038, July 2001.

[9] Marco Ajmone Marsan, et al “Performance Models of Handover Protocols and Buffering Policies in Mobile Wireless ATM Networks”, IEEE Transactions on Vehicular Technology, Vol. 50, No.4, pp. 925-941, July 2001.

[10] Qing Wei, Kàroly Farkas, Christian Prehofer, Paulo Mendes, Bernhard Plattner “Context-aware handover using active network technology”; Computer Networks; 2006.

[11] Raymond R. Hoarea, Zhu Dinga, Shenchih Tunga, Rami Melhemb, Alex K. Jonesa “A framework for the design, synthesis and cycle-accurate simulation of multiprocessor networks”; J. Parallel Distrib. Comput. 65; 2005.

[12] Nasıf Ekiz, Tara Salih, Sibel Küçüköner and Kemal Fidanboylu “An Overview of Handoff Techniques in Cellular Networks”, International Journal of Information Technology, vol. 2, No. 3, ISSN 1305-239X, 2005.

Jamila Bhar received her Engineering diploma in Electric and her DEA in Communication system from the National School of Engineering of Tunis (ENIT), Tunisia in 2001 and 2002, respectively. Currently, she is a PhD student. Her research interests include protocol adaptation in heterogeneous networks, traffic management and Quality of Service for high speed networks. Her recent work has been in traffic control in WATM network. Ridha Ouni received his doctoral degree in physic (2002) from the Science Faculty of Monastir, Tunisia He is currently an assistant Professor at the Preparatory Institute of Engineering Study of Monastir (IPEIM), Tunisia. His research interests include computer networks, flow and congestion control, interoperability and performance evaluation. He is interested in many areas of hardware/software protocol verification and design for distributed systems. Salem Nasri received his Doctoral degree in automatic control and computer engineering from the National Institute of Applied Sciences of Toulouse France, in June 1985. His research interests are in the fields of computer networks, communication systems and multimedia applications. In May 2001 he obtained the diploma of “Habilitation universitaire”. Since then he has been a professor. He developed collaboration with many laboratories in France such as LSR (Grenoble), CRAN (Nancy), and some other laboratories in Tunisia. Currently he is a professor in the Computer Science Department, Qassim University in the Kingdom of Saudi Arabia.

INTERNATIONAL JOURNAL OF APPLIED MATHEMATICS AND COMPUTER SCIENCES VOL. 4 NO. 2 2007 ISSN 1305-5313

ENFORMATIKA VOL. 4 NO. 2 2007 ISSN 1305-5313 641 © 2007 WASET.ORG

Papiers publiés dans des

CONFERENCES INTERNATIONALES

1. Thamer Alanazi, Ridha Ouni, Traffic Differentiation and Scheduling for QoS support in Vehicular

Sensor Networks, IEEE International Conference on Technological Advances in Electrical, Electronics

and Computer Engineering (TAEECE), Turkey, 2013 (ISBN: 978-1-4673-5611-4).

2. Jihed Khaskhoussi, Ridha Ouni, Enhanced-MPR-CDS approach for self-organization and routing in

WSNs, 1st Taibah University International Conference on Computing and Information Technology Al-

Madinah Al-Munawwarah, Saudi Arabia, 19-21 Rabi II 1433 Hijri (12-14 March 2012)

3. Monji Zaidi, Ridha Ouni, Jamila Bhar and Rached Tourki, A novel positioning technique with low

complexity in wireless LAN: hardware implementation, Proceedings of the World Congress on

Engineering, Vol II, July 6 - 8, 2011, London, U.K (ISSN: 2078-0966).

4. Monji ZAIDI, Jamila BHAR, Ridha OUNI and Rached TOURKI. Reducing Wi-Fi handover delay using a

new positioning process, International Conference on Communications, Computing and Control

Applications (CCCA), Hammamet, pp. 1-6, 2011 (ISBN.978-1-4244-9795-9).

5. M. Z. Hourani, R. Ouni, N. Hussain, Novel Data Harvesting Scheme for Efficient Data Aggregation,

ICW2941, WORLDCOMP'11, USA. 2011. (http://world-comp.org/p2011/ICW2941.pdf)

6. Monji ZAIDI, Rached TOURKI, Ridha OUNI, New geometric Approach to Mobile Position in wireless

LAN reducing complex computations, International Conference on Design & Technology of Integrated

Systems in Nanoscale Era, pp. 1-7, 2010.

7. Jamila BHAR, Ridha OUNI, Salem NASRI, Performance evaluation of compensation-reward

mechanism for resource allocation in wireless networks, The 15th IEEE International Conference on

Electronics, Circuits, and Systems, Malta 31st August to 3rd September 2008, pp 1195-1200.

8. Jamila BHAR, Mongi ZAIDI, Ridha OUNI, Salem NASRI, Performance Evaluation of Fuzzy

Controller for Traffic Stabilization, International Conference on Signals, Circuits & Systems (SCS’08)

November 7-9, 2008, Hammamet (Tunisie).

9. Mongi ZAIDI, Jamila BHAR, Ridha OUNI, Rached TOURKI, A new solutions for micro-mobility

management in 802.11 Wireless LANs using FPGA, International Conference on Signals, Circuits &

Systems (SCS’08) November 7-9, 2008 Hammamet (Tunisie).

10. Jamila BHAR, Ridha OUNI and Salem NASRI, Interopérabilité Ethernet/WATM, International

Conference: Sciences of Electronic, Technologies of Information and Telecommunications, Tunisia,

March 15-20, 2004.

11. Jamila BHAR, Ridha OUNI, Abdelhamid HELALI, Salem NASRI, Improvements of the ABR loop

performances in a wireless ATM network, International Conference on Microelectronic, IEEE

Conference, Gammarth, Tunisia, December 2004.

Traffic Differentiation and Scheduling for QoS support in Vehicular Sensor Networks

Thamer M Alanazi College of Computer and Information Sciences

King Saud University Riyadh, KSA

[email protected]

Abstract- The IEEE 802.15.4 is widely used next-generation

standard protocol in many applications utilizing wireless sensor

networks (WSNs) especially in vehicular sensor networks (VSNs).

However, currently differentiation and scheduling mechanisms

are not provided in IEEE 802.15.4 specification to improve the

quality of service (QoS) for delay-sensitive and critical events. In

this paper, multiple scheduling algorithms such as FIFO, Priority

queue, WRR and DWRR are integrated in compliance with

IEEE 802.15.4 to improve the throughput, enhance the

bandwidth utilization rate and perform fast processing and

delivery for urgent data traffic. we divide the standard traffic

into various types of data on the basis of different QoS

requirements such as real-time fixed data packets generation on

periodic basis, real-time variable size data packets generation on

periodic basis, non real-time variable size data packets and best

effort. The mandatory QoS service flow parameters are defined

for each type of traffic according to its time-criticality and delay

sensitivity.

Keywords-Vehicular sensor networks; scheduling; Quality of service; differentiation; IEEE 802.15.4; ZigBee.

I. INTRODUCTION

Sensor networks are recently rapidly growing research area in wireless communication networks. Wireless sensors are of small size and low-cost are deployed to establish a sensor network. Adoption of IEEE 802.15.4 standard [7] for physical and medium access control (MAC) layers and ZigBee specification [8] for networking and application layers have rapidly increased applications of Wireless sensor networks (WSN s) in various areas such as industrial automation[ 1], home and building automation, automatic meter reading, embedded sensing and distributed process control systems [2, 3], machinery health monitoring [4, 5], smoke warning and radiation leakage detection systems [6].

Vehicular networks are considered as mobile sensor networks and characterized by several basic and special characteristics such as no limited energy and storage capacity, high node mobility and fast topology changes. The vehicular sensor network can sense several types of data in its surrounding area to provide wide variety of services like traffic monitoring, crowded streets identifying, speed controlling, lost vehicle locating and environmental monitoring since it covers permanently a wide geographical area [2,3,22].

ISBN: 978-1-4673-5613-8©2013 IEEE

Ridha Ouni College of Computer and Information Sciences

King Saud University Riyadh, KSA

[email protected]

For wireless sensor networks (WSNs), IEEE 802.15.4 is used as de-facto standard. However, the behavior of CSMA/CA, collision at heavy load, reduces the throughput and energy consumption performance of WSN. These problems demand MAC layer solutions to be proposed to achieve the better performance of WSN. Scheduling aids in providing quality of service (QoS) support to the prioritized and categorized communication in wireless sensor networks.

This research aims to enhance QoS in a Vehicular Sensor Networks (VSN) by integrating traffic differentiation and scheduling mechanisms in order to reduce the end-to-end delay, improve the throughput, enhance the bandwidth utilization rate and perform fast processing and delivery for urgent data traffic. We divide the standard traffic into various data types on the basis of different QoS requirements as the compulsory QoS service flow parameters are defined for each type of traffic. The type of data may categorize as real-time fixed data packets generation on periodic basis, real-time variable size data packets generation on periodic basis, non real-time variable size data packets and best effort.

The rest of this paper is structured as follows. Section 2 gives a summary of related works and Section 3 gives a brief overview of service differentiation and prioritization methodology used in our scenario. Hence research constraints used by our model and generated simulation results are provided in Section 4. Finally, concluding remarks and future work are presented in Section 5.

II. LITERATURE REVIEW

The MAC layer includes a very important processing level since it rules the sharing of the medium which affects the performance of all the upper layer protocols. MAC protocol support QoS provisioning and determining the QoS support performance by solving the medium sharing problems and reliable communication.

Diff-MAC is a QoS aware MAC protocol based on CSMA/CA access method to support hybrid prioritization and differentiated services. Diff-MAC integrates an effective service differentiation algorithm in order to increase the channel utilization and provide fair and fast data delivery. Diff-MAC is needed in WSN supporting QoS-constrained heterogeneous traffic such as multimedia applications. To

34

provide QoS, Diff-MAC consists of (1) reducing the retransmission using fragmentation of the long frames into small manageable packets and transmitting them in form of burst, (2) decreasing collisions and minimizing the packet latencies by adjusting its contention window size as per traffic requirements and (3) providing fair and reliable data delivery among sensor nodes based on intra-queue prioritization feature [19].

[5] Uses CSMA/CA as access protocol to provide service differentiation in WSN. The Collect then Send burst Scheme (CoSenS) is developed to facilitate implementation of scheduling policies and primarily to handle its weaknesses. A earliest deadline first and fixed priority are implemented on the top of CoSenS. The results present that the proposed solution enhances reliability and end-to-end delay by adapting traffic variations automatically. Authors claim that proposed solution does not affect best effort traffic while meeting deadline requirements for urgent traffic. Moreover, motes are used for testing and implementation of CoSenS.

[6] Developed a novel cross-layer integrating an asynchronous Energy Efficient and Fast Forwarding (EEFF) protocol for WSNs is resulting to energy efficiency and low latency. EEFF implements new approaches improving dynamic routing selection and low power listening which leads to reducing the latency.

[7] Proposed a service differentiation algorithm with slight modification on the protocol to enhance the achievement of slotted CSMA/CA for time-critical events. The service differentiation algorithms were particularly based on various parameters such as the macHinE, aMaxBE and the Contention Window (CW). They differently process the command and data frames since they are affected by high and low priority levels (service class), respectively. In other terms, different attributes have been defined and assigned for different service classes. This algorithm keeps slotted CSMAICA in its original form and focuses on tuning related parameters effectively in keeping the criticality of messages. Some existing works [28,29,30] are interested in controlling over CW depending on the changes in the network status. In [28], the Sensing Back off Algorithm (SBA) has been addressed to maximize channel throughput with impartial access to shared channel. When packet collision occurs, it multiplies its back off interval by a while on a successful transmission, both sending and receiving wireless sensors multiply their back off interval by 8, and the others overhearing(sensing) a successful transmission decreases their back off intervals by �. a, 8 and � are defined in [28]. However, on the basis of p-persistent CSMA/CA protocol, [29,30] addresses dynamic IEEE 802.11 wireless networks. Their approaches assume having a precise number of the active wireless sensors, to estimate the network state, while they do not consider QoS for real-time traffics.

Node-based scheduling and level based scheduling, proposed in [8], are two centralized heuristic scheduling algorithms. The first algorithm is inspired from the classical multi-hop scheduling using direct scheduling of the nodes given in an ad hoc mode. The second algorithm uses a routing tree to schedule the levels before scheduling the nodes. This algorithm is more suitable for wireless sensor networks since

ISBN: 978-1-4673-5613-8©2013 IEEE

it supports many-to-one communication model. A nodes distribution across levels affects the performance of these algorithms.

In [9], the authors proposed at the MAC level a scheduling algorithm that is able to support assorted connections with different QoS necessities. At the physical (PRY) layer, each connection utilize an adaptive modulation and coding (AMC) scheme over wireless fading channels. The scheduling algorithm assigns a certain priority level based on the QoS requirements of each connection. Then, it adjusts dynamically the priority level according to the channel and service status.

[25] Proposed a Real-Time Query Scheduling (RTQS) algorithm for conflict-free transmission scheduling in order to support real-time queries in WSNs. In this context, in conflictfree query scheduling [25] showed relatedness between prioritization and throughput. Then, it proposed nonpreemptive, preemptive and slack stealing query scheduling algorithms as novel approaches for real-time scheduling. As a result, the first algorithm achieves a better throughput by inverting priority. This problem has been solved by the second algorithm with trade-off of reduced throughput. Finally, the third algorithm combined the remuneration of preemptive and non-preemptive scheduling algorithms to improve the throughput and meet query targets.

In [26], the authors proposed scheduling algorithms that are able to guarantee better processing and delivery especially for data packets. These algorithms are namely the weightedhop scheduling algorithm with Dynamic Source Routing (DSR) and the weighted distance scheduling algorithm with Greedy Perimeter Stateless Routing (GPSR) where the scheduler lies above the MAC layer and between the routing agent. In this context, these algorithms affect the data packets with a higher weight in order to reduce the number of hops (or geographic distances) towards their destinations and optimize significantly the average delay without any additional control packet exchange. They demonstrate that the average delay reduces as the movement of nodes rises. The conventional scheduling is considered which is typically used in mobile adhoc networks.

Current WSN applications generate different types of traffic with various requirements such as delay-bounded, bandwidth and reliable data delivery. Consequently, Qualityof-Service (QoS)-based mechanisms can improve efficiently the traffic delivery in WSNs. This work introduces new differentiated service approaches and tasks accomplished by scheduling disciplines and highlighting the impact of these techniques on the QoS support in mobile sensor networks.

III. SERVICE DIFFERENTIATION AND PRIORITIZATION

METHODOLOGY

Different types of traffic with various requirements such as delay-bounded, bandwidth and reliable data delivery are generated. Consequently, Quality-of-Service (QoS)-based mechanisms can decrease end-to-end delay and improve efficiently the traffic delivery in a wireless sensor networks. We used differentiated service approach with scheduling mechanism to improve the overall network throughput.

35

A. Problem formulation

A specific problem that arises as a result of the collected traffic diversity is how to differentiate and process the diversified traffic in a suitable way to their requirements. The traffic diversity is caused by multidisciplinary supported applications. It is controlled at the roadside unit (or base station) acting as routers and coordinators. Traffic diversity poses challenges that need to be resolved by integrating new mechanisms to (a) classify packets according to their types of service and (b) schedule them appropriately to their requirements.

Grade of service is one of crucial parts of QoS in mobile communications which involves outage probability and blocking probability and scheduling starvation. Various mechanisms such as mobility management, fair scheduling, radio resource management, channel-dependent scheduling etc are affected to measure the above said performance measures.

B. Possible Solutions

[t includes the use of message relay boxes for collection, classification and scheduling messages and specific roadside gateways for proper data propagation. Moreover, maintaining Quality-of-Service (QoS) in VSNs is challenging while nodes are mobile.

IEEE 802.15.4 defmes unslotted CSMAICA channel access protocol which enables contending wireless sensors to access the shared channel without providing service differentiation at the MAC layer. This lack of providing service differentiation has hindered the development of service differentiation model for rate-sensitive applications.

[n this paper, a suitable scheduling scheme among various scheduler schemes is selected at MAC layer for assorted connections with varied QoS requirements. Therefore, a priority or weighted function is requested for every lim<established in the system and depending on wireless channel quality, service priority across layers and QoS satisfaction every connection is updated dynamically. The proposed scheduling model is flexible, scalable, easily implementable, guarantees QoS and utilizes the wireless bandwidth efficiently.

MAC layer controls medium sharing and all upper layer protocols related to that for QoS provisioning. QoS cannot be achieved at network, transport or higher layers without support of MAC protocol.

The aim of this research consists of supporting Quality of Service (QoS) in a vehicular sensor environment by integrating traffic differentiation and scheduling mechanisms. To address QoS provisioning, the research uses the model of Service Differentiation. Service differentiation has two stages: (i) assigning priority, and (ii) differentiation between priority levels. The QoS is ensured using Queue Scheduling. A better performance is achieved by assigning appropriate priority to the traffic since higher priority is always served first.

C. Differentiation in VSN

The first step for supporting Quality-of-Service (QoS) in VSNs consists of including differentiation mechanism in the

ISBN: 978-1-4673-5613-8©2013 IEEE

MAC layer, since several types of events with different significance and severity may happen in the roads. Moreover, other non-related road traffic is to be supported by the sensor network such as pollution control, urban application etc. The differentiation mechanism will not retransmit packets as they arrive but it consists of:

• Collecting and classifying data from cars and other neighbor platforms,

• Marking and storing data in different queues characterized with different priority levels.

D. Scheduling in VSN

The scheduling in VSN is achieved and tested using the queuing methods such as F[FO, priority queue, WRR, DWRR. Our proposed solution is evaluated by multiple scenarios using OPNET simulation tool. The simulation results show the proposed system improves the QoS when compared with standard system.

The proposed system can achieve fast categorization of incoming traffic at RSU from the vehicles and treat them according to their prioritization assigned for each traffic type. The extensive simulation results further justify the usefulness of proposed system to get better QoS in VSN.

IV. SERVICE DIFFERENTIATION AND PRIORITIZATION

METHODOLOGY

A low-cost and energy efficient IEEE 802. [5.4 radio technology is used in nodes. These nodes communicate with road side units positioned over small distances along road side. In our simulation, we have tested FIFO, priority queue, WRR, DWRR scheduling algorithms to determine how quality of service can be enhanced.

A. Research Constraints

The research has been simulated using OPNET on 6 lanes with 8 Coordinators and 16 Routers comprising of [0 km road length. For simplicity, straight roads are considered and turns, comers and exits are omitted in our proposed high-way model. Each vehicle in the system is assumed to be equipped with a vehicle sensor system to send vehicle's information request to the RSU. The traffic has been classified into 5 Data Types such as Audio, Video, SMS, Email and Internet. For thorough testing the proposed scheme has been applied on packets of different sizes such as 500, 1024, [500, 2500 as shown in Table. 1.

We assume that vehicles running on the road with constant driving behaviors, such as lane change, acceleration, and overtaking, deceleration. Vehicles are moving in constant speed and moving in their lane. After the distance d 1 ,d2,d3 is reached, the vehicle may wait for constant time period for signals on the road. Multiple scenarios are simulated concurrently and compared.

The comparison includes the following statistics: end-toend delay, media access delay, load and throughput. In this scenario, DWRR, WRR, priority queue and F[FO scheduling mechanisms are considered. the number and type of ZigBee nodes in all scheduling mechanisms are same.

36

TABLE I. ZIG BEE PARAMETERS

Parameters Values Transmit Power 0.05 Transmit band 2.4 GHz Max. routers 16 Max. coordinators 8 Packet Reception-Power Threshold -85 Packet Size 512,1024,1500,2500 Channel Sensing duration 0.1

we define six trajectories where mobile nodes will travel as shown in Fig. 1. if mobile node is out of its parent transmission range, then it connects to the closer node and it continues with transmission. The network structure of simulated scenario using OPNET Modeler is shown in Fig. 2.

B. End-la-end delay

End-to-end delay is used to measure network delay faced by every packet. it is measured as time interval from message transmission to the message complete delivery at receiving end. Fig. 3 shows the end-to-end delay result of the simulated scenario using differentiation and simulated mechanisms. The DWRR and WRR mechanisms have less end-to-end delay as compared to FIFO in this simulation.

x Pos[m] Y Pos (m] Disl.m:e[m] AUude[m) Tr�yefSe Time 5,,,,",, W�hne AccoxnTime Pf:ch(deQleesj Y�I'I [de�eesl R04[degees] S",od

1 0= 0= "', ,,;, ,,;, 00.00. Aul:oc�e<J ALtClCOOlPlied Urnpeclied

2 0= 81027294 81.027293 0[((0)) 29.17, 0.213674 10_00. 39,17>: AutocOffJlllNJ ALtOCUflP'.J� Umpedied

3 {I268302 206.056165 125,02'3133 0[((0)) 45.01, 6.213782 10.00. lm34.16. AutocOl'l'f'l'l:e<J ALtocornp<J.ed Un,pedied

4 0.5366(5 3)J.011827 6.21428S 2m28.00s Autoeornp<J.ed Auloeomp<.led Umpeclied

5 0 26S3J2 457.45541S 6.2136&4 moos Autocomp<.led ALtocomp<.i.ed Unspeclied

6 Ooo:roJ 581S476ffi mOO,; 4m19.SO, Aulocomp<.led ALtClCOOlPlied Um�lied

.<J5366057Cl6,439'353 124.493530 0[((0)) 10.00s 3n14.32s Autocomp<.led ALtocunp<J..d Umpedied

·'.07320':1631.737126 125�392 0[((0)) 45'" 6.213356 10_00; 6m0943. Autoeornp<J.ed A<J:ocornp<.ted Un,peclied

8 1.341511 869.23'3448 13.52: 6m32.95s Autoeomp<.led Aulocomp<.led Umpeclied

Fig. I. Trajectory Information

Fig. 2. OPNET simulation

ISBN: 978-1-4673-5613-8©2013 IEEE

'""

I!>��� :e�,'

��� cP,,:,"

aCtlject: ROller 1111 01 Oll'1ce No!!!wort (Do!!s1in8tion-Ottice Network,ROller lb)

Z9bo!!eMAC_Ekl�;:_�Oller _DMlR_DES_l

.ObjedROllerl11101011;:eNetWOfk

(Do!!s1in8tion. Office NetworkRolioer 1b)

ZigbeeMAC_Ekl�;: _�Olier -""'R_DES_1

IJObjectRolier2111010fficeNetwork (Do!!s1in8tion_Office Netwr:.-k mobiIe_nod'!U98)

ZigbeeMAC-Ekl�;:_ �O\Aer _FFO-DES-l

ri>�� 0".'9' t!>{� ",.�' ri>��� o".'f �{,� o".¥ �-$� <1'.,¥ /;�� 0".'" Fig. 3. End-to-end delay

• Zi<,1::>eeMAC-SIIIsic_MRoo.ter _w.RR-DES-l

• ZigI:oo!!etAAC_Slllsic_MRoo.toer fFO.DES-l

IJ Zigbee�AC_SIII�ic_MRoo.ter _1-Ff_DES_l

Cl ZigbeeMAC-SIIIsic_MRoo.ter Y""R-DES-l

�ver"'ft (in ZigBee 802_15_ 4 �AC.Dellly (�ec))

-=-

§Y� 1/

/1/ /1/ r

r1

�{� <£'9' t!>�� <P..�.' t!>�"-.t <£1' �{,� �¥ �-$� <P..¥ �1,� <£'J' Fig. 4. Delay

�{� �.y ri>{� <1'.,'t' ri>��� o"."}

�{� cP,.;o. t!>{'.t' <P.."" t!>f.� <P.."}'

Delay is measured when packets of data take more time than expected to reach destination. Fig. 4 shows the measurement for overall global delay for FIFO, HPF, WRR and DWRR scheduling schemes. Multiple factors contribute to delay such as network congestion and packet processing at each link till the final destination arrives. Their effects can be minimized by selecting a proper scheduling scheme. It is observed that DWRR and WRR have a maximum value approximately similar maximum values. whereas delay is minimum in case of FIFO scheduling scheme.

��� cfi.,"

• ZigbeeMll.C-Btlsic_MRolAer _O/IIRR-DES-l

• Z�C-BIIIsic_MRolAer fFO-DES-l

Cl ZigI::>o!!o!!MAC-BIIIsic _MRolAer _H>f _DES_1

Cl Z�MAC_BIIIsic_MRolAer _\'oRR_DES_l

�verllge (in ZigElee 002 15 4 �AC,r.4ediIII Access DeI�)' (sec))

/ --//..----

/// !/I

/I

�'$� <1'.,>'- �'$� o".� ri>�� cfi."t Fig. 5.

�'$� o".'f �-$� o".¥ ri>{� o".'t Media access delay

�-$� �� �{� 0".'J' ri>�;" o"."}

To analyze the performance of various sceduling algorithms in providing QoS to users of vehicular sensor network, Medium Access Delay is considered as an important factor. During the evaluation of FIFO, HPF, WRR and DWRR. Various scenarios, with same Physical and MAC

37

parameters, each implementing the different sceduling scheme, were created. The results showed that the performance of WRR and DWRR is better in providing QoS for various types of traffic services as compared to FIFO and HPF, because of their ability to differentiate and prioritize various services.

C. Data Traffic Received

Data traffic received can be expressed as "number of bits of the data received per unit time". Fig. 6 depicts the data traffic received for the FIFO, HPF, WRR and DWRR scheduling methodologies respectively in vehicular sensor network. It noticeably point out that the data traffic received is maximum in case of WRR scheduling scheme because each packet flow or connection has its own packet queue in a network interface card. WRR serves a amount of packets for every nonempty queue.

• Z9beeMAC-8amc_�oo.ter _CWRR-DES-l • ZgbeeMAC-8asio:U,F:oo.ter ]FO-DES-l C ZigbeeMAC-B�sic_ �oo.ter _I-FF -OES-1 o ligbeek4AC_B�"ic_�ooier _"""'.OES_1

2.0c0.(X)J,-_____ -"""·,." .. '"-"(O"'"" ... �,..'80�2-"'''- '''' MA"''' C"'''',...,.T''''''!II ffic'''R''"'''''"'"("'.,, '''�..,))'-------,

1

"BOO,COOj-------------==-

======�_1 1 "600'coo�=:::;;::;�.......--::�������1 1 .400,COOi- / / � --',ooo,cooj---/P;--h.;.-:;---.-;;:....--=----------------li

',oo),COOj--/l/-/#��---------------11

:::t===�f/��====================================�: ,OO,COO-l----,/I--------------------li

OOO,COO-l-r-;;;l}---------------------li

o�L-

_-

__ -_-_--_-_--_-_-� 1 ��� �" .,.{� �'" .,.{� dC/i .s;f�� '%'t

Fig, 6,

.,.-$� ,%'l' .,.{� dC/' .,.�1> '%� .,.'$1> �;' .,.{� d'.,� Data Traffic Received

Also it is noted that data traffic received is minimum in case of DWRR scheduling scheme as packets are held back those exceed from the packet length for the next round of scheduler. Those packets exceeds from packet length can be calculated by subtracting maximum packet size number from packet length. Although DWRR scheduling scheme can handle variable packet size without knowledge of their mean size.

D. Data Traffic Sent

Data traffic sent is expressed as the total number of bits sent from source to destination per unit time. Data traffic sent includes all data bits irrespective of the condition whether these bits reach the destination or not. Fig. 7 indicates the data traffic sent for FIFO, HPF, WRR and DWRR scheduling schemes.

It is noticed that data sent is maximum in case of DWRR scheduling scheme as packets are held back those exceed from the packet length for the next round of scheduler. Those packets exceeds from packet length can be calculated by subtracting maximum packet size number from packet length. Also DWRR scheduling scheme can handle variable packet size without knowledge of their mean size. It achieves a better generalized processor sharing (GPS) approximation without prior knowledge of mean packet size of each connection.

Also it has been noticed that data traffic sent is minimum in FIFO scheduling scheme as it organizes data relative to time and does not perform manipulation of data on the basis of

ISBN: 978-1-4673-5613-8©2013 IEEE

prioritization. Moreover, it processes queue by ordering data in first come first serve behavior, where each packet leaves the queue in order they come.

• Zi�C_�sic_�o"'er_�_DES_l • Zi�C-&lsic_�o"'erJFO-DES_l o ZigbeeMAC-&lsic_�o"'er _fff_DES.l o ZigbeeMAC-&lsic_�olier _WRR.OES_l

Fig, 7, Data Tramc Sent

E. Throughput

Throughput is the actual amount of data transmitted correctly starting from the source to the destination within a given time (seconds). The importance of analyzing this QoS parameter is because the increased numbers of users of the wireless medium is the reason for increased possibility of interference. Throughput is quantified with various factors including packet collisions, barrier between nodes and the differentiation and scheduling mechanism used. During the simulation throughput as a global statistics has been measured so any object could contribute to its value. It gives a general idea of the overall throughput of the system. Figure 10 shows that the maximum throughput is achieved using DWRR scheduling mechanism, the WRR has second highest throughput and the priority queue has third highest throughput while FIFO scheduling mechanism has the lowest throughput. The reason for this is because DWRR scheduling mechanism is communicating more efficiently as compared to other mechanisms. Also in DWRR mechanism distributed total load of the network among the ZigBee Routers as a result of which collisions and packet drops are decreased.

• ZigbeeMAC-Basic_"",,oiJ:er _D'WRR-DES-l • Zio,j:leeMAC.BMicJ,f'Olier JFO-DES-l DZio.JoeeMAC_B,,�ic-'.lRo<ief_I-ff_DES_1 o Zio'#leeMAC-B"�ic_J¥lRQlJef _fflR-DES-l

;oo,ooo,-______ =···='.,,=(O=''''"=. OO�'-'�;-= ... ='=T�"''=''''=('''='' '=�C»� _____ _____,I 450,oooj-----------------------l1

<OO 'OO)t::::=:;/

��� /"--:::::� �������:-::-:�JI 350,000

/ _____ :: ff' ----"",oooj---Itf/'7'/,y::::c--------------------j1

'",,000 --I//iY�y'--------------------__I1 ,OO,OOOj--IIfI!J'f/'----------------------l1

",,00) --JI'I------------------11 o ���---- _--_--_----__ --_----_--__ --�

.,.�1> .,.'$1> .,.'$1> .,.�1> .,.'$1> �)" �� �� r:%"t '45>' Fig, 8, Throughput

v. CONCLUSION

This work introduces new differentiated service approaches and tasks accomplished by scheduling disciplines and highlights the impact of these techniques on the QoS support in mobile sensor networks. we compared the use of

38

different quality control algorithms for prioritizing and scheduling of traffic received from vehicles in ZigBee environment. On the basis of our measurements and results, we presented that DWRR and WRR have increased QoS by decreasing the collision, packet drop rate and delay. This research can be further extended by implementing existing modern priority and scheduling mechanism or by presenting innovative new algorithm for particular scenario of vehicular sensor networks.

VI. ACKNOWLEDGEMENT.

This work is supported by the research center of the college of Computer and Information Sciences, King Saud University, under the project number RC130396.

References [I] U. Lee and M. Gerla, "Survey of urban vehicular sensing platforms",

Computer Networks, vol. 54, no.4, 2010, pp.527-544.

[2] K.C. Rahman, "A Survey on Sensor Network", Journal of Convergence Information Technology (JCIT), vol.Ol, Issue 01, 2010, pp.76-87.

[3] 1. Yick, B. Mukhe�jee, and D. Ghosal, "Wireless Sensor Network Survey", Computer Networks: The International Journal of Computer and Telecommunications Networking, vol. 52, no. 12, 2008, pp. 2292-2330.

[4]

[5]

I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "A Survey on Sensor Networks", IEEE Communications Magazine, vol. 40, no. 8,2002,pp. 104-112.

B. Nefzi, Y.Q. Song, "QoS for wireless sensor networks: Enabling service differentiation at the MAC sub-layer using CoSenS", Ad Hoc Networks, vol. 10, no. 4, 2012, pp.680-695.

[6] T. Zhang, L. Chen, D. Chen, and L. Xie, "EEFF: A Cross-Layer Designed Energy Efficient Fast Forwarding Protocol for Wireless Sensor Networks", In the proceedings of IEEE Wireless Communications and Networking Conference (WCNC), pp. 1-6,2009.

[7] A. Koubaa, M. Alves, B. efzi, and Y.Q. Song, "Improving the IEEE 802.15.4 Slotted CSMAICA MAC for Time-Critical Events in Wireless Sensor Networks", Workshop on Real Time Networks (RTN), vol. 6, 2006.

[8] S.C. Ergen and P. Varaiya, "TDMA scheduling algorithms for wireless sensor networks", Wireless Networks, vol. 16, no. 4, 2010, pp.985-997.

[9] Q. Liu, X. Wang, and G.B. Giannakis, "A Cross-Layer Scheduling Algorithm With QoS Support in Wireless Networks", IEEE transaction on vehicular technology, vo1.55, no.3, pp.839-847, 2006.

[10] P. Papageorgiou, "Literature Survey on Wireless Sensor Networks", ACM SIGOPS Operating Systems Review, pp.6, 1999.

[11]

[12]

L. Song and D. Hatzinakos, "A Cross-Layer Architecture of Wireless Sensor Networks for Target Tracking", IEEE/ACM transaction on networking, voI.15, no.l, pp.145-158, 2007.

1. Demirkol, C. Ersoy, and F. Alagoz, "MAC Protocols for Wireless Sensor Networks: A Survey", IEEE Communications Magazine, vo1.44, no.4, pp.115-121, 2006.

[13] K. Kredo II and P. Mohapatra, "Medium Access Control in Wireless Sensor Networks", Computer Networks, vol. 51, no.4, pp.961-994, 2007.

[14] W. Ye and 1. Heidemann, "Medium Access Control in Wireless Sensor Networks", Wireless sensor networks, pp.73-91, 2004.

[15]

[16]

P. Buonadonna, D. Gay, 1.M. Hellerstein, W. Hong, and S. Madden, "TASK: Sensor Network in a Box", In Proceedings of the 2nd IEEE European Workshop on Wireless Sensor Networks and Applications (EWSN), pp.133-144, 2005.

S. Madden, M.J. Franklin, J.M. Hellerstein, and W. Hong, 'The Design of an acquisitional Query Processor for Sensor Networks", In Proceedings of International conference on Management of data ACM SIGMOD, pp.491-502, 2003.

ISBN: 978-1-4673-5613-8©2013 IEEE

[17]

[18]

[19]

[20]

W. Ye, J. Heidemann, and D. Estrin, "An Energy-Efficient MAC Protocol for Wireless Sensor Networks", In Proceedings of the IEEE Computer and Communications Societies INFOCOM, voI.3, pp. 1567-1576,2002.

LAN MAN Standards Committee of the IEEE Computer Society, "Wireless LAN medium access control (MAC) and physical layer (PHY) specification", IEEE, NY, USA, IEEE Std 802.11,1999.

M.A.Yigitel, 0.0. Incel, and C. Ersoy, "QoS-aware MAC protocols for wireless sensor networks: A survey", Computer Networks,voI.55, no.8, pp.1982-2004,2011.

1. Chen, M. Dlaz, L. L1opis, B. Rubio, and 1.M. Troya, "A survey on quality of service support in wireless sensor and actor networks: Requirements and challenges in the context of critical infrastructure protection", Journal of Network and Computer Applications, vol. 34, no. 4, pp. 1225-1239,2011.

[21] D. Chen and P.K. Varshney, "QoS Support in Wireless Sensor Networks: A Survey", International Conference on Wireless Networks, pp.227-233,2004.

[22] K. Lin, "Research on adaptive target tracking in vehicle sensor networks", Journal of Network and Computer Applications, 2012.

[23] B. Nefzi and Y.Q. Song, "QoS for wireless sensor networks: Enabling service differentiation at the MAC sub-layer using CoSenS", Ad Hoc Networks, vol. I 0, no.4, pp.680-695, 2012.

[24]

[25]

[26]

[27]

[28]

[29]

C. Annadurai, "Review of Packet Scheduling Algorithms in Mobile Ad Hoc Networks", International Journal of Computer Applications, vol. 15, no. I , pp.0975-8887, 20 II.

O. Chipara, C. Lu, and G.C. Roman, "Real-Time Query Scheduling for Wireless Sensor Networks", 28th IEEE International Real-Time Systems Symposium (RTSS), pp.389-399, 2007.

B.G. Chun and M. Baker, "Evaluation of Packet Scheduling Algorithms in Mobile Ad Hoc Networks", ACM SIGMOBILE Mobile Computing and communications Review, vol. 6, no. 3, pp. 36-49, 2002.

M.A. Yigitel, 0.0. Ince!, and C. Ersoy, "Design and implementation of a QoS-aware MAC protocol for Wireless Multimedia Sensor Networks", Computer Communications, vol.34, no.16, pp.1991-2001, 2011.

Z.J. Haas and J. Deng, "On Optimizing the Backoff Interval for Random Access Schemes", IEEE IEEE Transactions on Communications, vol. 51, no.12, pp. 2081-2090, 2003.

F. Cali, M. Conti, and E. Gregori, "IEEE 802.11 Protocol: Design and Performance Evaluation of an Adaptive Backoff Mechanism", IEEE Journal on Selected Areas in Communications, vol. 18, no.9, pp. 1774-1786,2000.

[30] F. Cali, M. Conti, E. Gregori, "Performance Modeling of an Enhanced IEEE 802.11 Protocol", In Proceedings of IFIP ATM, vo1.99, 1999.

39

Enhanced-MPR-CDS approach for self-organization and routing in

WSNs

Jihed KHASKHOUSSI 1 , Ridha OUNI

2

1 EE, Faculty of Sciences of Monastir, Tunisia

[email protected]

2 College of Computer and Information Sciences, King Saud University, KSA.

[email protected]

Abstract

Wireless sensor networks are poised to become

a very significant enabling technology in many

sectors. Already a few very low power wireless

sensor platforms have entered the marketplace.

Almost all of these platforms are designed to run on

batteries that have a very limited lifetime. Recent

advances in wireless sensor networks have led to

many new protocols specifically designed for sensor

networks where energy awareness is an essential

consideration. Most of the attention, however, has

been given to the self-organization and routing

protocols since they might differ depending on the

application and network architecture.

This work evaluates performances of two self

organization protocols: MPR and MPR-CDS in the

goal to propose new rules reducing the dominants

and relay sets. This optimization is based on the

probability of being covered by many of neighbor's

dominants. Those sets operate together to route data

from sender to receiver. We use a multi-hop routing

to reduce energy consumption and retransmission

rate.

Key words: WSN, Self-Organization, MPR, MPR-CDS.

1. Introduction

A wireless sensor network (WSN) is an

interconnected set of sensor nodes that monitor and

collect information about the environment and

transmit the collected data generally to sink node

which saves, analyzes and interprets data. Each

individual sensor node in the network consists of one

or more sensors, a radio transceiver, a

microprocessor and a small battery. During the last

decade, it has drawn extensive attention due to the

wide range of promising applications, such as

environmental monitoring, industrial sensing and

diagnostics, battlefield surveillance, target tracking,

search and rescue, and disaster relief [1, 2].

The lifetime of a network is a crucial feature in WSN

applications. Another main feature is reducing the

size of the routing table in each node. Most of the

techniques proposed, for extending the sensor

network lifetime and reducing the routing table size,

are based on hierarchical architectures or clustering

techniques [1].

The self-organization protocols are energy-

efficiently improved. They aim to select a limited set

to act as routers (active nodes) allowed message

retransmission. They avoid the blind flooding which

generates a lot of collisions that could possibly

prevent the broadcasting from being correctly

performed beside the significant energy consumption

by redundant messages. Many schemes of self

organization protocol have been proposed to replace

blind flooding, and they are classified in different

categories: simple flooding, probability based, area

based and neighbor knowledge methods.

In the present work, we are interested on the

neighbor knowledge based protocol. We aim to

optimize the Multipoint Relay-Connected Dominate

Set (MPR-CDS) scheme and propose a self enhanced

routing approach.

The paper is organized as follows. In section 2, we

present an overview of the main WSN concepts. We

also introduce and analyze the MPR-CDS self-

organization protocol. While, in section 3, we

develop and evaluate our optimized approach. Next,

section 4 describes the routing approach using an

intermediate field. Finally, section 5 provides some

remarks and concludes the paper.

2. Wireless Sensor Networks (WSN)

Primitive network is based on blind flooding

(Fig.1). The packet is retransmitted by all the

intermediate nodes in order to broadcast it in the

network. It is simple, easy to implement, and gives a

high probability that each node, which is not isolated

from the network, will receive the broadcasted

message. However, it consumes a large amount of

© ICCIT 2012 875

bandwidth due to many unuseful redundant

retransmissions.

Source node.

Transmitted packet.

Fig.1. Flooding in WSN.

Many techniques are described in the literature to

reduce traffic flooding in WSNs. But, each technique

is developed for a target application and

characterized by its own advantages and

disadvantages. Here, we will discuss the “multipoint

relaying” mechanisms (MPR and MPR-CDS) as

possible solutions. These mechanisms are based on

neighbor knowledge.

The neighbor knowledge process uses HELLO

message defined by Mobile ad hoc Network

(MANET) [6] . These messages are broadcasted to

all neighbors at regular intervals. They contain

information about the neighbors and the link state.

Each input has an associated timeout, a guard time

and the type of link: asymmetric, symmetric or MPR.

After two rounds of beacons HELLO messages, the

entire network nodes have the lists of their 1-hop and

2-hop neighbors needed to calculate the MPR nodes.

The HELLO process is described in Fig.2.

Fig.2. HELLO message process.

2.1. Multi Point Relay (MPR) Protocol Multipoint relay was presented as a technique to

reduce the number of redundant re-transmission in

the wireless sensors networks by electing a special

node set to cover the network based on 2-hop

neighbors’ knowledge. Several rules and algorithms

are proposed for this calculation. In this paper we

resort to the greedy [3] MPR set computation

described in the algorithm below.

MPR Algorithm [5]

1. Start with an empty multipoint relays set.

2. Add nodes which are the only neighbor of

some nodes in the 2-hop neighbors.

3. If there still exists some two-hop nodes

which are not yet covered, computes the

one-hop nodes degrees and chooses the

maximum one.

4. Repeat step 3 until all two-hop

neighborhoods are covered.

Fig.3 shows an example of a diffused message in the

network using the multipoint relays where only

9 transmissions are needed to reach all nodes.

Source node Dominant node

transmitted packet.

Fig.3. Deploying MPR protocol in WSN.

2.2. Multi Point Relay–Connected

Dominating Set (MPR-CDS) Adjih and al. proposed a novel extension of the MPR

to construct a small CDS source independent using

two simples rules based on the node ID and the

greedy algorithm [4].

In the present work, node is selected into the

dominating set of the network if:

1. It has the largest degree than all its

neighbors’.

A 1

B 3

C 2

Hello (Empty) Hello (Empty)

Hello (A, C) Hello (A, C)

1-hop: A,C

2-hop: Ø

1-hop: B

2-hop: A

1-hop: B

2-hop: C

876

2. It is a multipoint relay selected by a

neighbor with the largest degree.

The multipoint relays are selected using the greedy

algorithm. Nodes with highest degrees calculate their

relays and call them to join the CDS at the third

round of HELLO messages. Fig.4 shows the MPR-

CDS application for a wireless sensor network

composed by 18 nodes where 8 transmissions are

required to cover the network.

Source node Dominant node

Transmitted packet

Fig.4. WSN deploying MPR-CDS protocol.

2.3. Protocol analysis

Dominated nodes or passive nodes listen, receive and

analyze packets until they were invited to react.

While, dominants or active nodes listen, analyze and

diffuse messages.

In both modes (active and passive), devices consume

the significant amount of energy on the radio

amplifier units. Table 1 provides a comparison of the

numbers of active and passive nodes, between

flooding, MPR and MPR-CDS protocols for the

same topology.

Table 1. Number of active and passive nodes.

Protocol Active nodes Passive nodes

Flooding 17 1

MPR 9 9

MPR-CDS 8 10

Table 2 outlined that transmission rate for MPR-CDS

is better than MPR. The MPR-CDS reduce the

number of transmitted packet to 53 % and the

received packet to 25 %. To this end, we focus on the

optimization of the MPR-CDS.

Table 2: Received and transmitted messages per cycle.

Trans. packets Received

packets

Flooding 17 49

MPR 9 39

MPR-DS 8 37

3. Enhanced MPR-CDS (Enh-MPR-CDS)

model

Energy consumption in sensor networks is

proportional to transmitted and received packets

numbers. Some active nodes cause a redundancy i.e.

a message will be received several times without

being transmitted.

We aim to minimize redundancy by reducing the

number of relays involved in the dissemination

process. The challenge is how to choose nodes that

does not affect network connectivity.

Idea:

Relays surrounded by a large number of relays may

be a source of redundancy.

In the rest of this section, we focus to determine

conditions allowing the drop of active nodes from

the set based on neighborhood knowledge by

switching them from dominant to be dominated.

3.1. Simulation

To simulate network behavior, a simulator was

developed in MATLAB because we will not simulate

network parameters such as delay or throughput

which need a specific network simulator. Our

simulator generates a random topology in a

rectangular area with 40 nodes.

Global graph connectivity is checked by a simulation

of blind flooding. CDS connectivity check uses the

same process as global graph where only the

dominants have the right to diffuse.

For each node i, we define neighbors’ parameters:

- Card(i) is the number of node i neighbor’s.

- Cardm(i) is the number of node i neighbor’s

which are selected as dominant.

-

Every dominant node filling:

877

Dc(i) > Dc_optimal

Will be switched to passive mode (not allowed

packet forwarding). 1000 simulation graphs are

deployed to determine the optimal Dc_optimal value.

The simulation process for each Dc_optimal value is

described by the following chart:

graph generator

connex?

MPR-CDS

connex?

Drop nodes

N=1000?

Yes

Yes

No

No

No

Fig.5. Simulation flow chart.

3.2. Results

According to the simulation results, shown in Fig.6,

the optimal value of Dc_optimal is 0.79. Analysis of

the not optimized cases shows that failure is due to

the creation of new clusters. These clusters are

caused by switching some dominants, having at least

one neighbor having cardm(i)=1, to passive mode.

Therefore, we need to consider a new condition

based on the cardm parameter of the neighbors to

avoid isolated clusters.

Finally, all dominants filling the following rules

could be outdated from the dominant set:

Rule 1: Dc > 0.79.

Rule 2: min (cardm(ni)) > 1 (ni dominant

neighbor of node i ).

0.5 0.55 0.6 0.65 0.7 0.75 0.8 0.85 0.9 0.95 130

40

50

60

70

80

90

Dc

Succes c

ases (

%)

Fig.6. Optimization of MPR-CDS.

We call Enh-MPR-CDS the MPR-CDS

protocol after applying the new rules. The same

simulation process, as described earlier, is kept to

evaluate the impact of the Enh-MPR-CDS on the

WSN connectivity.

Results, outlined in table 4, show that within more

than 50 % of cases, the dominant set is optimized

and graph connectivity is guaranteed. Hence, new

approach could reduce the dominant set to 35 %.

Table 4. Optimization rate with Enh-MPR-CDS.

Graphs numbers Optimization rate

497 No dominant to be

removed

503 2 % to 35 % of dominant

to remove

Our new approach, by optimizing the dominant

set, affects directly the energy consumption because

the number of transmitted and received messages

will decrease (control and traffic).

Fig.7: WSN deploying E-MPR-CDS protocol.

Tables 2 and 5 and figures 4 and 7 illustrate the

differences between the classic MPR-CDS protocol

and our enhanced approach.

878

Table 5. Received and retransmitted packets with EMPR-DS.

Trans.

packets

Received

packets

MPR-DS 8 37

Enh-MPR-CDS 7 31

Our proposition is interesting especially for

dense networks. It saves energy by avoiding

unnecessary transmission and reception. The rest of

dominants (routers in the next section) will be able to

forward packets.

4. Routing in WSN

Sensor networks have restricted power and

computational resources. Therefore, sending data

from a source to a destination requires a routing

protocol. An efficient routing protocol guarantees

forwarding messages with less number of hops and

less data traffic [7,8].

Blind flooding guarantees the packet delivery but it

generates significant redundancy. We aim to

introduce the concept of intermediate hop based on

the Enh-MPR-CDS protocol. Dominants are

considered as routers. This approach starts with

empty routing entries. While transmitting packets it

will be enhanced without adding traffic.

An INTER field is used in the indexing the next hop

as described in the flow chart of figure 8.

Fig.8. Routing approach flowchart.

Receiving packets, the router checks the

INTER field value. If it is zero, so the sender (or

forwarder) does not have the destination address in

its neighborhood’s tables (1-hop and 2-hop). It reacts

as follow:

If it finds destination ID in tables, it changes

INTER field value with the ID of the next hop.

Then, it adds entries to routing table that

containing the destination ID and the next hop

ID.

If it does not find the destination ID in tables,

it just forwards the packet.

While, when routers receive packet with INTER

values not zero:

If INTER = ID Address, the router checks

tables and changes INTER value with the

address of next hop and adds the entry to

routing table if does not exist or modified.

If INTER ≠ ID address, it just adds entry to

routing table.

At the end of the first cycle (if we consider that every

nodes transmit one message every cycle), the router

(or dominant) in 3-hop destination/sink neighbors

will have a new entries in routing table. This table

will be enhanced every cycle.

Considering a simple link between source and sink

node, Fig.9 shows the number of retransmitted

packets in the network at each cycle. It proves that

routing with INTER field reduces the number of

retransmitted packets every cycle until converging to

the optimal route (shortest path). This is due to the

enhancement of routing table every transmission

without introducing additional traffic or topology

control packets.

The energy gain in terms of transmitted and

received packets is performed every cycle (n) by

avoiding unnecessary transmissions of the n-hops.

The process continues until finding the optimal

routes.

1 2 3 4 5 6 7 8 9 10 11 125

10

15

20

25

30

35

40

45

Cycle Number

Num

ber

of

Tra

nsm

issio

n EMPR-DS with new approach

OLSR

EMPR-DS

Fig.9. Number of transmitted packets using our routing approach.

5. Conclusions

In this paper, a new concept to optimize the

MPR-CDS protocol is introduced. This concept

consists of minimizing the dominant set in order to

reduce the number of retransmitted packet in WSNs.

Packet arrival

Inter = 0

Yes

No

Forward packet

Inter = Next-hop

Add Entries: Src ID Dest ID

(next hop) (3rd hop)

Dest-ID

in table

No

Forward packet

Inter = 0

Yes

879

Our new protocol, Enh-MPR-CDS, was simulated in

differents scenarios and compared to MPR and

MPR-CDS. Results confirm that a significant

amount of dominants may be removed while

connectivity still guarantee. The new protocol is

more efficient for dense networks that are composed

by hundreds or even thousands nodes.

Furthermore, a new approach for routing in

WSNs has been described. This approach deploys an

intermediate field including the router ID which

serves the destination. This approach enhances

neighbors lists (3 hops and more) without adding

traffic. Based on simulation results, it performs

routes until finding the shortest path.

References

[1] Fangting Sun and Shayman, Mark,Prolonging

Network Lifetime via Partially Controlled Node

Deployment and Adaptive Data Propagation in

WSN, Information Sciences and Systems, 2007.

CISS '07. 41st , 2007, Page(s): 226 – 231.

[2] Wei Peng and Xi-Cheng Lu. On the reduction

of broadcast redundancy in mobile adhoc

networks. In Proc. First Annual Workshop on

Mobile and AdHoc Networking and Computing,

August 11-2000, pages 129–130.

[3] Yongsheng Fu, Xinyu Wang, Wei Shi and

Shanping Li, Connectivity based greedy

algorithm with multipoint relaying for mobile

ad hoc networks, The 4th international

conference on mobile ad-hoc ans sensor

network, 2008.

[4] Cedric Adjih, philipe Jacquet and Laurent

Viennot, Computing connected dominated sets

with multipoint relays, Technical report,

INRIA, Oct.2002, www.inria.fr/rrrt/rr-

4597.html.

[5] C. Bettestetter, On the minimum node degree

and connectivity of a wireless multihop

network, in Proc. ACM MobiHoc, Lausanne,

Switzerland, Jun. 2002.

[6] T.Claussen, P.Jacquet, C. Adjih, A. Laouiti, P.

Minet,P. Muhlethaler,A. Quayyam and L.

Viennot, Optimized link state routing

protocol(OLSR), RFC 3626, Oct. 2003,

Network Working Group.

[7] I. Akyildiz,W. Su, Y. Sankarasubramaniam,

and E. Cayirci, A survey on sensor networks

Communications Magazine, IEEE, vol.40,

pp.102-114,Aug2002.

[8] K. Akkaya and M. Younis, A survey on routing

protocols for wireless sensor networks AdHoc

Networks, vol.3, no.3, pp .325-349, 2005.

880

Abstract—Nowadays, several positioning systems are

available for outdoor localization, such as the global positioning system (GPS), assisted GPS (A-GPS), and other techniques working on cellular networks, for example, Time of Arrival (TOA), Angle of Arrival (AOA) and Time Difference of Arrival (TDOA).However, with the increasing use of mobile computing devices and an expansion of wireless local area networks (WLANs), there is a growing interest in indoor wireless positioning systems based on the WLAN infrastructure. Wireless positioning systems (WPS) based on this infrastructure can be used for outdoor / indoor localization to determine the position of mobile users. An important factor in achieving this is to minimize and simplify the instructions that the mobile station (MS) has to execute in the location determination process. Finding an effective location estimation technique to facilitate processing data is the main focuses in this paper. Therefore, in the wireless propagation environment the Received Signal Strength (RSS) information from three base stations (BSs) are recorded and processed and they can provide an overlapping coverage area of interest. Then an easy new geometric technique is applied in order to effectively calculate the location of the desired MS.

Our new positioning method design was verified at the algorithmic level using Matlab tool, described in Very-high-speed integrated circuit Hardware Description Language (VHDL) at the register transfer level (RTL) and it has been synthesized using 7.1 version of FPGA Advantage for HDL Design that evaluates the circuit in terms of speed, area and power consumption.

Index Terms—Geometric technique, Position estimation, Wireless LAN, VHDL.

I. INTRODUCTION

Recently, the subject of mobile positioning in wireless communication systems has drawn considerable attention. With accurate location estimation, a variety of new applications and services such as Enhanced-911, location sensitive billing, improved fraud detection, intelligent

Monji Zaidi, Jamila Bhar and Rached Tourki are with Electronic and Micro-Electronic Laboratory (EµE, IT-06).FSM, Monastir, Tunisia

Ridha Ouni is with College of Computer and Information Sciences (CCIS), King Saud University Riyadh, KSA

transport system (ITS) and improved traffic management will become feasible [1]. Mobile positioning using radiolocation techniques usually involves time of arrival (TOA), time difference of arrival (TDOA), angle of arrival (AOA), signal strength (SS) measurements or some combination of these methods.

All of these methods are mainly based on trigonometric computation. Comparisons and survey of these methods are given in [2] and [3].

The TOA technique determines the MS position based on the intersection of three circles. Two range measurements provide an ambiguous fix, and three measurements determine a unique position.

Given the coordinates of BSj, (j = 1, 2, 3) as (Xj, Yj), and the distances dj between MS and BSj, the simplest geometrical algorithm for TOA positioning (Figure. 1(a)) is given in [2]. Coordinates of MS position (x,y) relative to BS1 can be calculated as:

���� = 12 � � � ��� + � + � + �� − �

+ � + �� − � � The simplest geometrical algorithm for TDOA

positioning (Figure. 1(b)) is given in [4]. There are two estimated TDOA-s dj, 1 between BS1 and the jth base station (j = 2, 3). Coordinates of MS position (x, y) relative to BS1 can be calculated in terms of d1 as:

���� = − � � � ��� ∗ ���,�� ,�� �� + 12 ��,� − � + ��

� ,� − � + ����

Where:

�� = � + ��

� = + �

� = + � The AOA technique determines the MS position (x, y)

based on triangulation, as shown in (Figure. 1(c)). The intersection of two directional lines of bearing with angles θ� and θ defines a unique position, each formed by a radial from a BS to the MS. The simplest geometric

Monji ZAIDI, Ridha OUNI, Jamila Bhar and Rached TOURKI

A Novel Positioning Technique with Low Complexity in Wireless LAN:

Hardware implementation

Proceedings of the World Congress on Engineering 2011 Vol II WCE 2011, July 6 - 8, 2011, London, U.K.

ISBN: 978-988-19251-4-5 ISSN: 2078-0958 (Print); ISSN: 2078-0966 (Online)

WCE 2011

solution can be derived using [5] with two AOA measurements θ� and θ:

x = Y − Y� + X�tan(θ�) − Xtan (θ)tan(θ�) − tan (π − θ)

y = Y� + (x − X�)tan(θ)

BS1 BS2

BS3 MS

Hyperbola 1

Hyperbola 2

d 1 d 2

d 3

(b)

BS1

BS3

BS2

d 1 d 2

d 3

MS

(a)

BS1 BS2

MS

2θ1θ

(c)

Fig. 1. Position determination techniques: (a) TOA; (b) TDOA; (c) AOA

Using any of the mentioned methods, the calculation can be done either at the BS [network-based schemes] or at the MS [mobile-based schemes]. Network-based schemes have high network cost and low accuracy [3]. Mobile-based location schemes are more interesting. However, since the MS has limited energy source, in the form of the battery pack, energy consumption should be minimized. An important factor in achieving this is to minimize and simplify the instructions that the MS has to execute in the location determination process. The conventional algorithms use complex computation methods that needed relatively long execution time.

In this paper, we propose a novel wireless positioning technique based on the WLAN infrastructure. The main motivation for our approach is twofold: to improve the accuracy of the location estimation and to minimize and simplify the instructions that the mobile station (MS) has to execute in the location determination process.

II. RELATED WORK

To improve the accuracy of the indoor positioning system, several techniques demonstrate the viability of this approach. Youssef et al. [6] show that the RADAR system can be improved using the perturbation technique (joint clustering technique) to handle the small-scale variations problem. This technique can improve theRADARsystem and provide location accuracy up to 3m.

The triangulation mapping interpolation system (CMU-TMI) [7] performs a location calculation on the current data, interpolates that data with the information in the database, and then returns a location estimate based on this interpolation. However, power consumption increases to measure the signal strength on the client side.

The Ekahau Positioning Engine 4.0 [8], released in October 2006, also uses an IEEE 802.11 network to provide location information. It achieves an average

accuracy of 1m with at least three audible channels in each location. This system requires site calibration up to 1 h per 1,200m2. While calibration-based efforts present good accuracy results, there is still room for performance enhancements. Due to the very dynamic nature of the RF signal, the assumption that the radio map built in the calibration phase remains consistent to the measurements performed in the real-time phase does not hold in practice; thus, at times, there is a need to rebuild the radio map. It seems more reasonable to design a fully-automatic system capable of acknowledging RSSI characteristics and variations in both spatial and time domains.

Hitachi [9] released location technology based on TDOA in March 2005. This system uses two types of access points: a Master AP and a Slave AP. Slave APs synchronize their clocks with that of a Master AP and measure the arrival time from a mobile terminal; the Master AP determines the location of the mobile terminal using the TDOA between the signal reception times at multiple Slave APs. While this technique has been found to achieve good results in indoor environments, it requires specialized hardware and fine-grain time synchronization, which increases the cost of this type of solution.

Kanaan proposed a closest-neighbor with TOA grid algorithm (CN-TOAG) [10]. This geolocation algorithm presents a TDOA-based position detection technique to improve location accuracy in the indoor environment by estimating the location of the user as the grid point. This technique is similar to the previous one [11], as it needs specialized hardware and fine grain time synchronization, which increase costs.

III. NEW GEOMETRIC LOCATION ALGORITHM

BASED ON THREE BSS

In the general geometrical triangulation location researches, they assumed that the measured noise is additive and the NLOS error is a large positive bias which causes the measured ranges to be greater than the true ranges [12].

BS1 BS2

BS3

A B

C

Fig. 2. Measured range circles and the associated intersected area

Under the assumption, the MS location will guarantee to lie in the overlapped region (enclosed by points A, B and C) of the range circles as shown in Figure. 2. Thus the MS

Proceedings of the World Congress on Engineering 2011 Vol II WCE 2011, July 6 - 8, 2011, London, U.K.

ISBN: 978-988-19251-4-5 ISSN: 2078-0958 (Print); ISSN: 2078-0966 (Online)

WCE 2011

is necessarily located in the region formed by the points BS1, BS2 and BS3. But, it is noted that the intersection of three circles may not be overlapped with the real measurement results. Therefore, with the above assumption we have to judge whether the three circles intersect or not in our location algorithm.

If circles intersect as depicted in Figure. 3, then three triangles can be drawn as: BS1MSBS2, BS2MSBS3 and BS3MSBS1. Assumptions:

• Different BSs are placed (two to two) at an equal distance

• The coordinates of BSs are known by the MS

• The MS can inquire only on the received power coming from the BSs (i.e. the distance which separates it from each BS).

• d� + d > (; d + d > ( *+� d + d� > (

BS1 BS2

BS3

MS d1 d2

d3

23θ

21θ12θ

13θ

32θ31θ

),( 12120 yxA

),( 23230 yxB),( 31310 yxC

D

r1

Fig. 3. The associated triangles of the standard intersection of three circles.

Note by: • D: The distance between tow BSs.

• A0, B0 and C0 are the orthogonal projections of the MS on (BS1 BS2), (BS2, BS3) and (BS3 BS1) respectively.

• d1, d2 and d3 are the distances that separate the MS from BS1, BS2 and BS3 respectively.

• θ12: is the geometrical angle between the MS-BS1 and BS1-BS2. (Same things for the other angles).

We focus firstly on the triangle BS1MSBS2. Based on the above assumptions and figure 2, we can write.

r� = d�cosθ� We can also write

d = (D − r�) + (d� − r�) ⟹

d = (D − d�cosθ�) + (d� − d�cosθ�) ⟹

d = D + d� − 2Dd�cosθ� = D + d� − 2Dr� ⟹

r� = D + d� − d2D

We define here the first factor q�by

q� = r�D = D + d� − d2D

Coordinates (x�, y�) of the point A0 are given in [13] by

x� = q�X + (1 − q�)X� y� = q�Y + (1 − q�)Y� Where:

(X�, Y�) and (X, Y) are the coordinates of BS1 and BS2, respectively.

Let the distance between BS2 and B0 be r and the distance between BS3 and C0 be r As we described previously, we can get the coordinates of points B0 and C0 as:

x = qX + (1 − q)X y = qY + (1 − q)Y x � = q X� + (1 − q )X y � = q Y� + (1 − q )Y Where:

q = rD = D + d − d 2D

q = r D = D + d − d�2D

MS is then located in a new triangle A0B0C0, which is smaller in terms of area compared to the starting triangle BS1BS2BS3. In the other word we have just created three

new virtual BSs placed at A0, B0 and C0. It is very easy to calculate the distances between the MS and the new points A0, B0 and C0 using the Pythagoras formula. Thus

d(MS, A6) = 7d� − r�

d(MS, B6) = 7d − r

d(MS, C6) = 7d − r

Now, with the three new virtual BSs, MS can repeat the same calculations as shown above. During this second iteration, the orthogonal projections of MS on (A0B0), (B0C0) and (C0A0) must be done to obtain new point A1, B1 and C1 that their coordinates may be determined as previously. A1B1C1‘s area is smaller than the A0B0C0 one. At the i;< iteration, the MS will be located in an AiBiCi triangle which is smaller than Ai-1Bi-1Ci-1 one. This AiBiCi triangle allows to designing the next triangle Ai+1Bi+1Ci+1.

Proceedings of the World Congress on Engineering 2011 Vol II WCE 2011, July 6 - 8, 2011, London, U.K.

ISBN: 978-988-19251-4-5 ISSN: 2078-0958 (Print); ISSN: 2078-0966 (Online)

WCE 2011

After a small number of iterations, the coordinates of three vertices of the triangle (A, B and C) converge to the actual coordinates of the MS. At the limit, the triangle AconvBconvCconv with vertices Aconv, Bconv and Cconv will be considered as a point. So, it is possible to write: x=>?@A ≈ xC>?@A ≈ xD>?@A

y=>?@A ≈ yC>?@A ≈ yD>?@A

We can then take the coordinates of the MS as:

xEF = x=>?@A + xC>?@A + xD>?@A3

yEF = y=>?@A + yC>?@A + yD>?@A3

The division by 3 implies that the MS is equivalent to the gravity center of the Aconv, Bconv Cconv triangle.

Figure 8 (section 5) shows the evolution and the convergence of the three vertices coordinates for different values of di (d1, d2 and d3).

IV. VHDL MODEL

The operation destined to calculate the coordinates of a mobile terminal is known as a Location Process. Original design of this process, has just considered.

Figure 4 shows the main elements involved in our new mechanism: the MS, Three BSs, and the distribution system (DS) or Ethernet.

It can mentioned that different BSs are placed (Two to two) at an equal distance, and the MS can inquire only on the position and the received time coming from the BSs (i.e. the distance which separates it from each BS)

The equations for the x and y position of the mobile was modeled using VHDL. The numeric_std package was used to construct the VHDL model that was readily synthesized into a low power digital circuit. The input signal of the model are the x, y positions of the three BSs, i,j,k in meters, and the signals TOA from the individual BS to the mobile in nanoseconds. The input signal assignments are xi, yi, TOAi, xj, yj, TOAj, xk, yk, TOAk

Fig. 4. Involved elements in the Positioning process

Now, we describe the hardware implementation of the location process. Figure 5 illustrates the system architecture; we try to divide location process to 4 parts: a process location algorithm, the square root component, divider block and buffers to store data. The following notations are used to describe the signal type: I: input signal; O: output signal

TABLE I PROCESS LOCATION PART INTERFACE SIGNALS

Name Type Description CK I:bit Operation clock. RST I:bit RESET system TOA1 I:std_logic_vector Input from the BS1, it gives the time of

arrival value to travel the d1distance X1 I:std_logic_vector BS1 abscissa Y1 I:std_logic_vector BS1ordinate TOA2 I:std_logic_vector Input from the BS2, it gives the time of

arrival value to travel the d2 distance. X2 I:std_logic_vector BS2 abscissa Y2 I:std_logic_vector BS2abscissa TOA2 I:std_logic_vector Input from the BS3, it gives the time of

arrival value to travel the d3 distance. X3 I:std_logic_vector BS3 abscissa Y3 I:std_logic_vector BS3 abscissa Xestim O:

std_logic_vector Estimated abscissa of MS

Yestim O: std_logic_vector

Estimated ordinate of MS

First, the main program (process location) receives data

from the external environment. Then, it calculates the parameters r�, q� , r, q, r , and q as it was presented in Section 3. During this stage the divider component is called by the main program to perform the operations division. Meanwhile the virtual coordinates (x�, y�), (x , y ) and (x �, y �) of points A0, B0 and C0

respectively, are determined.

Secondly, the distances d(MS, A6), d(MS, B6) and d(MS, C6) are calculated using the square root operators

Fig. 5. Top level structure of the Location circuit

The implemented square root algorithm uses unsigned

integers, which have several advantages over floating-point

Proceedings of the World Congress on Engineering 2011 Vol II WCE 2011, July 6 - 8, 2011, London, U.K.

ISBN: 978-988-19251-4-5 ISSN: 2078-0958 (Print); ISSN: 2078-0966 (Online)

WCE 2011

numbers in FPGA arithmetic. Operations on unsigned integers are often simpler to implement, and they require less chip area and resources. The square root operator assumes that its input argument has already been converted into an unsigned integer, which must be taken care of if an application uses signed integers.

A symbol of the top-level VHDL design entity of the square root operator with parameterizable input argument width is presented in Figure 6.

Fig. 6. Top level diagram of the square root operator

Figure 7 shows the simulation of a fast Location

processing model. Optimal process latency is improved by reducing the iterations number needed for convergence. So, after a small number of iterations, the coordinates of three vertices of the triangle (A, B and C) converge to the actual coordinates of the MS. at this time, the triangle AconvBconvCconv with vertices Aconv, Bconv and Cconv will be considered as a point and we can write: x=>?@A = xC>?@A = xD>?@A y=>?@A = yC>?@A = yD>?@A

We can then take the coordinates of the MS as:

(xEF = HIJKLMNHOJKLMNHPJKLM , yEF = QIJKLMNQOJKLMNQPJKLM

)

The division by 3 implies that the MS is equivalent to the gravity center of the AconvBconvCconv triangle. The (xEF, yEF) Geolocalisation information, obtained with a minimal cost has a very important role in several applications. We are trying to take advantage of this important information to develop a fast handover in an environment with time constraints

Fig. 7. Simulation results of the hardware positioning process

Now, it is necessary, as in any positioning method, to evaluate the error or deviation (in m) between actual (measured) and simulated values obtained by our method. For this two cases have to be considered:

A. Line-of-sight (LOS) condition

This case occurs in open areas or in very specific spots in city centers, in places such as crossroads or large squares with a good visibility of BS. Sometimes, there might not be a direct LOS signal but a strong specular reflection off a smooth surface such as that of a large building will give rise to similar conditions. The received signal will be strong and with moderate fluctuations. Therefore, the extracted distance from the received signal is correctly calculated.

In the table 1 we give some actual locations of the MS (Actual x and y). Corresponding values of the true distances d1, d2 and d3 which separate it from BS1, BS2 and BS3 are calculated. Then the estimated position and position error can be determined using our geometric method.

A. Non Line-of-sight (NLOS) condition

This case will typically be found in Indoor environments. This is a worst-case scenario since the direct signal is completely blocked out and the overall received signal is only due to multipath, thus being weaker and subjected to marked variations. Under these conditions the geometric method can be applied. However, the position error increases significantly.

Fig. 8. Algorithm convergence with (d1, d2, d3) = (52 m, 76 m, 50 m)

The oboe simulation was done with the following BSs

coordinates. BS1 coordinates (in meters):(X�, Y�) = (0,0) BS2 coordinates (in meters):(X, Y) = (100,0) BS3 coordinates (in meters):(X , Y ) = (50,86)

0 5 10 15 2030

40

50

60x(A)variations as function of iterations number

iterations number

x(A

)

0 5 10 15 2020

40

60

80x(B)variations as function of iterations number

iterations number

x(B

)

0 5 10 15 2025

30

35

40x(C)variations as function of iterations number

iterations numbers

x(C

)

0 5 10 15 200

20

40

60y(A)variations as function of iterations number

iterations numbers

y(A

)

0 5 10 15 2030

40

50

60y(B)variations as function of iterations number

iterations number

y(B

)

0 5 10 15 2030

35

40

45y(C)variations as function of iterations number

iterations number

y(C

)

0 5 10 15 2030

35

40

45 estimated abscissa of MS

iterations number

x(M

S)

0 5 10 15 2030

35

40 estimated ordinate of MS

iterations number

y(M

S)

Proceedings of the World Congress on Engineering 2011 Vol II WCE 2011, July 6 - 8, 2011, London, U.K.

ISBN: 978-988-19251-4-5 ISSN: 2078-0958 (Print); ISSN: 2078-0966 (Online)

WCE 2011

TABLE II LOS MEASUREMENT AND POSITION DETERMINATION

xactua (m)

yactua (m)

d1

(m)

d2

(m)

d3

(m)

xestima (m)

yestima (m)

C.t (i.n)

Error (m)

20 10 22.5

80.5

82.5

20.13

09.20 ≤8 0.807

30 20 36 73 69.5

29.83

19.64 ≤8 0.395

40 30 50.5

67 57.5

40.30

29.70 ≤8 0.424

40 40 57 72 47.5

40.32

39.86 ≤8 0.353

50 50 71 71 36 50.00

50.23 ≤8 0.238

50 70 86.5

86.5

16 50.00

70.47 ≤8 0.478

60 60 85.2

72 28.5

60.37

59.91 ≤8 0.384

60 40 72 57 47.5

59.67

39.86 ≤8 0.353

70 30 76.5

42.5

60.5

70.06

29.45 ≤8 0.549

80 20 82.5

27.9

73 79.85

19.69 ≤8 0.336

M≈0.4 C.t: Convergence time I.n = Iterations number M: mean

TABLE III NLOS MEASUREMENT AND POSITION DETERMINATION

xactual (m)

yactual

(m) xestimated

(m) yestimated

(m) Error (m)

20 10 18.9700 8.4826 1.8340

30 20 29.0950 19.2922 1.1489

40 30 39.0763 28.7347 1.5666

40 40 41.4850 40.8110 1.6920

50 50 50.0000 51.0523 1.0523

50 70 48.2600 70.9884 2.0011

60 60 58.7450 60.6642 1.4199

60 40 61.1350 40.4331 1.2148

70 30 70.2300 28.0174 1.9959

80 20 79.7000 17.5872 2.4314

Mean≈1.6

B. Synthesis results During the synthesis step, we have exploited FPGA

Xilinx virtex 5 environment. This environment allows implementing communication systems on programmable circuits. The advantage of using FPGAs circuits is mainly the system re-scheduling. For our application, RTL synthesis is achieved using the ISE 10.1 of the Xilinx FPGA virtex 5 environment. A synthesis result, of the proposed process location, is shown in table 3. These results should be exploited in order to study their impact on the support of the technological parameters specified in

IEEE 802.11. These results show that the circuit can operate with 142 MHz, which makes it more suitable for real time communications.

TABLE IV SYNTHESIS RESULTS.

Number of Slices

Number of Flip Flops

Nb of 4 input LUTs

Nb of bonded IOBs

Frequency (MHz)

772 594 1371 30 142

V. CONCLUSION AND FUTUR WORKS

This paper presents new geometric oriented algorithm that is based on three distances measurements to determine the position of a mobile object. Provided that all operations in our proposed algorithm are additions, subtractions and multiplications based, the implementation is simplified which reduces complexity.

Our results show that for a very reduced number of iterations (k ≤ 8), the proposed method converges and provides with a good accuracy the position of MS. Hence, the major advantages of our algorithm are: implementation simplicity, and low computation overhead.

We adopted the high level design for the implementation of this model. In fact, we have used VHDL as high level description language, ModelSim as a simulation tool to check the behavior of the model at the RTL level and ISE 10.1 of the FPGA xilinx environment for synthesis step.

We obtained the exact solution for the two-dimensional location of a mobile given the locations of three fixed base stations in a cell and the signal TOA (Time of Arrival) from each base station to the mobile device. Simulation results for two different situations predict location of the mobile is off by 0.4 m for best case and off by 1.6 m for worst case.

In our future work we are ready to integrate the position of the MS in the 4G Handover management.

REFERENCES [1] J. Caffery, Jr., “Wireless Location in CDMA Cellular Radio

Systems,” Kluwer Academic Publishers, Boston, 2000 [2] Jami M., Ali R.F. Ormondroyd, “Comparison of Methods of

Locating and Tracking Cellular Mobiles, Novel Methods of Location and Tracking of Cellular Mobiles and Their System Applications,” (Ref.No.1999/046), IEE Colloquium, London UK, 1/1-1/6.

[3] Zhao Y. “Standardization of Mobile Phone Positioning for 3G Systems, ” IEEE Communications Magazine, No.4, Vol.40, (July 2002), pp.108-116.

[4] Y.T. Chan, K.C. Ho, “A simple and efficient estimator for hyperbolic location,” IEEE Transactions on Signal Processing, 42(8) (1994).

[5] Alba Pages-Zamora, Josep Vidal, Dana H. Brooks, “Closed-form solution for positioning based on angle of arrival measurements, ” in: Proc. of the 13th Sym. on Personal, Indoor and Mobile Radio Communications, September 2002, vol. 4, pp. 1522–1526.

[6] Youssef, M. et al. “WLAN location determination via clustering and probability distributions, ” Proceedings of IEEE PerCom2003, Mar 2003.

Proceedings of the World Congress on Engineering 2011 Vol II WCE 2011, July 6 - 8, 2011, London, U.K.

ISBN: 978-988-19251-4-5 ISSN: 2078-0958 (Print); ISSN: 2078-0966 (Online)

WCE 2011

[7] Smailagic, A., & Kogan, D. (2002). Location sensing and privacy in a context-aware computing environment,” IEEE Wireless Communications, 9(5), 10–17, Oct 2002.

[8] Ekahau, Inc., “Ekahau Positioning Engine 4.0”, http://www.ekahau.com/. Accessed, Oct 2006.

[9] Yamasaki, R. et al. (2005), “ TDOA location system for IEEE 802.11b WLAN, ” Proceedings of IEEE WCNC’05, pp. 2338–2343, March 2005.

[10] Kanaan, M., & Pahlavan, K. (2004). CN-TOAG: , “A new algorithm for indoor geolocation, ” Proceedings of IEEE PIMRC’04, 3, 1906–1910, Sep 2004.

[11] Biacs, Z., Marshall, G., Meoglein, M., & Riley, W. (2002). “The qualcomm/SnapTrack wireless-assisted GPS hybrid positioning system and results from initial commercial deployments,” Proceedings of IOS GPS, pp. 378–384, 2002.

[12] C. D. Wann and H.C. Chin, “Hybrid TOA/RSSI Wireless Location with Unconstrained Nonlinear Optimization for Indoor UWB Channels,” IEEE WCNC, 2007, March 2007, pp. 3940–3945.

[13] Chi-Kuang Hwang and Kun-Feng Cheng “Wi-Fi Indoor Location Based on RSS Hyper-Planes Method,” Chung Hua Journal of Science and Engineering, Vol. 5, No. 4, pp. 37-43 (2007)

Proceedings of the World Congress on Engineering 2011 Vol II WCE 2011, July 6 - 8, 2011, London, U.K.

ISBN: 978-988-19251-4-5 ISSN: 2078-0958 (Print); ISSN: 2078-0966 (Online)

WCE 2011

Reducing Wi-Fi handover delay using a new positioning process

Monji ZAIDI, Jamila BHAR, Ridha OUNI and Rached TOURKI Electronic and Micro-Electronic Laboratory (EµE, IT-06)

FSM, Monastir, Tunisia [email protected]

Abstract—Mobility has now a crucial requirement for wireless communication. Handover is one of the major tasks that are used to support continuous transmission for a mobile terminal into different radio coverage area. Optimizing the existing handover protocol requires integrating new functionalities. This work focuses on presenting and optimizing handover algorithm. We analyze handover time in wireless local area networks based on the IEEE 802.11b MAC protocol. In fact, scan phase is the main contributor to the handover time. Then, we propose a handover model which replaces a scan phase by a positioning process. This model is able to select the suitable access point (AP) based on the shortest distance far from the mobile terminal (MT). Proposed Handover allows a mobile user to reacting quickly to decide about to which access point to connect. Simulation results show that the proposed model provides gains in term of delays and Handover success in various scenarios

Keywords:IEEE 802.11, Handover, positioning, Latency.

I. INTRODUCTION

This research introduces characteristics of Wi-Fi (Wireless Fidelity) architecture and particularities of its mobility. Handover protocol has been attracting a lot attention from researchers in order to provide continuity of communication to mobile user. In order to reduce Handover procedure delay, some steps of handover must be revised. Classical procedure can then be optimized. Particularly, this work involves the impact of positioning component for handover protocol in a WiFi environment. It proposes fast handover protocol based on positioning process in order to minimize amount of time for handover procedure.

This paper is organized as follow. Section 2 presents the IEEE 802.11 environment. In section 3, we describe the classical handoff mechanism and we perform its constraints. Section 4 presents proposed Handover algorithms in the literature. In section 5, we detail our proposition to reduce handover latency. The simulation, analysis and synthesis are illustrated in Section 6. Section 7 concludes the paper.

Today, there are nearly pervasive WiFi delivers high- speed Wireless Local Area Network (WLAN) connectivity to millions of offices, homes, and public locations, such as hotels, and airports. The integration of WiFi into notebooks, handhelds and Consumer Electronics devices has accelerated the adoption of WiFi to the point where it is nearly a default

feature in these devices [10]. WiFi is also characterized by easiness to deploy and less cost than cellular service. WiFi has the advantage to interoperate with others technologies as WiMAX.

II. WIFI OVER VIEW

The IEEE 802.11 architecture consists of a number of components. The Basic Service Set (BSS) is the basic building block in the architecture, and the members of a BSS communicate with each other or with the Internet hosts through access points. Multiple BSSs can interconnect with each other through a distribution system and form an Extended Service Set (ESS) [5]. The BSS consists of a number of mobile terminals. When MT is moving between different BSS, it needs to switch its AP which functions as a bridge permitting interconnection to the distribution System.

ESS

BSS

BSS

Distributed system

MT

AP

AP

Figure 1. IEEE 802.11 architecture component

IEEE 802.11 specification focuses on the two lowest layers of the Open Systems Interconnection model (OSI model) that incorporate both physical and data link component. The physical layer consists of the radio and the radio’s shared channel. The MAC layer maintains communications among 802.11 stations by managing the operation of the PHY and by utilizing protocols that support and enhance communications.

III. HANDOVER SPESIFICATION

Handover term refer to different approaches to supporting mobility aspects. Distinctions between different propositions can be made according to the performance characteristics, diversity steps, state transitions, and control modes of handover techniques. Generally, Handover can be defined as the process by which an active MT changes its point of attachment to the network, or when such a change is attempted. Handover initiation is, generally, based on signal strength. The access network may provide features to minimize the interruption to sessions in progress [3]. The conventional Handover procedure comprises three phases namely Scan, Authentication and Association or Reassociation. Figure 3 illustrates Handover procedure as described in the IEEE Standard 802.11. It explains the basis handover model and its steps latencies [2]. More handover procedure details can be seen in [9].

A. Scan phase

In the scan phase, a MT tries to find a new available AP with the best signal quality. It selects channels to probe. Then, MT sends a probe request frame in order to obtain information from access point. For example, a MT would send a probe request to determine which access points (APs) are within range. When receiving a probe request frame, AP will respond with a probe response frame containing capability information, supported data rates, etc. The TM must explicitly scan each channel (11 channels in 802.11b and 802.11g, and 8 channels for 802.11a indoors) for potential access points. After probing all selected channels, the AP candidate is determined from the information received in the probe responses and their associated Signal to Noise Ratio (SNR). In its simplest form, the scan phase can be completely passive. The MT switches to a candidate channel and listens for periodic beacon packets generated by access points to announce their presence (typically every 100 ms). However, the latency incurred by this approach can be quite long since the phase of beacon intervals is independent and a MT must therefore wait the full interval on each channel [8]. Scanning phase accounts for more than 90% of the overall latency. It is, then, considered as the dominating factor in handoff latency [1].

B. Authentication phase

Authentication phase depicts a process whereby the AP either accepts or rejects the identity of a MT. The MT begins the process by sending an authentication frame containing its identity to the AP. With open system authentication (the default), the MT sends only one authentication frame, to the selected AP which could accept or reject the connection through an authentication frame.

C. Reassociation phase

In Reassociation phase, we distinguish reassociation request and reassociation response. In fact, if a MT roams away from the currently associated AP and finds another AP having a stronger SNR, it will send a reassociation frame to the new

AP. This last then coordinates the forwarding of data frames that may still be in the buffer of the previous AP waiting for transmission to the MT. An AP sends a reassociation response frame containing an accept notice to the MT requesting reassociation. Similar to the association process, the frame includes information regarding the association, such as association ID and supported data rates.

MT Active AP Old AP

New AP

Probe request

Probe response

Probe response

Probe response

Probe request

Probe response

Probe response

Probe response

...

...

Cha

nnel 1

Cha

nnel N

Authentication request

Authentication response

Association request

Association response

Exchange

Stop accepting Traffic

Start accepting Traffic

Hando

ff Late

ncy P

robe

dela

yA

uth

entic

atio

n a

nd

Ass

oci

atio

n de

lay

Figure 2. Handoff latency in IEEE 802.11 Networks [2].

IV. RELATED WORK

Handover should maintain connectivity to mobile terminal as it moves from access point to another. Important issues related to handover include selection of optimised access point, initializing handover, handoff delay and routing. Different approaches have tried to optimise handover procedure in WiFi network to reduce handover time incurred by probing, authentication and association phases. Some researchers propose an authentication phase that is designed to reduce the authentication delay during a WiFi handover process. Details of this approach can be found in [4, 5]. We are interesting here of research that try to reduce a scan phase. In fact, Syed S. Rizvi and all [11] verify that the active scanning can reduce the overall handover time at MAC layer if comparatively shorter beacon intervals are utilized for packet transmission. In [11], mathematical model is proposed to be used to effectively reduce the handover time of WLAN at MAC layer. Simulation results verify that the utilization of probabilistic approach with the active scanning yields lower latency for each detection and search phases. Both simulation and numerical results of this paper demonstrate that the reduced handover time at MAC layer provides better load balancing, high throughput, and minimum frame transmission delay. The solution proposed in [2] consists of transmitting

Probe requests which the scanning channels, stops once a Probe response indication is received with an adequate SNR. An SNR threshold level has been defined to select AP that provides QoS guarantee. Simulation results show that the proposed model reduce handover time by 22,28%. In [6] the handover was split into three phases, typically performed in sequence: detection, search and execution. Proposed approach has shown that the detection phase can be reduced to three consecutive non-acknowledged frames when stations are transmitting. A shorter beacon interval reduces the detection. The idea in [7] is to monitor continuously the signal quality of all access points in range. In this way terminal makes decisions based on signal levels received from all access points. If any available AP provides a significant better signal quality or the actual associated AP has too weak signal level to serve the MT with a specific link quality, it is necessary to initiate a handover process. The whole handover process is under control of the mobile node that is capable of performing fast handovers. In [8] a technique called SyncScan is described. This technique requires synchronizing short listening periods at the MT with periodic transmissions from each AP. SyncScan algorithm is implemented using commodity 802.11 hardware. Proposed scheme allows better handover decisions and seek to reduce the time spent in the channel scanning phase when a handoff occurs. In fact, implicit time synchronization is proposed to reduce the key cost of discovering new wireless access points. By synchronizing the announcement of beacon packets, a client can arrange to listen to other channels with very low overhead. As a result, handoff using this SyncScan approach is an order of magnitude quicker than using the conventional approach.

V. HANDOVER USING POSITIONING PROCESS

In wireless environment, supporting continuous communication with QoS guaranties is hard to attempt. This is due to fluctuation of network conditions, long time of signalling requirement. When moving into different radio coverage area, Mobile Terminal must find a new access point with which to associate. The access point should provide sufficient signal strength. We propose in this work to choose a nearest access points in order to increase handover success. In consequence, a scan step is eliminated. A positioning process offer advantage of focusing the choice of the access point candidate to which a terminal has a shortest distance. The positioning process is responsible for measuring distance between terminal and each access point. The positioning component calculates distance between mobile terminal and access point. It generates different distances in order to choice the nearest access point far from MT. In this section, we outline the implementation of the positioning process in the MAC layer of a TM. We explain a modular architecture proposal of our contribution in the MAC layer, based on receiver, transmitter component and positioning process. Figure 4 details interaction between different processes using various types of handshaking signals. To determine the position of TM in a 2D space, we used our new geometric approach to Mobile position in wireless LAN

reducing complex computations [12]. This new geometric oriented algorithm is based on three distances measurements to determine the position of a mobile object. Provided that all operations in our proposed algorithm are additions, subtractions and multiplications based, the implementation is simplified which reduces complexity.

The proposed method converges and provides with a good accuracy the position of MS using a very reduced number of iterations (K<10). Hence, the major advantages of our algorithm are: implementation simplicity, and low computation overhead.

The following figure illustrates the system architecture; we divided location process to 4 parts: a process location algorithm, the square root component, divider block and buffers to store data

Figure 3. Top level structure of the Location circuit

Developed algorithms give information to allow mobile terminal to select an access point in an optimal way. These algorithms explain also a complexity of implementing positioning process with VHDL description language. In fact, positioning process necessitates functions to the extraction and the manipulation of traffic parameters. It needs also functions to compute terminal position. Complex models including arithmetic operators as addition, division and multiplication are, then, required to be employed.

The equations for the x and y position of the mobile was modeled using VHDL. The numeric_std package was used to construct the VHDL model that was readily synthesized into a low power digital circuit. The input signal of the model are the x, y positions of the three APs, i,j,k in meters, and the signals TOA from the individual AP to the TM in nanoseconds. The input signal assignments are xi, yi, TOAi, xj, yj, TOAj, xk, yk, TOAk

After calculating its coordinates (x, y) and using a simple calculation of Euclidean distances, the MT can easily compare the distances which separate it from different available APs. The shortest distance corresponds to the AP closest to the MT. This closest AP will be then chosen to establish a new connection

The following figure shows the selection of the closest AP based on Euclidean distances

Figure 4. Min di (APi, MT) determination

The input signal of the model are the x, y positions previously computed of the TM in meters, and the signals CLK and Rst as operating clock and initialization circuit respectively. The output signal is the shortest distance from N distances and therefore the selected AP to establish the new connection.

VI. RESULTS AND OBSERVATION

A. Basis model

A MT broadcasts probe request over three channels. On each channel, it expects to receive responses from three access points. Response frames as well as their SNR are buffered and

then used to select the AP that satisfies the mobile requirements Figure 5 gives an example of an active scan simulation. It shows also probe response frames identification, addresses extraction and SNR measurement. The rest of the handoff process reposes on authentication and association phases while each one a frame is sent to the selected AP and a response is received. After probing all selected channels, the next access point is determined from the information received in the probe responses and their associated Signal to Noise Ratio (SNR). The following algorithm details the process described above. Algorithm: Full-scanning algorithm.

1. For each channel to probe do 2. Broadcast probe request on this channel 3. Start probe timer 4. while True do 5. Read probe responses 6. if MinChannelTime expires, then 7. break 8. end if 9. if MaxChannelTime expires, then 10. break 11. end if 12. end while

Probe Response FramesProbe Request Frame(First channel)

MT Address AP Address SNR

Probe Request Frame(2nd channel)

Figure 5. Simulation of the Scan Phase on the first channel (basis model).

B. Handover with positioning process

This work lies in the development, implementation and discussion of handover protocol. It shows performances of handover procedure in WiFi environment based on positioning strategy. In fact the proposed model is fixed to reduce handover time. Parameters values used to validation are selected according to typical cases. Performance evaluation is

given by simulation. Our approach of handover is transposed on a concise description which support different scenario in WiFi environment. Handover algorithm is integrated on the MT. It is implemented in an FPGA environment with simulation and synthesis tools. The efficiency of this description for several network situations evaluates the Handover algorithm performances.

Figure 6. New Handover mechanism based on positioning phase

C. Comparison

With the basic model a mobile station broadcasts probe request over three channels. On each channel, it expects to receive responses from three access points. Response frames as well as their SNR are buffered and then used to select the AP, which satisfy the mobile requirements. Fig 5 gives an example of an active scan timing diagram. It shows also probe response frames identification, addresses extraction and SNR measurement. The rest of the handoff process reposes on authentication and association phases while each one a frame is sent to the selected AP and a response is received. However, with positioning process, optimal handoff latency is improved by replacing the scan phase of the basic model with a fast positioning process. Simulation results show that the proposed model allows the reduction of almost 60% of the basic handover. The following figure shows the number of clock cycles required for each model.

20

70

120

170

220

Handover withpositioning process

Basic Handover(scan phase)

Association phase

Authentication phase

Scan phase

Figure 7. Handoff latency for new and basis models

D. Synthesis results During the synthesis step, we have exploited FPGA xilinx virtex 5 environment. This environment allows implementing communication systems on programmable circuits. The advantage of using FPGAs circuits is mainly the system re-scheduling. For our application, RTL synthesis is achieved using the ISE 10.1 of the Xilinx FPGA virtex 5 environment. Synthesis results, of the two approaches, are shown in table 1. These results should be exploited in order to study their impact on the support of the technological parameters specified in IEEE 802.11.

TABLE I. COMPARISON OF DIFFERENT HANDOFF MECHANISMS

Number of Slices

Number of Flip Flops

Frequency (MHz)

Basis Handoff 782 604 132

Proposed model

507 463 187

VII. CONCLUSION

This paper shows a model that focuses on reducing handover time consumed by the channel scanning phase. Therefore, we presented a work for designing, simulating and synthesizing a positioning approach that replaces a scan phase. We discussed how a positioning approach can decrease handover during. Implemented positioning IP reduces handover latency by finding out distance between mobile terminal and various access points. Results presented in this paper show that MT can select the optimal access point with low time. Component is designed and characterized by using a hardware design flow. The description was made with the high description language VHDL. ModelSim was used to check the behaviour of the system at the RTL level. It permits to determine the latency in terms of clock cycles. Synthesis was undertaken using the ISE 10.1 of the FPGA environment xilinx virtex 5, in order to evaluate the performance of the circuit in terms of surface area, critical time and frequency operandi. The approach explained in this work has limitations that may not be apparent in indoor network, but are inadequate outdoor for network.

REFERENCES [1] Monji ZAIDI, Jamila BHAR, Ridha OUNI, Rached TOURKI, “A new

solutions for micro-mobility management in 802.11 Wireless LANs using FPGA,” International Conference on Signals, Circuits & Systems (SCS’08), November 7-9, 2008 Hammamet,Tunisia.

[2] Monji ZAIDI, Ridha OUNI, Jamila BHAR, Rached TOURKI, “New approaches reducing handoff latency in 802.11 wireless LANs,” IJCSES International Journal of Computer Sciences and Engineering Systems, Vol.3, No.3, July 2009.

[3] Jamila BHAR, Ridha OUNI, Kholdoun TORKI, Salem NASRI, “Handovers strategies challenges in wireless ATM networks,”

International Journal of Applied Mathematics and Computer Sciences, 4 (2): April 2007, pp 636-641.

[4] András Bohák, Levente Buttyán, and László Dóra “An authentication scheme for fast handover between WiFi access points,” WICON 2007, October 22-24, 2007.

[5] Jidong,Wang and Lichun Bao, “Mobile Context Handoff in Distributed IEEE 802.11 Systems, ”Bren School of Information and Computer Sciences, University of California,Irvine, CA 92697.

[6] Héctor Velayos, Gunnar Karlsson, “Techniques to Reduce IEEE 802.11b MAC Layer Handover Time,” TRITA-IMIT-LCN R 03:02 ISSN 1651-7717,ISRN KTH/IMIT/LCN/R-03/02--SE. April 2003.

[7] Norbert Jordan, Reinhard Fleck, Christian Ploninger “Fast Handover

Support in Wireless LAN based Networks, ” Institute of Communication Networks, Vienna University of Technology Favoritenstrasse 9/388, A-1040 Vienna, Austria

[8] I. Ramani and S. Savage, “SyncScan: Practical Fast Handoff for 802.11 Infrastructure Networks,” Proceedings of the IEEE Infocom, March 2005.

[9] Arunesh Mishra, Minho Shin, William Arbaugh. “An Empirical Analysis of the IEEE 802.11 MAC Layer Handoff Process,” CS Tech Report NumberCS-TR-4395. UMIACS Tech Report Number UMIACSTR-2002-75

[10] A. Saeed, Hafizal Mohamad, Borhanuddin Mohd. Ali & Mazlan Abbas, “Vertical Handover Algorithm for WiMAX/WiFi Interworking,” International Journal of Engineering (IJE), Volume (3) : Issue (5).2008.

[11] Syed S. Rizvi, Aasia Riasat, and Khaled M, A Elleithy “QUANTITATIVE ANALYSIS OF HANDOVER TIME AT MAC LAYER FOR WIRELESS MOBILE NETWORKS, ” International Journal of Wireless & Mobile Networks (IJWMN), Vol 1, No 2, November 2009

[12] Monji ZAIDI, Rached TOURKI, Ridha OUNI “A New geometric Approach to Mobile Position in wireless LAN reducing complex computations,” 2010 International Conference on Design & Technology of Integrated Systems in Nanoscale Era(DTIS 2010) , Hammamet Tunisia March 23-25 2010.

WORLDCOMP'11-ICOMP'11- ICW2941

Novel Data Harvesting Scheme for Efficient Data Aggregation

Mohammad Zuheir Hourani, Ridha OUNI College of Computer and Information Sciences

Computer Engineering Department P.O.Box 51178, Riyadh 11543, KSA

Abstract—The basic idea behind intelligent transportation system is how to deploy vehicular sensor network that have many characteristic such as high computation power ,enough storage space and mobile sensor node in order to design an effective and efficient architecture for data collection and data exchange. In this paper we will introduce an intelligent transportation system with new network paradigm to collect important information from the road environment based on the vehicular sensor network (VSN). Data aggregate provides the drivers by valuable information in order to make the road safer and less congested. Our system framework consists of active vehicular sensor node, passive vehicular sensor node and sink node distributed according to the road segmentation for collecting data from active vehicular sensor node passing by, while active vehicular sensor node collect data from passive vehicular sensor node in their segment using multihop data harvesting. Our scheme aims to reduce broadcast storm and avoid collision. Finally, the simulation using the OPNET simulator shows the effectiveness of the proposed schema.

Keyword- ITS, VSN, IVS, data harvesting, hybrid architecture, data aggregation.

I. INTRODUCTION

Significant advances in manufacturing technology equipment and the advent of Micro-Electro-Mechanical Switches (MEMS) has opened the way for the construction of intelligent sensor nodes which are able to perform three major functions: sensing, processing and wireless communication. These wireless sensor nodes are characterized by their intelligence, their small size, low cost, battery powered, and easy to install and repair. These features open doors to deploy WSNs in the future for a wide range of applications because it greatly expands our ability to monitor and control the physical environment from remote locations.

An interesting field where the use of WSNs proves effectiveness is the field of Intelligent Vehicular Systems. An Intelligent Vehicular System (IVS) uses technological

advances in computers and information technology to improve the efficiency of both new and existing vehicular systems.

Vehicular sensor networks (VSNs) is a technology where sensors are deployed in the road side and in the vehicles to sense various urban phenomenon’s and transmit information for vehicular traffic control and monitoring. VSNs have different characteristic from traditional sensor network (static network), interns of mobility, computational, power supply, memory storage and reliability. Moreover vehicular sensor network VSN has a much more dynamic topology as compared to the static WSN. It is often assumed that VSN will move continuously in a random fashion, thus making the whole network a very dynamic topology. This dynamic nature of VSN is reflected in the choice of other characteristic properties, such as routing, MAC level protocols and physical hardware, beside this, dynamic topology of vehicular sensor network VSN, communication links can often become unreliable [1]. The previous characteristics allow deploying vehicular wireless sensor network to design intelligent transportation system.

In this paper we are interested to design an optimal system architecture for such vehicular sensor network for vehicular traffic control and monitoring. several assumption have been made. First, we assume that vehicles communicate through a wireless interface, implementing a CSMA/CA MAC layer protocol that provides a RTS/CTS/DATA/ACK handshake sequence for each transmission. Vehicular sensor network adopt IEEE 802.11 as a cost efficient and widely deployed solution for network communication. IEEE 802.11p is a draft amendment to IEEE 802.11 standard to add wireless access in vehicular environment. It supports data exchange for vehicle to vehicle (V2V) and vehicle to infrastructure (V2I) in the licensed ITS band of 5.9 GHz.

WORLDCOMP'11-ICOMP'11- ICW2941 The number of sink nodes that are distributed beside the road is very small in proportion to the number of vehicular sensor nodes. So, we assume that sink node has a relatively fast processor and a large storage device and has enough energy resources. In addition, it has very large data base to store information from the vehicles. However, vehicular sensor node has lower storage space and low processor capability. It is assumed that each vehicle has unique ID to identify the vehicular node and included in each message sent.

Finally, we assume devices participating in vehicular networks are highly mobile with a speed up to 30 m/s. But, their mobility patterns are predictable due to the constrained movement imposed by the road system and constrained speed imposed by speed limits, traffic conditions and signals. In fact, the mobility of vehicular sensors poses challenges to the communication system. Mobility undermines the reliability of communication and also causes the topology to continuously change.

This paper focus on how to deploy WSN as an intelligent transportation system over effective and efficient architecture for data collection and data exchange allowing vehicle traffic monitoring and control. The rest of the paper is organized as follow. Section 2 provides a back ground and related work in vehicular sensor networks. Section 3 introduces the proposed scheme for data harvesting and dissemination. Section 4 evaluates the simulation results conducted with OPNET. Finally, section 5 concludes the paper.

II. RELATED WORK

Recently, there is a strong interest from researcher’s in deploying WSNs in VSNs in many applications that involve constraints related to the traffic conditions such as traffic monitoring and control, traffic estimation and monitoring parking. Some research focus in moving vehicles to enable wireless sensor communication between roadside and vehicle or between vehicles. These applications aim to make roads safer and less congested in order to save the time for people. It’s important to note that these applications encounter three types of communications [2]:

• Vehicle-to-Vehicle (V2V) communication: vehicles are equipped with sensors in order to exchange information that is crucial to avoid severe situations like traffic jam avoidance.

• Vehicle-to-Infrastructure (V2I) communications: information flow from vehicles to sensors installed on roadway infrastructure

• Hybrid communication: uses both V2V and V2I architecture

In [3] the author proposed a scheme based on the hybrid communication. Vehicles will send all their sensed data to infostations, where the data will be forwarded to corresponding infostation based on the infostations management area. Later, any vehicle requesting sensed data can request these infostation, which is more of an indirect form of vehicle to vehicle communication using relay nodes forming another type of data harvesting protocol. However, this technique requires installation of an infostation infrastructure, which can be very costly and complex.

With the use of wireless sensor network, multiple sensory devices can be networked together to share geographically distributed information. In [4], the system consists of two vehicle sensory nodes that are placed on each side of a two-lane road. These two wireless sensory nodes will send the collected data to the base node whenever a vehicle is detected. The road traffic monitoring system consists of a 3-tier structure. The system is made up of the end-node tier, base node tier and lastly the PC tier. All data that is captured by the end-nodes will be forwarded to the base node. The base node will then perform pre-processing before forwarding the message to the PC for analysis. Communication via the PC to the end nodes is also carried out through the services of the base node using a star topology. The end-node tier is responsible for vehicle detection and gathering all the data from its onboard sensors.

One of the biggest issues in realizing VSN is concerned with data harvesting which is a technique where sensors create data that summarize the characteristic of the data and send it to the target. In [5], the author proposed a novel multi-hop data harvesting (MDH) method for the V2I architecture. MDH have two scheme proposed for VSN. The MDH scheme using replicas (MDH-R) is proposed for requesting data from single sensor node, while data aggregation scheme is designed (MDH-RA) for cases when the request was made to a geo cast region. Many applications in VSN may require multi-hop data transmission to meet real-time constraints. The author see multi-hop data dissemination capabilities may become ideal for future researches in this area.

VSNs come out as new brand of vehicular networks, whose propose is the real time gathering and diffusion of information. In [2] the author used a Clustering Gathering Protocol (CGP) that is across layered protocol based on hierarchal and geographical data gathering, aggregation and dissemination. The goal of CGP is to gather from all node in the vehicular ad hoc network in order to offer different kind ITS services, it allows telecommunication/service providers to get valuable information about the road environment in a specific geographical area, using V2V network to minimize

WORLDCOMP'11-ICOMP'11- ICW2941 the high cost links usability and base station to gather information from the vehicles

III. OVER VIEW

Our system framework is consisting of static road side node (sink node), and mobile vehicular sensors. Road side nodes are distributed according to the road segmentation for collecting data from mobile vehicular sensors passing by and to exchange data about traffic condition. While mobile sensors on vehicles monitor the road condition and send this information to active mobile neighbors when they are close enough then to the road side sink node (see Figure 1). We focus on vehicular mobility, collaboration between mobile and static nodes, and information exchange among mobile cars. Mobile cars can gather latest information spreading on the map out of the reach of static node, whereas static node can gather information from more active cars coming across, where the connectivity between static and mobile nodes and also between mobile and mobile nodes are most likely meaningful and useful.

Figure 1: Vehicular Sensor Architecture

IV. ROAD SEGMENTATION

The roads are divided into small segments. On each road segment, there are two road side node (sink node) located at the both ends of the segment, as shown in Figure.2. Usually, the road side nodes are placed on the roadside with different distances (𝑑𝑑 + 𝑖𝑖) based on the road environment to collect data from active cars passing by. So, cars can get the road condition before entering this segment; while vehicular mobile sensors, assisted by the mobility of the vehicles, can know the road information along their own path.

The road is divided into 𝑆𝑆 virtual segments with the different length (Figure 2). In each segment an active node is selected to gather data from all nodes in its segment, aggregate them, and send the result to the sink node.

Figure 2: Road Segmentation

V. PROPOSED SCHEME

The proposed scheme consists of providing a feasible, efficient and robust vehicular sensor network framework to monitor road traffic and provide desired and reliable information for users, particularly for drivers in automobiles. In the context we decided to use active node based solution for the V2V dissemination. The scheme will be divided into three parts: Active vehicular sensor node selection phase, data harvesting/dissemination phase, and the data sharing phase.

ACTIVE VEHICULAR SENSOR NODE SELECTION PHASE

Every road segment has two such sink near the ends. Every vehicle enter the segment will send hello message to the sink node at the beginning of each segment containing the vehicle ID. Then, the sink node will store this information in the data base. Using this information, the sink node will create an active node based on two parameters as threshold; the maximum number of vehicles (passive nodes) detected in the road, and the elapsed time.

First, the sink node stores the data about each vehicle entering the segment until reaching the maximum number of vehicles. Second, the sink node will choose one of these car’s randomly to be an active node by broadcasting control information as request including the ID of the vehicle. When collecting this request, the other vehicle nodes (passive nodes) identify the target node dedicated for forwarding their information. All other nodes must know the active node in their segment. To do so, the AVS will include its ID in the packet as new destination and then diffuse reply to the sink node which will be also received and processed by its neighbored vehicles.

The mobility of vehicular sensor network can affect the topology of the network. Therefore, we also use the elapsed

WORLDCOMP'11-ICOMP'11- ICW2941 delay to control when the sink sends request to create an active node exactly before the group of vehicle leave the wireless range of the sink. This time will be calculated using the equation below.

𝑡𝑡 =𝑑𝑑𝑣𝑣

Where 𝑑𝑑 is the distance that our wireless communication can support (IEEE 802.11), and 𝑣𝑣 reflects the mobility of the vehicles which is the velocity of the vehicular sensor node. As a result, we need two counters in the sink node one for time and the other for the number of vehicles. So, in this way we guarantee that we create an active node for each group of vehicles.

Figure 3: Active Node Selection

DATA HARVESTING AND DISSEMINATION PHASE

A road segment can be congested, or free. When it is congested, it can be either heavily congested or lightly congested. Moreover, the traffic condition is changing with time passing. So, a simple but effective method is needed to represent the road condition. For a better delivery ratio and to reduce broadcast storms, a message has to be relayed by a minimum number of intermediate active nodes to the destination. To do so, nodes are organized on a set of segments, in which one node or more (active node) gathers data in its segment and later sends this data to the sink node. Segment-based active node solutions provide less propagation delay and high delivery ratio with also bandwidth fairness. In [4] the authors use a distributed clustering algorithm to create a virtual backbone that allows only some nodes to broadcast messages and thus, to reduce significantly broadcast storms.

When the active node receives the data from the passive node originally holding the data, it will process it in store & forward fashion instead of sending directly to the sink node when the

next sink node is far. Similarly, the passive node keeps the data in its memory during a parametric time, and waits for active node to be closest enough from it. An example is given in figure 4, where the node (F) cannot reach the active node. In this case, it will store its data till it reaches the active node or wait another active node.

All nodes in the segment unicast their sensed data to the active node, using a mechanism similar to DCF (Distributed Coordination Function, presented in IEEE 802.11).

• Each node wait a random bounded back-off time, • At the end of the back-off time, a node send a request to

send to the active node, • The active node acknowledges the reception by sending a

Clear to Send message, • The node sends its data to the active node.

An example is shown in figure 4.

Figure 4: Data Harvesting Model

Passive vehicular sensor nodes will monitor the traffic condition by measuring the speed of the vehicle and send this data to active node in its segment. The active vehicular sensor node will store the data message and count the number of vehicles in its segment, because it has limit number of vehicles. This data will be forwarded to sink node (𝑖𝑖 + 1) that is located at the end of this segment. In turn, the sink node (𝑖𝑖 + 1) will send this data to the preceding sink node (𝑖𝑖) that to update its data about traffic condition in this segment and floods it to new coming vehicles that wish to enter this segment.

When the vehicle is going to enter a new road segment, the sink node at the near end will communicate with this vehicle. So, the vehicle can know the road condition of this segment in advance. There is no needs to place more sink node in the middle of one segment, because even if the vehicle get information at the middle of a segment, drivers still cannot change their direction or change the route trip.

WORLDCOMP'11-ICOMP'11- ICW2941 DATA SHARING PHASE

In some areas, data traffic may increase dramatically due to many vehicles requesting for data at the same time. In this case, there is a high probability that more than one vehicle is requested to be an active vehicular node from the sink node 𝑖𝑖. When the active node reach its limit from the passive node due to the congestion that involve many vehicle in the segment, in this situation the sink node send request to create new active node to provides fairness which is very important in a sensor network where every node has to send its data. It also reduces significantly broadcast storms and thus avoids collisions. another case that we can have new active node when we have two groups of cars and there is a time between them and one of them reach the end of wireless communication range of sink 𝑖𝑖 but the maximum number of passive node still not complete. In this case, the sink node will request new active node from the coming group based on time factor in order to ensure that each group have active node to send information to it. It can be seen from figure 5, when there are many vehicles have data to be sent about the traffic condition which means congestion occurs on a specific segment. In this case, the active node sends to the sink node 𝑖𝑖 message in order to create new active node.

Figure 5: Sharing Phase

VI. SIMULATION

The network topology was built in OPNET Modeler with the following design considerations. There are three scenarios in which we compare the traffic behavior based on congestion and active node availability. For the first scenario, we have one active node sidelined with 30 passive nodes and the second scenario deals with congestion by increasing the traffic generation by dramatically doubling the passive nodes. Finally, the third scenario involves a mitigation step from the sink by requesting an additional active node to accommodate the situation for this congestion.

The environment for the research is set as, CSMA-CA with minimum back-off exponent set to 3 and having 4 as maximum number of back-off’s with channel sensed every 0.1 seconds and operating in 2.4Ghz frequency band and the transmit power is set to 0.002, with ACK wait duration set to 0.05 seconds for the participating active and passive nodes.

First of all the traffic received at the active agent is of utmost importance to study the performance of the system. In figure 6 the traffic received is indicated as in the three scenarios. When there is no congestion in the network the average traffic received converges to 4300 b/s which decreases to 3500 b/s as soon as there is congestion in the network due to extra management and control information besides data traffic and finally having the additional active node will help in having more data traffic. Secondly, we will consider the delay incurred for transmission in the three scenarios, average values are considered to study the effect of congestion on the network. In this first scenario where we have just one active node the average delay is around 0.013 seconds where as it rises to 0.014 seconds when congestion occurs with the inclusion of additional passive nodes in the network.

Figure 6: Data traffic received

After this the sink requests for an additional active node to corner out the increase in the delay and with the inclusion of this active node the load is distributed between the two active nodes hence decreasing the delay incurring at each node which is illustrated in figure 7.

WORLDCOMP'11-ICOMP'11- ICW2941 Finally, the delay to access media is shown in figure 8 which reveals the fact that without congestion in the network the channel was accessed on an average of 0.0014 seconds but with the inclusion of congestion the delay rises to a value of 0.021 seconds approx. and with the second active node sharing the load reduces this value to 0.018 seconds which is in the desirable range.

Figure 7: MAC delay

Figure 8: Media access delay

So, in all we can say that including extra active node is only required in scenarios where the congestion in the network

increases and this will distribute the load among the participating active nodes which are used for harvesting of the information to the sink.

VII. CONCLUSION

In this paper, a scheme for data harvesting and data exchange based on active vehicular sensor node is proposed. We provide a collaborative hybrid method to deliver important information to particular drivers effectively. We use road side sink and vehicular sensor nodes to restore and exchange data, then we use OPNET simulator to study our novel scheme which illustrates that during the time of congestion in the network, it is better to have additional active node beside the old one and have many advantage as we see from the result.

VIII. REFERENCES

[1]. Munir, S.A.; Biao Ren; Weiwei Jiao; Bin Wang; Dongliang Xie; Man Ma , ”Mobile Wireless Sensor Network: Architecture and Enabling Technologies for Ubiquitous Computing”, Advanced, pp:113 – 120, 08 August 2007.

[2]. I. Salhi, M. O. Cherif, S. M. Senouci, “A New Architecture for Data Collection in Vehicular Networks”, IEEE International Conference on Communications ICC'09, pp.1–6, August 2009.

[3]. U. Lee, E. Magistretti, B. Zhou, M. Gerla, P. Bellavista, A.Corradi. “Efficient data harvesting in mobile sensor platforms”, Proceedings of the 4th annual IEEE International Conference on Pervasive Computing and Communications Workshops PERCOMW’06, pp. 352, 2006.

[4]. H. Ng, S.L. Tan, J. G. Guzman, “Road traffic monitoring using a wireless vehicle sensor network”, International Symposium on Intelligent Signal Processing and Communications Systems, ISPACS’08. pp. 1–4, Feb. 2009.

[5]. K.W. Lim Y.-B. Ko, “Multi-hop data harvesting in vehicular sensor networks”, Communications, IET, Vol.4, no7, pp.768–775, April 2010.

A New geometric Approach to Mobile Position in wireless LAN reducing complex computations

Monji ZAIDI, Rached TOURKI Electronic and Micro-Electronic Laboratory (EµE, IT-06)

FSM, Monastir, Tunisia [email protected]

Ridha OUNI College of Computer and Information Sciences (CCIS),

King Saud University Riyadh, KSA [email protected]

Abstract—Positions estimation from Time of Arrival (TOA), Time Difference of Arrival (TDOA), and Angle of Arrival (AOA) measurements are the commonly used techniques. These approaches use the location parameters received from different sources and they are based on intersections of circles, hyperbolas, and lines, respectively. The location is determined using standard complex computation methods that are usually implemented in software and needed relatively long execution time. An important factor in achieving this is to minimize and simplify the instructions that the mobile station (MS) has to execute in the location determination process. Finding an effective location estimation technique to facilitate processing data is the main focuses in this paper. Therefore, in the wireless propagation environment the Received Signal Strength (RSS) information from three base stations (BSs) are recorded and processed and they can provide an overlapping coverage area of interest. Then an easy geometric technique is applied in order to effectively calculate the location of the desired MS. Keywords: Received Signal Strength (RSS), Wireless, Position estimation, geometric technique

I. INTRODUCTION

Mobile location estimation has attracted a significant amount of attention in recent years. The network-based location estimation schemes have been widely adopted based on the radio signals between the mobile device and the base stations. Currently, given that many buildings are equipped with WLAN (Wireless Local Area Network) access points (shopping malls, museums, hospitals, airports, etc.) it may become practical to use these access points to determine user location in these indoor environments.

A variety of wireless location techniques have been studied and investigated [1], [2], [3]. Network-based location estimation schemes have been widely proposed and employed in wireless communication systems. These schemes locate the position of the MS based on the measured radio signals from its neighborhood BSs. The representative algorithms for the network-based location estimation techniques are the Time-Of-Arrival (TOA), the Time Difference-Of-Arrival (TDOA), and the Angle-Of-Arrival (AOA). The TOA scheme estimates the MS’s location by measuring the arrival time of the radio signals coming from different wireless BSs, whiles the TDOA method measures the time difference between the arriving radio signals. The AOA technique is conducted within the BS by observing the arriving angles of the signals coming from the MS. The equations associated with the network-based location estimation schemes are inherently nonlinear.

In this paper, an efficient geometry location estimation algorithm is proposed to obtain the estimated position of the MS, under Line-of-sight (LOS) and/or Non-Line-of-sight (NLOS) environments. The MS’s position is obtained by confining the estimation based on the signal variations and the geometric layout between the MS and the BSs. Both the 2D and 3D locations of the MS can be estimated using the proposed technique scheme. Reasonable location estimation can be acquired within some of computing iterations even with the existence of NLOS errors. The remainder of this paper is organized as follows:

Section 2 describes related work for wireless location estimation. The proposed algorithm is explained in Section 3 for the 2D location estimation. The simulation and analysis are dealt in section 4. The performance evaluation of the proposed scheme is conducted in Section 5. Section 6 draws the conclusions and the future works.

II. RELATED WORKS Different location’s estimation schemes have been

proposed to acquire the MS’s position. Therefore various types of information (for example, the signal traveling distance, the received angle of the signal, and the Receiving Signal Strength (RSS)) are involved to facilitate the algorithm design for location estimation. The primary objective in most location estimation algorithms is to obtain higher estimation accuracy.

Given the coordinates of BSj, (j = 1, 2, 3) as (Xj, Yj), and the distances dj between MS and BSj, the simplest geometrical algorithm for TOA positioning (Figure. 1(a)) is given in [4]. Coordinates of MS position (x,y) relative to BS1 can be calculated as:

���� � �� ������ ���� �

�� � ��� � ��� � ��� � ��� � � � � � ��� � � �� The simplest geometrical algorithm for TDOA positioning

(Figure. 1(b)) is given in [5]. There are two estimated TDOA-s dj, 1 between BS1 and the jth base station (j = 2, 3). Coordinates of MS position (x, y) relative to BS1 can be calculated in terms of d1:

���� � � ������ ���� ��� � ������ ��� �� �

�� �

����� � �� � ��� ��� � � � ��

�������

Where:

2010 International Conference on Design & Technology of Integrated Systems in Nanoscale Era

-1-978-1-4244-6340-4/10/$26.00 ©2010 IEEE

�� � �� � ���

�� � �� � ���

� � � � � ��Inserting this intermediate result into the following equation

with � � � gives a quadratic equation in terms of d1.

��� � �� � ��� � ��� � ���� � �� � ��

Taking its positive root and substituting it into (*) results in the final solution. The AOA technique determines the MS position (x, y) based on triangulation, as shown in (Figure. 1(c)). The intersection of two directional lines of bearing with angles � and � defines a unique position, each formed by a radial from a BS to the MS. The simplest geometric solution can be derived using [6] with two AOA measurements � and �:

� � �� � �� � �!"#� �� � �!"#�� ��!"#� �� � !"#��$ � ��

� � �� � �� � ��!"#� ��

BS1BS2

BS3MS

Hyperbola 1

Hyperbola 2

d 1d 2

d 3

(b)

BS1

BS3

BS2

d 1

d 2

d 3

MS

(a)

BS1 BS2

MS

2θ1θ

(c)

��Figure 1. Position determination techniques: (a) TOA; (b) TDOA; (c) AOA

�Using any of the mentioned methods, the calculation can be

done either at the BS [network-based schemes] or at the MS [mobile-based schemes]. Network-based schemes have high network cost and low accuracy [7]. Mobile-based location schemes are more interesting.

However, since the MS has limited energy source, in the form of the battery pack, energy consumption should be minimized. An important factor in achieving this is to minimize and simplify the instructions that the MS has to execute in the location determination process. The conventional algorithms use complex computation methods that needed relatively long execution time.

III. NEW LOCATION ALGORITHM BASED ON THREEBSS

In the general geometrical triangulation location researches, they assumed that the measured noise is additive and the NLOS error is a large positive bias which causes the measured ranges to be greater than the true ranges [8].

Under the assumption, the MS location will guarantee to lie in the overlapped region (enclosed by points A, B and C) of the range circles as shown in Figure. 2. Thus the MS is necessarily located in the region formed by the points BS1 , BS2 and BS3

But, it is noted that the intersection of three circles may not be overlapped with the real measurement results. Therefore, with the above assumption we have to judge whether the three circles intersect or not in our location algorithm.

BS1BS2

BS3

A B

C

�Figure 2. Measured range circles and the associated intersected area

If circles intersect as depicted in Figure. 3, then three triangles can be drawn as: BS1MSBS2, BS2MSBS3 and BS3MSBS1.

Assumptions: • Different BSs are placed (two to two) at an equal

distance

• The coordinates of BSs are known by the MS

• The MS can inquire only on the received power coming from the BSs (i.e. the distance which separates it from each BS).

�� � �� % &' �� � � % &�"#��� � �� % &

2010 International Conference on Design & Technology of Integrated Systems in Nanoscale Era

-2-

Note by: • D: The distance between tow BSs.

• A0, B0 and C0 are the orthogonal projections of the MS on (BS1 BS2), (BS2, BS3) and (BS3 BS1) respectively.

• d1, d2 and d3 are the distances that separate the MS from BS1, BS2 and BS3 respectively.

• �12: is the geometrical angle between the MS-BS1 and BS1-BS2. (Same things for the other angles).

We focus firstly on the triangle BS1MSBS2.

Based on the above assumption and the following figure, we can write.

(� � ��)*+ ��

BS1 BS2

BS3

MS d1 d2

d3

23θ

21θ12θ

13θ

32θ31θ

),( 12120 yxA

),( 23230 yxB),( 31310 yxC

D r1

Figure 3. The associated triangles of the standard intersection of three circles.

,-�)"#�".+*�/(0!-���� � �& � (��� � ���� � (��� 1

��� � �& � ��)*+ ���� � ���� � ��)*+ ���� 1

��� � &� � ��� � �&��)*+ �� � &� � ��� � �&(� 1

(� � &� � ��� � ����&

We define here the first factor 2�by

2� � (�& � &� � ��� � ����&� �The range of the parameter 2� can determine the shape of

the triangle BS1MSBS2.For example.

��

34��5 6 2� 6 � 1�

B S2

MS

d1 d2

D BS1

34��2� % ������ % �� 1�

D BS2BS1

MS

d1 d2

34��2� 6 5����� 6 �� 1�

BS1 BS2D

d1 d2

MS

Coordinates ����� ���� of the point A0 are given in [9] by

��� � 2�� � �� � 2�������� � 2��� � �� � 2�����

Where: ��� ��� and ��� ��� are the coordinates of BS1 and BS2, respectively.

Let the distance between BS1 and B0 be (� and the distance between BS3 and C0 be (

As we described previously, we can get the coordinates of points B0 and C0 as:

�� � 2� � �� � 2���� �� � 2�� � �� � 2����� � � � 2 � � �� � 2 � � � � � 2 �� � �� � 2 �� �

Where:

2010 International Conference on Design & Technology of Integrated Systems in Nanoscale Era

-3-

2� � (�& � &� � ��� � � ��&�

2 � ( & � &� � � � � ����&�

MS is then located in a new triangle A0B0C0, which is smaller in terms of area compared to the starting triangle BS1BS2BS3. In the other word we have just created three new virtual BSs placed at A0, B0 and C0.

It is very easy to calculate the distances between the MS and the new points A0, B0 and C0 using the Pythagoras formula. Thus

��78� 9:� � ;��� � (��,

��78� <:� � ;��� � (��,

��78� =:� � ;� � � ( �. Now, with the three new virtual BSs, MS can repeat the

same calculations as shown above. During this second iteration, the orthogonal projections of MS on (A0B0), (B0C0) and (C0A0) must be done to obtain new point A1, B1 and C1 that their coordinates may be determined as previously. A1B1C1‘s area is smaller that the A0B0C0 one.

At the 0>? iteration, the MS will be located in an AiBiCitriangle which is smaller than Ai-1Bi-1Ci-1 one. This AiBiCitriangle allows to designing the next triangle Ai+1Bi+1Ci+1. After

a small number of iterations, the coordinates of three vertices of the triangle (A, B and C) converge to the actual coordinates of the MS. At the limit, the triangle AconvBconvCconv with vertices Aconv, Bconv and Cconv will be considered as a point. So, it is possible to write:

�@ABCD E �FABCD E �GABCD��@ABCD E �FABCD E �GABCD�

,-�)"#�!H-#�!"I-�!H-�)**(�0#"!-+�*4�!H-�78�"+J��KL � �@ABCD � �FABCD � �GABCDM

�KL � �@ABCD � �FABCD � �GABCDM

The division by 3 implies that the MS is equivalent to the gravity center of the AconvBconvCconv triangle.

The following figure (section 4) shows the evolution and the convergence of the three vertices coordinates for different values of di (d1, d2 and d3),

IV. SIMULATION RESULTS • BS1 coordinates (in meters):��� ��� � �5�5�• BS2 coordinates (in meters):��� ��� � ��55�5�• BS3 coordinates (in meters):��� ��� � �N5�OP�

Figure 4. Scenario 1:�� � N��Q� �� � RP�Q�"#��� � N5�Q

0 5 10 15 2030

40

50

60x(A)variations as function of iterations number

iterations number

x(A

)

0 5 10 15 2020

40

60

80x(B)variations as function of iterations number

iterations number

x(B

)

0 5 10 15 2025

30

35

40x(C)variations as function of iterations number

iterations numbers

x(C

)

0 5 10 15 200

20

40

60y(A)variations as function of iterations number

iterations numbers

y(A

)

0 5 10 15 2030

40

50

60y(B)variations as function of iterations number

iterations number

y(B

)

0 5 10 15 2030

35

40

45y(C)variations as function of iterations number

iterations number

y(C

)

0 5 10 15 2030

35

40

45 estimated abscissa of MS

iterations number

x(M

S)

0 5 10 15 2030

35

40 estimated ordinate of MS

iterations number

y(M

S)

2010 International Conference on Design & Technology of Integrated Systems in Nanoscale Era

-4-

�Figure 5. Scenario 2:�� � ON�Q� �� � R��Q�"#��� � �S�Q

V. PERFORMANCE ANALYSIS

The reception of a tuple of signal strengths does not lead directly to the position of the device. A conversion of this tuple of received signal strengths into a position is required

The following model introduces some wall attenuation factors to describe more closely the environment. The walls’ materials must be characterized, and their properties must be introduced in the model, leading to the following approximation [10]:

TUVWVXYVZ�[� � TUVWVXYVZ�[:� � �5\ ]\ ^_` [[: �abX\ cX

de

Xf:Where TUVWVXYVZ�[�� is the signal strength received by the

mobile at distance d, TUVWVXYVZ�[:�� the signal strength received at the known distance [: from the AP, and ] a coefficient modeling the radio wave propagation in the environment For example, in free path loss environment, we have ]���2. In indoor environments, this factor will be closer to 3 [11]. gh is the number of walls of different nature,�bX\ is the number of walls having an attenuation of cX .�It is clear that the received power is always sullied with errors.� Therefore errors on the distance and on the position of MS can take place. Those errors appear because the propagation models are too simple in comparison to the complex indoor RF propagation.

Now, it is necessary, as in any positioning method, to evaluate the error or deviation (in m) between actual

(measured) and simulated values obtained by our method. For this two cases have to be considered:

A. Line-of-sight (LOS) condition This case occurs in open areas or in very specific spots in

city centers, in places such as crossroads or large squares with a good visibility of BS. Sometimes, there might not be a direct LOS signal but a strong specular reflection off a smooth surface such as that of a large building will give rise to similar conditions. The received signal will be strong and with moderate fluctuations. Therefore, the extracted distance from the received signal is correctly calculated.

In the table 1 we give some actual locations of the MS (Actual x and y). Corresponding values of the true distances d1, d2 and d3 which separate it from BS1, BS2 and BS3 are calculated. Then the estimated position and position error can be determined using our geometric method.

B. Non Line-of-sight (NLOS) condition This case will typically be found in Indoor environments.

This is a worst-case scenario since the direct signal is completely blocked out and the overall received signal is only due to multipath, thus being weaker and subjected to marked variations. Under these conditions the geometric method can be applied. However, the position error increases significantly.

0 5 10 15 2060

62

64x(A)variations as function of iterations number

iterations number

x(A

)

0 5 10 15 2055

60

65x(B)variations as function of iterations number

iterations number

x(B

)

0 5 10 15 2040

50

60

70x(C)variations as function of iterations number

iterations numbers

x(C

)

0 5 10 15 200

50

100y(A)variations as function of iterations number

iterations numbers

y(A

)

0 5 10 15 2058

60

62

64y(B)variations as function of iterations number

iterations number

y(B

)

0 5 10 15 2050

60

70

80y(C)variations as function of iterations number

iterations number

y(C

)

0 5 10 15 2055

60

65estimated abscissa of MS

iterations number

x(M

S)

0 5 10 15 2040

50

60

70estimated ordinate of MS

iterations number

y(M

S)

2010 International Conference on Design & Technology of Integrated Systems in Nanoscale Era

-5-

TABLE I. LOS MEASUREMENTS AND POSITION ESTIMATION

xactual (m) yactual (m) d1 (m) d2 (m) d3 (m) x estimated (m) yestimated (m) C.t

(I.n) Error (m)

20 10 22.5 80.5 82.5 20.1300 09.2035 8 0.8070 30 20 36 73 69.5 29.8350 19.6409 8 0.3952 40 30 50.5 67 57.5 40.3063 29.7057 8 0.4248 40 40 57 72 47.5 40.3250 39.8619 8 0.3531 50 50 71 71 36 50.0000 50.2384 8 0.2384 50 70 86.5 86.5 16 50.0000 70.4782 8 0.4782 60 60 85.2 72 28.5 60.3752 59.9144 8 0.3848 60 40 72 57 47.5 59.6750 39.8619 8 0.3531 70 30 76.5 42.5 60.5 70.0600 29.4535 8 0.5498 80 20 82.5 27.9 73 79.8552 19.6961 8 0.3366

Mean=0.4321 C.t = Convergence Time. (I.n) = Iterations number.

TABLE II. NLOS MEASUREMENTS AND POSITION ESTIMATION

xactual (m) yactual(m) xestimated (m) yestimated (m) Error (m) 20 10 18.9700 8.4826 1.8340 30 20 29.0950 19.2922 1.1489 40 30 39.0763 28.7347 1.5666 40 40 41.4850 40.8110 1.6920 50 50 50.0000 51.0523 1.0523 50 70 48.2600 70.9884 2.0011 60 60 58.7450 60.6642 1.4199 60 40 61.1350 40.4331 1.2148 70 30 70.2300 28.0174 1.9959 80 20 79.7000 17.5872 2.4314

Mean=1.6357

VI. CONCLUSION

This paper presents new geometric oriented algorithm that is based on three distances measurements to determine the position of a mobile object. Provided that all operations in our proposed algorithm are additions, subtractions and multiplications based, the implementation is simplified which reduces complexity.

Our results show that for a very reduced number of iterations (I 6 �5�, the proposed method converges and provides with a good accuracy the position of MS. Hence, the major advantages of our algorithm are: implementation simplicity, and low computation overhead.

The very fast growth of modern VLSI technology offers a hardware realization of an ever-growing share of mathematical means, so, in our future works, the proposed algorithm for location determination will be implemented in hardware using for example, a simple field programmable gate array (FPGA) chip.

2010 International Conference on Design & Technology of Integrated Systems in Nanoscale Era

-6-

REFERENCES

[1] Y. Zhao, “Standardization of Mobile Phone Positioning for 3G Systems,” IEEE Comm. Magazine, vol. 40, pp. 108-116, July 2002.

[2] H. Koshima and J. Hoshen, “Personal Locator Services Emerge,” IEEE Spectrum, vol. 37, pp. 41-48, Feb. 2000.

[3] J.H. Reed, K.J. Krizman, B.D. Woerner, and T.S. Rappaport, “An Overview of the Challenges and Progress in Meeting the E-911Requirement for Location Service,” IEEE Comm. Magazine, vol. 36, pp. 30-37, Apr. 1998.

[4] I. Jami, M. Ali, R.F. Ormondroyd, Comparison of Methods of Locating and Tracking Cellular Mobiles, Novel Methods of Location and Tracking of Cellular Mobiles and Their System Applications (Ref. No. 1999/046), IEE Colloquium, London UK,1/1-1/6.

[5] Y.T. Chan, K.C. Ho, A simple and efficient estimator for hyperbolic location, IEEE Transactions on Signal Processing, 42(8) (1994).

[6] Alba Pages-Zamora, Josep Vidal, Dana H. Brooks, Closed-form solution for positioning based on angle of arrival measurements, in: Proc. of the 13th Sym. on Personal, Indoor and Mobile Radio Communications, September 2002, vol. 4, pp. 1522–1526.

[7] Y. Zhao, Standardization of mobile phone positioning for 3G systems, IEEE Communications Magazine 40 (4) (2002) 108–116.

[8] C. D. Wann and H.C. Chin, “Hybrid TOA/RSSI Wireless Location with Unconstrained Nonlinear Optimization for Indoor UWB Channels,” IEEE WCNC, 2007, March 2007, pp. 3940–3945.

[9] Chi-Kuang Hwang and Kun-Feng Cheng “Wi-Fi Indoor Location Based on RSS Hyper-Planes Method,” Chung Hua Journal of Science and Engineering, Vol. 5, No. 4, pp. 37-43 (2007)

[10] Y. Chen and H. Kobayashi, “Signal strength based indoor geolocation,”in Proceedings of the IEEE International Conference on Communications (ICC ’02), vol. 1, pp. 436–439, New York, NY, USA, April-May 2002.

[11] R. Vaughan and J. B. Andersen, Channels, Propagation and Antennas forMobile Communications, ElectromagneticWaves Series 50, The Institution of Electrical Engineers, London, UK,2003.

2010 International Conference on Design & Technology of Integrated Systems in Nanoscale Era

-7-

Performance evaluation of

compensation/reward mechanism for resource

allocation in wireless networks

Jamila BHAR, Ridha OUNI and Salem NASRI Electronic and Micro-Electronic laboratory (EµE)

Faculty of Sciences of Monastir (FSM)

Monastir, Tunisia

[email protected]

Abstract—In this paper we evaluate an algorithm to distributing resources provided by the Access Point at the MAC layer in wireless networks. We consider a TDMA/FDD-based mechanism. System model is designed and tested for a wireless ATM networks architecture. In fact, the QoS characterising ATM technology provides the ability to well transmit multiple traffic types and treat every one according to some generic parameters. The basic idea used in this work is to provide slots reassignment, and to dynamically adjust present parameters. Simulation tests show that developed algorithms provide better results and permit to decrease blocking probability for new connections, particularly to CBR connections.

I. INTRODUCTION In this paper, we are interested to evaluate a frame reservation strategy to allow efficient transmission of multi-service traffic over TDMA/FDD channels in a WATM networks. This scheme is based on dynamic allocation of bandwidth among connections carrying different types of traffic. The system strategy is to reserve bandwidth (which is changed dynamically) for each type of traffic during each frame-time. The distribution of bandwidth among the corresponding VCs depends on parameters of each traffic type. Compared to classic TDMA mechanism, the simulation results using TDMA based on a compensation/reward method (TDMA-CR) shows more efficient characteristics of such resource allocation scheme.

The performances of the proposed schemes are evaluated (in terms of connection blocking probability and traffic load) for various data traffic models. The paper is organised as follows. We first present the protocol aspect of TDMA scheme and we invoke the WATM architecture. The second section is devoted to the proposed algorithm particularity and experimental

design. Regarding the impact of resource allocation procedure we present our simulation model and the derived performance results. Finally we summarize the findings of our study and we give some concluding remarks.

II. TDMA SCHEME DESCRIPTION Typical dynamic TDMA protocol is always selected for resources allocation in WATM networks. It provides QoS services due to its superiority and suitability for real-time multimedia traffics [9]. In a TDMA mechanism, the bandwidth allocation assumes the form of time-slot allocation and leads to link scheduling.

Fixed frame duration

. .

. .

Frame header Signalling

mini-slots

Dynamic allocated ABR, VBR

and UBR slots

Fixed allocated CBR slots

Idle slots

Figure 1. Dynamic TDMAUPLINK access control frame format

The TDMA-frame begins by a frame header transporting information for synchronisation. The frame can be divided in three sessions (figure 1). They consist of a signalling period, a data transmission period and an idle period. Source terminal does not always have data to send. In consequence, the data transmission period is variable. The number of data slots for each connexion depends on characteristics of each connexion type. In this paper, we assume that the slot size is equal to a WATM cell. When a signalling period achieved, the AP knows all the terminals that have data to transmit and calculate the slots number to be assigned for each

978-1-4244-2182-4/08/$25.00 ©2008 IEEE. 1195

connexion. The system begins then the data transmission period. If there are no data to send, the system proceeds directly to an idle period, which lasts until the next session. When a frame period finishes, the system begins the next round and the same procedure is repeated. The duration of each frame is fixed.

III. SYSTEM ARCHITECTURE Asynchronous transfer mode (ATM) based technology can provide high speed wireless multimedia communications. In fact, the fine-grain multiplexing provided by ATM due to the fixed small cell size is well suited to slow-speed wireless links since it leads to lower delay jitter and queuing delays [1]. The wireless ATM protocol architecture is based on incorporation of wireless access and mobility related functions into the standard ATM stack. A high speed but low complexity wireless access technique is critical for providing bandwidth-on-demand multimedia services to mobile terminals. Typical target bit rates for the radio physical layer of wireless ATM are around 25 Mbps and a modem must be able to support burst operation with relatively short preambles consistent with transmission of short control packets and ATM cells [10].

Wireless

Control +

Signaling

W-Data Link Control

W-Medium Access

W-Physic control

Standard ATM

Physical Layer

User service

ATM Network Layer

ATM Adaptation

User service

ATM Network Layer

ATM Adaptation Layer

W-Physic control

W-Medium Access Control

Wireless

Control +

Signaling

W-Data Link Control

WATMNNI

ATM-Switch

Wireless Terminal Access

Point

Figure 2. Design architecture of WATM network

For efficient sharing of the available wireless bandwidth among multiple wireless terminals, a radio MAC layer is required. For our study, a TDMA approach is adopted for medium access control where several virtual circuits are multiplexed in a single radio channel. The TDMA frame structure supports

constant bit rate (CBR), available bit rate (ABR), variable bit rate (VBR) and unspecified bit rate (UBR), services within each access point transmission cell area.

IV. DESIGN MODEL A. Wireless Terminal MAC Model A Wireless Terminal (WT) describes a CBR, VBR, ABR and UBR traffic models. The ATMF’s Traffic Management specification defines four cell-based traffic parameters namely the Peak Cell Rate (PCR), Sustainable Cell Rate (SCR), Maximum Burst Size (MBS) and Minimum Cell Rate (MCR) [13]. The PCR is a maximum rate at which the user will transmit cells. Its inverse, the minimum cell inter arrival time (1/PCR), may be easier to measure in practice and it is useful to evaluate performance. The SCR is an upper bound on the possible conforming “average rate” for an ATM connection, where the average rate is simply the number of cells transmitted divided by the connection’s “duration”. For ideal Constant Bit Rate (CBR) traffic, the PCR equals the SCR. For Variable Bite Rate (VBR) traffic, the SCR is typically less than the PCR.

For CBR VCs, slots are allocated according to their demanded bit rates. A CBR traffic convention includes the PCR and the Cell Delay Variation Tolerance (CDVT) factors. For VBR source model, we consider an “on-off” that transmits a number of cells at its SCR. Then, slots allocated to different sources depend on traffic model types parameters.

B. Access Point Mac model The crucial networking algorithm is placed at the AP. It includes receiving packet (data/signalling), FIFOs control, resources managements, etc. Hence, signalling and data WATM cells are multiplexed and treated according to resources allocation scheme. The access point controls the uplink bandwidth allocation for ATM cells from each Wireless Terminal (WT), taking into account the number and the type of active connections and their bandwidth requirements.

The medium bandwidth of WATM network is divided into two separate channels: uplink and downlink. The uplink channel transfers information from WT to the AP. Each of those channels is further partitioned into several sub frames, carrying different classes of traffic. A set of buffer per-VC cell scheduling schemes are used as first-come first-served (FCFS) (figure 3). In general, FCFS cell-scheduling algorithm is the simplest method. It has the advantages of low costs and it is easy to implement, but it performs worse in the scheduling efficiency and the slot utilization.

The entity of radio resource manager, located at the access point, takes part in the connection admission

1196

control (CAC) process for a WATM terminal originated or terminated connection. It performs the wireless connection admission control (WCAC) and is responsible for the long-term allocation of bandwidth to ATM connection over the radio interface.

. . .

Scheduling Module

Data Cells

n

1

Signalling Packet

Signalling Module

... ATM Interfa

Control

Unit

n-1 … PHY EMIS

PHY RECE

Figure 3. AP radio medium architecture in WATM

The entity of scheduler is responsible for scheduling the traffic transmitted through the wireless medium. This component decides the time an ATM cell will be transmitted [15]. Buffering at the access point is required for queuing data cells. As a result, we have to control CDV parameter.

V. TDMA COMPENSATION/REWARD (TDMA-CR) PROPOSAL FOR DYNAMIC RESOURCE ALLOCATION

In the proposed system design, radio spectrum is divided into time slots which are assigned to different connections where a user application can send data only in its own dedicated slots. Due to the FDD duplexing technique utilized in the proposed MAC protocol, two distinct carrier frequencies are used for the uplink and downlink channels. Uplink consists of slotted signalling mini-slots, followed by allocated CBR, ABR, VBR and UBR data slots. The signalling period is used by the wireless terminals to send their bandwidth requirements to the access point. Then, each TDMA round begins by a signalling phase during which, all terminals keep their radios on. In fact, when a WT needs to communicate with any other, initially it sent a connection request message to the AP. According to the QoS requirements of this connection request, the AP assigns adequate number of time slots for this connection using registered parameters. These network parameters are manipulated with an algorithm based on ATM service type characteristics. If there are not enough slots for the request, a connection can not be established with required QoS guarantees. However, AP tries, in such case, to adjust system resource by the resources allocation mechanism proposed to apply a compensation/reward process. In fact, to avoid reject of CBR connection, the proposed algorithm access to a number of slots from ABR and VBR connection

without degrading performances of these lasts. This algorithm stops if the desired resources are satisfied.

no

Yes

no

Yes

no

Yes

..

no

no

Yes

Transmission Disconnection and parameters

actualization

- Save connection - Accept notification -Network parameters update

no

Yes

- Connection Reject- Release notification

Packet arrival

Connection request

Disconnection request

Data

Satisfying service class requirements by unused slots.

Satisfying service class requirements by unused slots.

Satisfying service class requirements by compensation.

- Satisfying the minimum service class requirements

Satisfying service class requirements by compensation.

VBR

CBR

Figure 4. AP MAC layer algorithm

ABR and VBR connections can reward theirs slots (or at least some of them) during next frames according to slots availability. As a result, a number of data slot allocated to connected terminals differ from one frame to another.

TDMA frame

ABR1 CBR1 CBR2 CBR3 ABR2 Idles Slots

ABR1 CBR1 CBR2 CBR3 ABR2

+ +

Disconnection: CBR3

New connection: ABR3

New connection: CBR4

ABR1 CBR1 CBR2 CBR4 ABR2 Idles Slots

ABR1 CBR1 CBR2 CBR4 ABR2 ABR3 Figure 5. Compensation/Reward protocol proposal

1197

Figure 5 shows an example of proposed protocol scenario. When, the access point resources cannot satisfy a new CBR connection, it tries to compensate these resources from ABR and VBR connections. Else it rejects the CBR demand. Considered ABR and VBR connections can reward its resources if there are remained slots. Contrary to CBR source, ABR or VBR can begins its connection with a rate lower than the required rate and it can increase it during next frames.

Each WT (source) sends its data to the AP over its allocated slot-time. If it has no data to send, the terminal operates in idle mode. When a frame finishes, the next frame begins and the distribution of slots time is actualized. The AP collects the network

informations from all the terminals and forwards them acquitting cells. Formats of signalling and data WATM cells are described in figure 6. Signalling packet is used for connection or disconnection request and as acknowledgment packet. The same format is maintained and only the signification of PRM1(PaRaMeter1), PRM2 and PRM3 parameters is modified. These lasts incorporate service class parameters, transmitted from WT to the AP, useful to calculate number of time slots specific to each connection. Such, CBR connection requires SCR (typically equal to PCR) rate and CDV constraints and ABR connection requires MCR and PCR rates as parameters.

Frame Header

AP Identifier

TDMA Frame No

Down signaling slots

Up signaling slots

Down data cells

frame size

CRC

Reserved (2 bytes)

CLP

Type

CSN

Control

MVCI

MVCI

HEC

CRC

DATA (48 bytes)

GFC

PT

CLS

MVCI

MVCI

CRC

PRM3 (2 bytes)

PT

PRM2 (2 bytes)

PRM1 (2 bytes)

WATM Data cell

Signaling packet Figure 6. WATM packets formats

Proposed protocol functionalities are defined in following. Initially, the process will identify the type of the request message. If it is a disconnection demand, the system actualizes its available resources. If it is a connection request, AP scheme first registers the corresponding VCs as ‘‘active’’ and stores the reservation information. Then it estimates resource needed by WT to decide if the system resource is sufficient to permit WT into system. The AP transmits slot allocation information (number of slots allocated to each user and their positions in the frame).

VI. SIMULATION RESULTS AND PERFORMANCE ANALYSIS

Different extension schemes of TDMA are proposed in the literature for a fair and efficient operation of the MAC protocol. Research strategies focus on resolving difficulties to distribute carefully AP system resources between WTs. Difficulties are related to various traffic conditions like buffer occupancy, connection parameter requirements. Diverse solutions are proposed in the literature. [11] Proposes to inform access point about the status of the input queues. Then, information about wireless terminals queues must be sent in signalling packets over a special short control slots. It will be useful to distribute the suitable number of slots for each WT. We mention also that a scheduling technique, used for multiplexing terminals data, impacts the buffer size.

Another challenge studied in this context is the improvement of handoff performances. Then, buffer management and optimal reservation of radio resources allows ameliorating handoff efficiency. Many admission control strategies have been discussed in literature to give priorities to handoff requests compared to the new connection requests as shown in [3, 5]. When a mobile terminal moves from one area to another, the access point in the new area must allow sufficient resources to this handoff connection. The premature termination of established connections, in absence of sufficient resources, is usually more objectionable than rejection of a new connection request.

In this work, we evaluate the proposed protocol to ameliorate some traffic conditions. Figure 7 shows the proportionality between output and input flow for different channel utilization cases. Channel utilization is defined in [1] as the ratio of the number of slots used for WATM cell transmission to the total number of slots available for transmission. Figure 7 depicts the influence of connected terminals number on the output percentage. This percentage decrease when the input flow is important. This is explained by a huge traffic of terminals that leads to a degradation of available resource at the AP. Consequently, the use of

1198

an efficient resource allocated protocol is essential to avoid traffic performances degradation.

0

10

20

30

40

50

60

70

80

15 30 50 70 90

% input

% o

utpu

t

8 MTs35 MTs

Figure 7. Variation of traffic in function of terminals number

Moreover, TDMA-CR is a resource allocation protocol witch affect the connection reject probability. Figure 8 shows the effect of the proposed resource allocation protocol on the reject probability. It compares, for the same considered traffic scenario, a reject probability between classical TDMA and TDMA-CR schemes. We mention here that the big difference between the two cases at a first three seconds is explained by the great effect of compensation method. In the remained simulation time, the difference of reject probability variation between the two methods becomes small. This result is justified by the limit of resources compensation for each traffic class. This means that the efficiency of a proposed scheme can decrease when resources are limited or a great number of terminals need to be served.

0

0,05

0,1

0,15

0,2

0,25

0,3

0,35

0,06

0,68 1,

31,

912,

533,

163,

79 4,4

5,03

5,64

6,27

6,89

7,51

Time (sec)

Rej

ect p

roba

bilit

y

TDMATDMA-CR

Figure 8. Connection reject probability

Results presented by figure 8 show that a compensation mechanism does not decrease a reject connections number only, but it also increase the percentage of resources utilisation as shown in figure 9. The improvement of resources utilisation explains that compensation approach avoid resources wasting and increase a number of served connections. In fact, if compensation method decreases the number of rejected connections, it means that this method allows connecting new terminals with remainder and compensated resources.

0

10

20

30

40

50

60

70

80

90

1 2 3 4 5 6 7 8

time (sec)

%in

put

TDMATDMA-CR

Figure 9. Resources utilisation percentage

0

0,1

0,2

0,3

0,4

0,5

0,6

00,

280,

560,

831,

12 1,4

1,67

1,95

2,23

2,51

2,78

3,07

3,34

3,62

Time (sec)

CDV

(ms)

TDMATDMA-CR

Figure 10. CDV of CBR connection

The cell delay variation (CDV) is a QoS parameter which depends on the type of service class. CDV should take on almost constant value especially for CBR classes. Figure 10 compares a cell delay variation (CDV) of CBR connection using classical and modified TDMA method. We conclude that a modified TDMA scheme let CDV more stable. It gives a sufficient resources distribution strategy that arrange all connections in an equilibrium way.

VII. CONCLUDING REMARKS It is necessary to provide QoS guarantees subject to ensuring delay constraints, prescribed data rate and loss for the various applications such as voice, video and high quality multimedia services. The MAC is necessary for QoS based bandwidth allocation to multiple ATM traffic classes. In this works, we have proposed an approach to support wireless multimedia applications using TDMA/FDD MAC protocol based WATM. The design algorithms use TDMA/FDD-based access scheme, with a compensation/reward process. The TDMA mechanism traits all signalling information of connected terminals and executes the suitable process to compute the allocation of slots in next frame. Simulation results show the efficiency of such compensation/reward process to ameliorate traffic condition. We mention that this algorithm can be adopted for others networks protocols.

1199

REFERENCES [1] Ekram Hossain and Vijay K. Bhargava; Link-Level Traffic

Scheduling for Providing Predictive QoS in Wireless Multimedia Networks; IEEE TRANSACTIONS ON MULTIMEDIA, FEBRUARY 2004, VOL. 6, NO. 1.

[2] Xiaohua Li; Contention Resolution in Random-Access Wireless Networks Based on Orthogonal Complementary Codes; IEEE TRANSACTIONS ON COMMUNICATIONS, JANUARY 2004, VOL. 52, NO. 1.

[3] parameswaran ramanathan, Krishna M. sivalingam, prathima agrawal and shalinee kishore; Dynamic resource allocation schemes during handoff for mobile multimedia wireless networks; IEEE journal on selected areas in communications, July 1999, VOL XX.

[4] Bih-Hwang Lee Hsin-Pei Chen Su-Shun Huang; Dynamic Resource Allocation for Handoff in WATM Networks; Proceedings of the 2005 11th International Conference on Parallel and Distributed Systems (ICPADS'05) IEEE 2005.

[5] Maria C. Yuang, Po L. Tien, and Ching S. Chen; A Contention Access Protocol with Dynamic Bandwidth Allocation for Wireless ATM Networks; IEEE 2000, p149-153.

[6] D. Raychaudhuri, L.J. French, R.J. Siracusa, S.K. Biswas, R. Yuan§, P. Narasimhan & C. Johnston; WATMnet: A PROTOTYPE WIRELESS ATM SYSTEM FOR MULTIMEDIA PERSONAL COMMUNICATION; IEEE J. Selected Areas in Communications, Janvier 1997, pp.83-95.

[7] Tarek Bejaoui1, Véronique Vèque, Sami Tabbane; Combined Fair Packet Scheduling Policy and Multi-Class Adaptive CAC Scheme for QoS Provisioning in Multimedia Cellular Networks; International Journal Communication System 2005; Copyright 2005 John Wiy & Sons. Ltd.

[8] Jaime Sánchez, Jorge Flores Troncoso, José R. Gallardo; RETRANSMISSION ALGORITHM BASED ON POWER PRIORITIES FOR WIRELESS NETWORKS; PIMRC 2002; IEEE2002.

[9] Celal Ceken, Ismail Erturk, and Cuneyt Bayilmis; A New MAC Protocol Design for WATM Networks; ADVIS 2004, LNCS 3261, pp. 564–574, 2004; Copyright Springer-Verlag Berlin Heidelberg 2004.

[10] H. KIM, S.K. BISWAS, P. NARASIMHAN, R. SIRACUSA and C. JOHNSTON; Design and Implementation of a QoS Oriented Data-Link Control Protocol for CBR Traffic in Wireless ATM Networks; Wireless Networks 7, 531–540, 2001; Copyright Kluwer Academic Publishers 2001. Manufactured in The Netherlands.

[11] Rolf Sigle, Thomas Renger; Fair Queueing Wireless ATM MAC Protocols; Computer Networks 31(9-10): 985-997 (1999)

[12] Wojciech Burakowski, Halina Tarasiuk, Andrzej Beben and Marek Dabrowski; EuQoS IST project: Overview of the QoS framework for EuQoS; IST-1999

[13] Peter Sholander, Luis Martinez, Lawrence Tolendino, Bruce A. Mah; The Effects of User Mobility on Usage Parameter Control (UPC) in Wireless ATM Systems;

[14] Michael Wolf, Rolf Sigle; Medium Access in Wireless ATM Systems for Industrial Applications: Requirements and Solutions, Proceedings of the 1998 IEEE International Performance, Computing, and Communications Conference, p18-22, ISBN: 0-7803-5794-9.

[15] jongho bang, sirin tekinay, nirwan ansari; A novel capacity maximisation scheme for multimedia Wireless ATM systems providing QoS guarantees for handoffs; VTC2000, copyright IEEE2000.

Author biography

Jamila Bhar- received her Engineering diploma in Electric and her DEA in Communication system from the National School of Engineering of Tunis (ENIT), Tunisia in 2001 and 2002, respectively. Currently, she is a PhD student. Her research interests include protocol adaptation in heterogeneous networks, traffic

management and Quality of Service for high speed networks. Her recent work has been in traffic control in WATM network.

Ridha Ouni- received his doctoral degree in physic (2002) from the Science Faculty of Monastir, Tunisia He is currently an assistant Professor at the Preparatory Institute of Engineering Study of Monastir (IPEIM), Tunisia. His research interests include computer networks, flow and congestion control, interoperability and performance evaluation. He is interested in many areas of hardware/software protocol verification and design for distributed systems.

Salem Nasri- received his Doctoral degree in automatic control and computer engineering from the National Institute of Applied Sciences of Toulouse France, in June 1985. His research interests are in the fields of computer networks, communication systems and multimedia applications. In May 2001 he obtained the diploma of “Habilitation universitaire”. Since then he has been a professor. He developed collaboration with many laboratories in France such as LSR (Grenoble), CRAN (Nancy), and some other laboratories in Tunisia. Currently he is a professor in the Computer Science Department, Qassim University in the Kingdom of Saudi Arabia.

1200

����������� ���������������������������������������������������

����������� �������������������������������������

��������������� ������������������ ������!�"�#�$�%��&��!��'��������(��'� ���(����"%� $��)&��(���

*����� ���+!����,'����

���������������������������� �� �� ���������������������������������������������������� ���� �������������������������� ������ �� ���� ������� ������� �� ������ ���������������������� ������� ������������������������������ ����������� ���� ��� �������� �������� �� ���� ������������� ��� ���� �� �������� ������������ ��� ������������ ��� ���� ������������������� �������� ����������������� ��������� ����� ����� ����� ��������� ������� �� ���� ��������� ���������������������������

�,� ��)����-)����%&..!������!���(� ����&(���(&���(('&��!�������!��//��������(������01��2��34,�)��(�(�&�!�(��5(������������� ��&(��������/��6�����''���/��'�������� '�����''������ ���5��7����������&��(,�)��������� ���!� ��6������(� �'� '&..!� ��������� ���� �'� 5����� �(� ����� ����!� ��� ������� ��/����(�� ����,� 8���� ��� ���''��(� ���� 7��5��5���� ������ /��'�������� ��(�������� ��� ��� ���5��7� ���������(,��!� ��� ������ (���� '&..!� ������9&�(� ���� ���((����� ���''����������� ���������(�� �� ����� �''������� ���5��7� ��(&��(� ���� �������6��,��

��� ���(� /�/���� �� �! ���� ������� �'� ����� ����������� ���� '&..!���������(� ����/��/�(��������//����,����'�����&(&���!�����5���(�&���� ����� �(� �(�������� '&������� �'� ���5��7� �������������������� '���� ��(��������� ��((���(,� )��� ���(���������� �'�����&������ '&..!� /��������� ���� ��6�� ������ /��'�������(,����&������� ��(&��(� (��5� ����� ���(� ����� �(� &(�'&�� ��� (�� ���.�����''������������(������6����'�&��&�������'����''���/��������(,�

)��� /�/��� �(� (��&��&���� �(� '����5(,� ��� (������� ���� ���� �(��������/�(� �'� ���� '&..!� �����!� ���� ��(��� ��,� �������� ���� ��6�(�����(��&��&����'� ����/��/�(���'&..!�(!(���,���6�����������(��'��&�� /��/�(��� �������� ������ ���� ��(�� ��(�&((��,� %�����!�� 5��/��6����(��&���������(&��(����������&(���(,�

��,� � �)�8)������&���!�� ���5��7(� ���� ��(������ ��� (&//���� ����� ���5��������� ��� ��6�� ����('��� '��:� ����!� �'� �&��������� ���''��� 5����6��!���� ��� ����(� ����;&����!� �'� ���6���� ";��$� ��9&�������(,�)���(/������� (��6���(�� 5���� 5����!� ��''������ ����������(���(����� �/������ &����.������ �'� ���� ���5��7� ��(�&���(�� ��9&���(����/��:������������������(��� &������������(��&��&��(,������������� �����6�� ��(� /���������� ���(�� ���5��7(� 5���� ����� ���������������(�6��������������������������������(�(��(&����(�

����((���� ��������� '��5� ���� �����(����� ��������� ��/&�� ��������&�������� ��&������ ���5����� ������������ 9&�&�� (����&���������� &''�������������,��

������(�9&��������(��������''����6����������(��������(���!� ����''��&���'����!���������''���/��������(�/�����&����!����5�����((����5��7(,� ����������!�� ����� �&(�� �� � ��� ��� �� ������������''����6��!� �6��� ��� ���� /��(����� �'� �� ������ ��&��� ���/� �����"�))$,� -��(�9&����!�� (���� ��(�������(� ���� ���7���� ��� '&..!�(!(���(���� ���//����������������(!(������(���,��

��� '�������(������(������(������ ����� ���� ������&������'� '&..!������� ��� ������������(!(���(����/(� ��������6��������!����������(/��(��� ��(�&� ����� ��*������� ���� ��5� (��(� ����!� ���/��������� 6��������(� ���� �:������� ��'�&����(,� ������ %&..!������������ �(� ���(������� �(� ��� ��/������� �������� �//������ ���&(�� �'� ���� 6�����!� �'� ��6������(� ����� ��� �''��(� �6��� �������((�������������������9&�(,�)���� *����6���'�����&(���'�%&..!������� �(� ��� ���(����� �(�� ����� &��(� ��� /��6���� ������ ��(/��(��������'�5��&����.�����((�������������,��

��� '&..!� �6��&�����(� ���� �(��� ��� ���� �&��(� ��� ���� (!� �������/��(���������0<4,�=���&�(����6���� ��(����� ��(��/�'&������(����� '&..!� �/�������(� ���� ��'�������� !� ������ ��(/����6��(!� ����� ����(,� �!� ����� ��/��(��������� �'� ���� �&��(� ����5(���(!� &����(���������'� ���� �&��(� ���� (��/��'��(� ������ &������/����((,�

���,� %���>�-��)��=��>�)� ���������!�'&..!��������(�����6����� &(������������(�������������(� (��5�� /����(���� ��(&��(,� )��� ��/��(�(� ��� '&..!� ����������(���� �(� ���&��� &�����������(� ��� ���� (!(���� /��������(� �����/�����������������(,�

)�� �������� (�����(�� 5�� ��(���� ����� �(�� ���� �&��� �(�,� )���������� ����(���� �(� ����,� %�����!�� ��'&..�'�������� /��(�� �(��//����,� ���'�����%&..!� ����������������� �(� �(������ ������5����7��5�� ���(?� %&..!'�������� ����� ��'������� ���� ������'&..!'�������� ���,�)���'&..!'��������(���������('���(����(/�6��&�(�'������/����((������'&..!�(��(,�%&..�'����������(������(����� �((������� �'� ����&�(���� 6��&��� ��'����� !� ������6�� (������&� ��� �'� ��� ��(��/� '&������(� ��� 6���� ��,� ��'�������'&������� �:/��((�(� ��������(� ��5���� ���� ��/&�� '&..!� (��(� �'�����&�(���� ��(���/����� �&��(� ���� ���� �&�/&�� '&..!� (��,� @���������� ����� �(� 5���� �(� ��/&�(� ���������(� �������� �������

2008 International Conference on Signals, Circuits and Systems

978-1-4244-2628-7/08/$25.00 ©2008 IEEE -1-

������������ '��� ���� �&�/&�(� �&(�� �� � (��6��,��5�6���� ���� %&..!� �&��� �(�(� ���� ���&����� '���� ������������ (������!,� )��!� ���� '���&������ !� �� (�������� �(?��'� ���������� )���� ����(���,� )����� ���� (�6����� ������(� �'���'������� ��� ���� �������&��?� �:������ ��:�/���� ��� (&��/������&��(,� ���� ���� ������� ��� ���!� ���� �&��,� ��6����� ����&�(����6���� ��(� ������&��� ��� ���� ��� �/������(,� )�����'&..!'�������� (����� ����('���(� ���� '&..!� (��(� ��� ���� �&�/&��(/������������(/���������(�����(,�

������������������������(�����(������5�&��� ����((�(��(���6�����/��������� 6��������(� ����� ������������ ����������(�� 5�� ���(��������� �! ���� ����������� (��&��&��� (��5�� ��� %��� <,� @�� ���A�����(������������(5�������� ��5���������5��������9&�(�� &����(���� �������,� )��� �''������!� �'� ���(� �//������ �(� ����� '��� �����''��� ����������.��� !� '�(�� ��������� ���������(� ����'�&��&�����(���(�(,�

�8,� ����B���%�C��C�����%���>�-��)��==����

)��(� /�/��� /��/�(�(� �� �� &(�� '&..!� ����������� '��� �&�/&�����&������� ���''��� ����,� ��(��� ��� ���� ������&���� ����������(������� ��������� ����� ���(�(�(� �'� ��� ������ '&..!� ���&�������������(&��������,�%���D�(��5(���5����� ������&�/&������,��!�(&/��6�(���� �'� %�%�� ���&/���!� ���� ��(� '������� '��9&���!��%&..!� ��������6�(� (!(���� ��/&�(,������ ����&�(���� 6���� �����(������ �����!��&� ����'��((����������� ��(��/�'&������(?��������� ��(��/� '&������� �(� ��/��(������ !� �� ��������,� )����������� ��(��/� '&������(� ����5� (��/��� ��/������������ �'� ������(�� 5����!� &(��� '���(?� ����������� ��������� ���� ���/�.���,��&�/&�� ��� ��(��/� '&������� 5�(� �:/��((��� ��� ���� '&..!�(��������(,��

� ��������������

!������������

� ��������������������

�"�

%��&���<,�� ! �����������������

#��������� ��������

� ����� ���

!������������

� �� ���

$�� �������������� ����

�$����������

� �����������

�%� �����������

�$������

%��&���D,�� C��/�(���%&..!������������(������

)�=���,�� =��B���)�-���=���

������������&�

������ �����

������� ����� � �� ����

�������������������

����� 6��!�(������ (������ (������ ������� �������

������ (����� (������ ������� ��5� ��5� �� ������ ��5� 6��!���5� 6��!���5� 6��!���5

�%&..!�����&�(��������(��'���/&�������&�/&��6���� ��(�����(��5�����'���1��E�����2���(/����6��!,�)���6��&�(��'�'&..!���� ��(��/�'&������(� /��������(� 5���� �((������ ���� ��'����� ����&���/���������!����/&����(��&������,�%&..!��&��(�/������/������ ������(����������������������/���������)� ���<,�

��� ������ ��� �������.�� ����&�(���� 6���� ��(�� 5�� /������� ��� ����'����5����5�!,��'�����6���������'������'���������!�6���� ���F!G��(�0��� 4��������� �����6���������0�<��<4�&(��������'����5�������������������?�

������

−−−

=D

)��� ������&���� ���� ���/�.������ ��� ��(��/� '&������(� �������������!�� (�������� 5���� ���� ��'����� 6��������� '����� �'� �����(!(��������!�"D�H<$,������� ��'�:�������������!,����� ���(� 5��7�� 5�� ���(����� �(� /���������!� ����� ���� %�%���6������ 6��������� ���� ���� '������� '��9&���!,� )��(�� ��/&��/��������(�5���� ��&(����(�����&�(����6���� ��(,�)�����6���������(����(������:/��������������'����5����'��&��(?�

%�%�?�"��/�!����������'&��$�

��

'�(�)�*(�*'�

� �������� ������

+,�-�

%��&���1,�� %�%������&�(����6���� ���

%������� '��9&���!?� ""�$'�(�� ���&������� " $(��5� ���&�������"�$�&����"�$(��5�������(���"�$'�(��������(�$,�

��

*(� *(./�*(./� (� (./�)./�)�

+,�-�

,�-�,�-�,�-�,-� ,-�

�%��&���E,�� %�������'��9&���!�����&�(����6���� ���

��������&�/&�����������������(���������������������'�6��6�����������6��(��(?� "6��!� ��5� "<$�� ��5� "D$��������� "1$�� (������ "E$��6��!�

2008 International Conference on Signals, Circuits and Systems

-2-

(������ "2$$,� %��� 2� ���&(�����(� ���� 6��������� �'� ���� �&�/&������&�(���(�6���� ��(,�

�,0-�,'-�,(-� ,/-�,1-�

�%��&���2,�� �&�/&������&�(����6���� ���

)���/��/�(���'&..!�������������/��!(� ������&���(,� �)��� '��(��(����� �(� &/������ �'���� �6��!� �����6��� ),� )� �(� ������� ������������� (���,� ��� ��/��(���(� ���� ����� �����6��� ��5�������(��&��6��'��� ��7(,����(��&��� ��/��/���!����(�������������������(�������/��������(,�)����� ���((&����5����(��&������(��:/�������(,� ��� ��������(� ���� ��������� �'� �5�� /��������/����((�(,� ��� '����� �&����� ���� '��(�� (������ '&..!� ��������������&����(� ����&�(���� 6���� ��(� ���(������� ��� ���(� 5��7?� %�%���6������ �����������%�%��'�������'��9&���!,�'�����������.�������(�� 6���� ��(�� ��� ��'���(� ������ �((�������� ��� ��(��/�'&�������"������������$,���

� �2�������3�����������

3�� ����$�������������,&-�

3�� ����$�������������� ����,�-�

��������4�5�

�����:

��:����

D��

����−

−−×= �

��������4&5�

�����:

��:����

D��

����−

−−×= �

����(6�6/�3�� ���+�,��-�

����(6�60�3�� ���+�,&�-�

����(6760�3�� ���������������������� ������� ����� ��������8�9��������

�3�� ���:���� �������������

������

��

=

== 2

<

2

<

!�

"�" �

3������!���

��

%��&���I,�� %&..!�������������������

� (������ (����� �(� �(��� ��� ���� ��:J���� ������ ��� �//�!���'������� '&������(,� ��� �(� �(��� ��� ����!���� �&�� ���� �/���������� !� �����&�� ��5,� )��� �/������� ��� �(� �������� �&�� !���:��&����5,�������(�9&������5��� ���������(�����6��&�(��'������&�/&��6���� ������ ��(�������������'&..�'��������(����,���'&..�'�������� /����((� �(� &(��� ��� ���/&��� ���� '����� '&..!��&�/&�� %��� I� (��5(� (���� ������(� �'� ���� ��6���/��� '&..!����������,��

8,� �� �=)��������=)���������(�/�/����'&..!� �������(��//�����5�������"6���� �����������$� (��6���� ���5�����((�) �"@) $����5��7,�)������(��6���� ��6���/��� '��� ) � ���5��7� ����� ��� �� ������������'��� &(�� ���5�����((�) ���6��������� 0<K4,� �������� ����������(&//��������!����(������(�(&����(�������''��&��!����/��������������''��� ����������(���(� '��� �� ���� ��������(�� ���5����� ��((���&(��� !�����(&//��������!�'����(���������������������'�������/���������� ���� ��/������� ��� ������ ����� ��� �� 5�����((��������,�%��� ���(�� ���(��(����� ���/��6����&��'�����!��'������������9&����!��'�(��6����";��$��&�������(� !�5�����((�) ������ /��(������ 5��7� '��&(� ��� ���� ��6���/����� �'� �� �� &(�����/��6�� �����(����� �������� ���������� ��� @�����((� ) ����5��7(,����� '����� -�� "���5��� -���� ����$� �(� ����������� !� ����� �������� �'� ���((����� ��� �(��������� ���� '&..!� �&�/&��/��������,� )��� /��/�(��� �! ���� '&..!� ������ ����������� �(���(��� ���&(����8�=�����&���,��/���'�����6���/���/��7���(�����/�((� ������6��(�����'������6���� ��(�����������������'�������� ����(���������(������������((���(,��

�%���3�(��5(�/��������(�� �������'��������''���(�������,�;�����%� ��/��(���� ���(&���� ����&�(���� 6���� ��(,� )��� ����������� �'�'&..!��&��(���/���(����������<2���� �������(�"(����� ���<$,�)����//����������'���:��&���/���������6�(�2�5�����(�"/<��/D��/1��/E� ���� /2$,� %�����!�� ��'&..�'�������� (����� ����&����(� ��������������� �(���������������������,�

%��&���3,�� ���&������%&..!�/��������(�

2008 International Conference on Signals, Circuits and Systems

-3-

)�� �6��&���� ���� ��6���/��� '&..!� �������� ����������� 5�����(����� ��6��(�� ���''��� ���������(� '��� 5�����((� ) � ����(,�)���(�&��������������(���'��������������������(������������������� ���''��� '��5����������(����������������������,�%���L�(��5(�(��&������� ��(&��(� �'� ���� '&..!� �! ���� ����������,� ��������(�����(� ����� ���� ��6���/��� ���������� �&�������(� ����&����������������(������!������(�� ���.�(����''������������(������6���(� '�&��&������ �'� ���''��� /��������(,� -��/������ ��� -��6��������� �(�������� !� ���((����� ��� (��6���� "'��� M$�� ����/��/�(���'&..!�������������6�(�������''���������(&��(,����'���������'&..!��! ��������������������/�(����(�� ���.������-�����������������������"�:/����������$����'�&��&��������''������������(,��

�����

�����

�����

�����

�����

����

����

���

����

����

�����

�����

�����

���

�����

�����

� ��

� ��

� ��

� ��

�������

�� ��������

����

%��&���L,�� -���������6���������'���%&..!��! ���������������

�����

�����

�����

�����

�����

����

����

���

�����

�����

����

���

����

���

�����

����

� ��

� ��

� ��

� ��

� ��

�������

�� ��������

����

%��&���M,�� -���������6���������'������((��������(��6����

�����

�����

�����

�����

�����

����

����

���

����

����

���

����

����

� ��

� ��

� ��

� ��

� ��

� ��

� ��

� ��

� ��

�������

�� ��������

����

%��&���<K,��-���������6���������'���8�N8�����(��6����

�����

�����

�����

�����

�����

����

����

�����

�����

����

����

���

����

����

�����

�����

����

����

����

�������

�� �������� ������������

������������������� �

%��&���<<,������6�����'������6(������

��(&��(� �'� /��/�(��� '&..!� ���������� ���� ��(�� ���/�����5����8�N8�� "8���&��� ��&���N8���&��� ��(��������$� �����/�,� 0<K4�(��5(������8�N8��������(�� ���(�(�(�&����������(����(�9&������'� �������� ���/� ���&�����,� %��� <K� ���&(���(� ���� �''���� �'�������/���/����!����-��6��������,��5�6���� ������/����!��'� ����������������(����������������������'�&��&�����,�%��� <<� �:/����(� ���� -�� 6��������� '��� ���� ������ ��(�(�"-��((����� ��� (��6����� 8�N8�� �����/�� ���� �! ���� '&..!�����������$,� )��(� '��&��� �����(�����(� ����� /��(� �'� ����� ������(/������ ���� '�&��&�����(� (����� ������������ �����6��� '��� -��6���������&(����%&..!�����������,�

8�,� -��-=������)��� ����� � *����6�� �'� ���(� 5��7� �(� ��� ��6���/� �� �! �������5��7������������������(�� ��������*&(�����''�������,�����(� �(������ ��(� �5�� /��������(� ���� �6��� ��� ����� 6��&�� ��6��� !����((����� ���''�������������,�)��(��! ����(!(����5������������������ ���� ���5��7� ���������&��� ��� 5����� ��� 5��7(�� (���('!� ���''���(�� ���.�����,����'�����������6���/����������������������(��� &(�� ���&(�� ��� ���� �� ���/���� ��� ��''������ ���5��7� ���������&��,����&������� ��(&��(� ��6�� �����(������� ����� ���� �! ���� '&..!��������������6�(�(���('�����!�/��'�������,��

��%����-���0<4� �����(&���B�����������>&���=�O�������/����%&..!���'�������

C����((��� 5���� �!������ ���!(�(� ���� �����&����� -�/� ������(O� ���-��)���(,���',�����!(�,��8�=��LL�������<K��/DE<K�DE<I������ ���DKK2�

0D4� �,�,�)����������,�����(����O���(�����'��� &(��%&..!�=�����C�5����!(���� ��� ���.��O� PP�,� �������������� -��'������� ��� -��/&����������������������!(���(�������������������������O�-�����DKK3��Q�DKK3�@��),��B�

014� )&��������� -��B�� -���������� -���� �#� C����� =��O� �� &(��%&..!� ��������� ���&������ ��(���� '��� �� -��((� �'� ''���� �����������!(���(O����-��)���(,�%&���������(��8�=��LMR�����E��C��=�DKKI�

0E4� S�&��-����� S@S�� �#� �����5�� S� $� ��/��6�� ��&���%&..!����5��7(�5������������'�%&..!�B���&������O����-��)���(,���',�T��!(�,��8�=��LLR������M����C)� ����DKK2�

024� ,� ����7���� ���� �,� -��7��&�O��(���� ���� ��/������������ �'� �� ! ����%&..!� -���������� '��� �� ����C��'�������� ���&������ ����O������������������&������'�//����� ���������(�����-��/&�����������(��8�=�E�����D��DKK3������<1K2�21<1�

0I4� =������� =,� ,� ����@� ���� S��� �&�(����� ��/��6���� ������ &(���((��'�%���>�������) �����������������'�����������&������/�����(O� ��������������� -��'������� ��� ������������ ������� C����((���� ����-���&��������(�� �� �&�����&(����������6�<MML�

2008 International Conference on Signals, Circuits and Systems

-4-

034� %�����..���������������������������.6�O�%&..!�)�&(�� '���C�������C���� ��(��� �!(���(O� C���������(� �'� @����� �����!� �'� �������������������������)��������!��8�=�D<�� >�DKK3������<1K3�ILLE�

0L4� ����'����� B���5���O� ����������� %&..!� -������,� � �&�6�!� �'� ��������������(&��(O�=����� ��&������'� ���� �BC=��8�=�<1�����2��/2D2�2E<��DKK2�

0M4� *���� �������� ��6�� ���� �� ����(��� )����(��� ����� >���� ���O� ���-���?���(��� &���� (�'�� ���/&����� ����&(�������������� (!(���O� ��&������'����5��7�����-��/&����//��������(��8�=�1K��/L<RML��DKK3,�

0<K4� ������� ���� ������ ������ ��������� �==��� ������ ����O���/��6�����(� �'� ���� ��� ���/� /��'�������(� ��� �� 5�����((� ) ����5��7O� /���������� �'� � �������������� -��'������� ��� ��������������(�"�- $��8�=�I�����L��/DM2�DML�����,�DKKE,�

��

2008 International Conference on Signals, Circuits and Systems

-5-

A new solution for micro-mobility managementin 802.11 Wireless LANs using FPGA

Monji ZAIDI, Jamila BHAR, Ridha OUNI and Rached TOURKIElectronic and Micro-����������� ������������)Faculty of Sciences of Monastir (FSM), Tunisia

[email protected]

Abstract— Seamless connectivity in wireless access networks is critical for time sensitive applications requiring Quality-of-Service guarantees with bounded data transmission delay. Currently, the latency inherent in the handoff process can preclude the successful delivery of such applications by introducing delays up to several seconds. As the mobile clients are moving from one access point to another, the convectional layer-2 handoff consumes more time in the channel-scanning process. We present a novel WLAN handoff architecture using a hardware method. This new handoff procedure reduces the discovery phase according two models extended from the basis model. There are two general methods to implement MAC functions in normal case. The first method is CPU-based. It uses software for protocol analysis and CPU, such as DSP, for process management. It is more flexible in design stage and easy to modify, but its disadvantages are processing speed too low and higher cost. The other method means that all functions are processed by hardware circuits. The advantage of this method is circuit reconfiguration and processing speed very high, but it needs long developed time. We purpose the last method to implement handoff functions in the MAC layer.

I. INTRODUCTION

IEEE 802.11 [1] based wireless LANs have seen a very fast growth in the last few years. Voice over IP [2] (VoIP) is one of the most promising services to be used in mobile devices over wireless networks. One of the main problems in VoIP communication is the handoff latency [3] introduced when moving from one Access Point (AP) to another. Then, the amount of time needed for the handoff [4] in the 802.11 environment is too large for seamless VoIP communications. We were able to reduce the handoff latency using extended handoff procedure, with modifications being limited to mobile devices and compatible with standard 802.11 behaviors.In this work, we address the problem of handoff latency at the MAC layer. As a first solution, we propose to alleviate the scan delay since it takes the major part of the handoff latency;the mobile nodes can limit the number of scanned channels and take informed decision about the most appropriate access point to be associated with.The second solution consists of selecting/predicting [5], the future access point before handoff setup. Then, the AP is selected in an advanced step in order to allocate resources needs useful for the next MT hop and to minimize handoff latency. The proposed mechanisms are compared with standard process for the conventional layer-2 handoff process.

We show that handoff latency can be significantly reduced.This paper is organized as follow. Section 2 presents a wireless communication environment based on IEEE 802.11 standard. In section 3, we describe the existing layer-2 handoff process in WLAN and related works. In section 4, we detail handoff mechanisms proposed for campus wide networks. The simulation, analysis and synthesis are dealt in Section 5. Section 6 concludes the paper.

II. IEEE 802.11 STANDARDSThere are currently three IEEE 802.11 standards [6]: 802.11

a, b and g. The 802.11a standard operates in the 5 GHz ISM band. It uses a total of 32 channels of which only 8 do not overlap. Both 802.11b and 802.11g standards operate in the 2.4 GHz ISM band and use 11 among the 14 possible channels. While 802.11b can operate up to a maximum rate of 11 Mbit/sec, the 802.11g and 802.11a standards can operate up to a maximum rate of 54 Mbits/sec. The 802.11g standard is backwards-compatible with the 802.11b standard while the 802.11a standard, because of the different ISM band, is not compatible with the two other.

A. Wireless LAN architectureWe assume that the reader is familiar with the 802.11 standard. Thus, we briefly summarize the network functions and services of the original standard, in order to better clarify the Handoff Process and the innovative contributions. We outline thisarchitecture as described in [7].

ESS

BSS BSS

Distribution Network

AP AP

MT MT

Figure 1. IEEE 802.11 architecture.

2008 International Conference on Signals, Circuits and Systems

978-1-4244-2628-7/08/$25.00 ©2008 IEEE -1-

A traditional WLAN architecture can be considered as a type of cellular architecture, where each cell is called Basic Service Set (BSS) and is controlled by a base station called Access Point (AP). Each network has a name called Service Set Identifier (SSID) which is advertised by the AP in special control messages called beacons. When two or more APs using the same SSID are connected via a broadcast layer 2 network, called Distribution System (DS), an Extended Service Set (ESS) is created (fig 1).

The standard also defines a set of networking services, which are categorized into station services and distribution services. Specifically, station services are the Authentication, Deauthentication, Confidentiality, and Mac Service Data unit

(MSDU) Delivery services, while the distribution services include Association to the access point, Disassociation, Reassociation, Distribution in the whole ESS, Integration towards non-802.11 networks. Additional MAC services are defined in the standard and in some extensions (e.g. 802.1le, 802.11i, 802.1lf) for optimizing and protecting the use of the wireless resources through rate adaptation, quality of service differentiation, encryption/decryption, and so on.

The IEEE 802 family consists of a series of specifications for local area network. IEEE 802.11 specification focuses on the two lowest layers of the OSI model because they incorporate both physical and data link component and the data link layer is partitioned into the logical link control (LLC) and the media access control (MAC). All 802.11 networks have both a MAC and a physical component. The PHY layer consists of the radio and the radio’s shared channel. The MAC layer maintains communications among 802.11 stations by managing the operation of the PHY and by utilizing protocols that support and enhance communications over the radio medium

B. IEEE 802.11 Management FramesThe IEEE 802.11 management frames enable stations to establish and maintain communications. The following are common IEEE 802.11 management frame subtypes, with the description quoted from [8].

- Probe request: A Mobile terminal (MT) sends a probe request frame when it needs to obtain information from another station. For example, a MT would send a probe request to determine which access points are within range.

- Probe response: A MT will respond with a probe response frame, containing capability information, supported data rates, etc., after it receives a probe request frame.

- Authentication request: The 802.11 authentication is a process whereby the access point (AP) either accepts or rejects the identity of a MT. The MT begins the process by sending an authentication frame containing its identity to the access point. With open system authentication (the default), the MT sends only one authentication frame, and the access point responds with an authentication frame as a response indicating acceptance (or rejection).

- Reassociation request: If a MT roams away from the currently associated access point and finds another access point having a stronger beacon signal, the STA will send a

reassociation frame to the new access point. The new access point then coordinates the forwarding of data frames that may still be in the buffer of the previous access point waiting for transmission to the MT.

- Reassociation response: An AP sends a reassociation response frame containing an acceptance or rejection notice to the MT STA requesting reassociation. Similar to the association process, the frame includes information regarding the association, such as association ID and supported data rates.

III. LAYER-2 HANDOFF PROCESS AND RELATED WORKS

In WLAN, a handoff can be defined as the process of leaving the basic service set of an access point to enter a new one. A handoff is triggered by a degradation of the signal quality which falls below a predefined threshold. The handoff can be the result of either excessive noise, interference or user mobility (decrease of the signal intensity due to the increasing distance to the associated access point).At the MAC layer, the handoff process as defined in the IEEE 802.11 Standard [9] can be decomposed into three phases: scanning, authentication and reassociation (Fig 2).1 Scanning: In order to discover on which channel the surrounding access points are transmitting, a mobile node needs to scan all the channels. Two scanning methods are described in IEEE 802.11. Passive Scanning entails determining the presence of access points by successively listening to all the channels and waiting for the reception of beacon messages identifying the access point. This method, while offering the advantage of low overhead, presents the drawback of introducing a significant delay. In order to alleviate this problem, an active scanning method has been defined. The mobile node broadcasts a Probe Request on each channel and waits a minimum period MinChannelTime for any Probe Response. After the scan of all the channels and the processing of all the beacon messages or Probe Responses received (according to the implemented scanning process), the mobile node can take an informed decision on the most appropriate access point (with the best channel quality).2 Authentication: The Authentication process involves establishing the identity of the mobile node and authorizing its access to the basic service set of the access point.3 Reassociation: The Reassociation process consists in transferring an association between an access point and a mobile node to another access point. The operations between the old AP and the new AP are defined by the Inter-Access Point Protocol [10]. The scanning process has been identified as the principal source of delay in the handoff mechanism [4][11]. Few works have been conducted aiming at reducing the latency at the MAC Layer [4] [11]. They essentially adopt the same approach by optimizing the waiting time of the mobile node during the active scanning process. Indeed, IEEE 802.11 defines two parameters: MinChannelTime, the minimum waiting period before considering that the channel is idle; and MaxChannelTime, the maximum waiting period after a Probe Response has been successfully received. However, no exact value of these parameters has been explicitly set. The suggested optimal values deduced from previous experiments

2008 International Conference on Signals, Circuits and Systems

-2-

are approximately 6.5ms for MinChannelTime and 11ms for MaxChannelTime.

We are interesting to use handoff phases according to models which offer transparent transition from one AP to another within a minimum delay. The IEEE 802.11 a/b/g series offer Wireless connectivity to the users at high rates. An access point (AP) provides connectivity for the mobile users. The wireless nature of 802.11 devices allows the user to move freely between APs within the coverage area, commonly known as the hotspot. The operation of changing from one AP to another AP is known as Handoff. The handoff may be within the same subnet (intra-subnet) or between two different subnets (inter-subnet). In the intra-subnet Handoff, the IP address of MT remains the same. Additional processes are required if the new AP is not connected to the same subnet as the old AP of the MT. These further operations are known as layer-3 Handoff. Fig 2 illustrates the probing procedure as described in the IEEE Standard 802.11. In this figure, N distinct channels are selected to probe. Once the channels to be probed are determined, the station switches to each selected channel and broadcasts a probe request frame. We call this latency the Channel Switch and Transmission overhead (CS&T). After probing all selected channels, the next access point is determined from the information received in the probe responses and their associated Signal to Noise Ratio (SNR). The following algorithm details the process described above.

Algorithm: Full-scanning algorithm.1: For each channel to probe do2: Broadcast probe request on this channel3: Start probe timer4: while True do5: Read probe responses6: if Medium is idle until MinChannelTime expires then7: break8: end if9: if MaxChannelTime expires then10: break11: end if12: end while

During the transition phase (authentication and association), a MT identifies a suitable candidate AP, breaks its association with the current AP and then reassociates with the targeted AP. The MT performs the following transition steps (see fig 2)1. The MT stops data transmission to its current AP.2. The MT switches its radio to the channel used by the targeted AP.3. The MT completes a Reassociation Request / Response exchange with the targeted AP. 4. If Reassociation succeeds, the MT authenticates and performs 802.11i key management with the new AP, to secure its new link.5. The MT requests that the new AP allocates bandwidth to maintain the quality of service (QoS) required by its applications.6. When these steps are completed, data flow resumes between MT and the infrastructure, now via the new AP. The introduction of IEEE 802.11i security and the negotiation of

QoS using 802.11e have increased this transition time from a few ms to a few seconds.

MT Active AP Old AP

New AP

Probe request

Probe response

Probe response

Probe response

Probe request

Probe response

Probe response

Probe response

...

...

Cha

nnel

1

Cha

nnel

N

Authentication request

Authentication response

Association request

Association response

Exchange

Stop accepting Traffic

Start accepting Traffic

Han

doff

Lat

ency

Pro

be d

elay

Aut

hent

icat

ion

and

Ass

ocia

tion

del

ay

Figure 2. Handoff process in the IEE 802.11 Standard.

Existing handoff mechanism is based on Scanning channels, authentication and association or reassociation phases. This model is described with a hardware description language using a Finite State Machine (FSM). In this model, handoff initializes when SNR (Signal Noise Rate) drops than a specific threshold. Fig 3 explains, with more details, the basis handoff model and its steps latencies.

IV. ARCHITECTURE DESIGN: NOVEL APPROCHES

A. Model with reduced Scan phaseIn this work, the objective consists of reducing handoff latency. As a first solution, we propose to alleviate the scan delay since it takes the major part of the handoff latency. In fact this solution consists of transmitting Probe requests on each channel stops once a Probe response indication is received with an adequate SNR. An SNR threshold level has been defined to select AP that provides QoS guarantee. Fig 4 explains the first approach based on reduced scan phase.During Scan phase of basis handoff model, the MT must sweep the total number of channels (N). The time allocated to scan each channel is called MaxChannelTime. Thus, the time of Scan is given by the following equation.

)1(* ChannelTimnumberChannelsScantim �

2008 International Conference on Signals, Circuits and Systems

-3-

MaxcannelTim is the time interval separating the Probe Request and the last Probe Response on each channel. The scan time can be reduced when minimizing the channel number to scan. By being unaware of negligible times, the idealized latency of this active Scan is given by the following relation

)2(*)(*))(1(1�

���NumChannelc

cMaxcpMincpScantim

Where P(c) is the probability of one or more access points functioning in the same channel c. whether Min Channel Time and Max Channel Time values are respectively 1 ms an 11 ms ideal latency should extend from 11 ms to 110 ms. Based on (1) it becomes unuseful to sweep all channels while the most adequate AP belongs to a channel already scanned. In others terms scanning the rest of channels don’t serves to find useful

AP, but it loses time which causes to higher scan latency.

Scan Channel i

AP(Ch i) selectionSNR i >Thershold

The rest of basismodel phases

Nex

t cha

nnel Transmit probe Request on channel i.

Receive probe Response from channel i.

YesNO

Figure 3. Second model: reduced Scan phase.

The implementation of this model in account the specific threshold once reached, the MT stops the scan process and follows the rest of the basis handoff phases. Then, it is obviously that this implementation leads to a fast communication establishment.

B. Predictive modelThe third model, based on predictive approach [5], can be adopted in two hypotheses. The first one occurs when supported applications meet temporal constraints or significant QoS level. Then, the Handoff process should be achieved without (a) generating communication rupture at the applicative level and (b) degrading QoS guaranties. The second situation occurs when mobile stations follow predefined trajectories. The solution consists of selecting the future access point before handoff setup. Then, the AP is selected in an advanced step in order to allocate resources needs useful for the next MT hop and to minimize handoff latency. This solution is a probabilistic based approach since we predict AP. However, it takes in account several arguments and parameters to outlines decision for the probable AP that can be chosen to maintain an established connection.

The mobile station achieves its first attachments using the basis model. For each transition from one cell to another, the MT records AP addresses which can be used to determinate its trajectory. The future AP can be predicted using addresses of the old APs present in the direction MT. As well as the number of AP meted by the MT becomes higher, so its trajectory is

defined rigously. We propose here that three successive attachments or AP addresses allow discovering the MT trajectory. We represent the MT displacement into FSM, described as following.

connection established(N<3)

SNR dropsThmax

Basis Handoff

Connection established(N>=3)

SNR dropsThmin

PredictionSNR dropsThmax Authentication

Association

Yes

Yes

Yes

Figure 4. Predictive model state diagram.

V. IMPLEMENTATION

Our contribution for reducing handoff latency reposes on the lower layers of the 802.11 networks (MAC and physical layer [12, 13] is divided into two sub layers: PLCP (Physical Layer Convergence Procedure) and (Physical Medium Dependent). We assume that a specific data was done by PLCP.The PLCP is the bridge between MAC and radio transmission layers it translates MPDU to PMD frames. The PMD is responsible for transmitting any bits it receives from the PLCP to the wireless medium by using antenna. The major efforts of the handoff processing is almost in the MAC layer, which we did consider new approaches to be integrated in this level. In this section, we outline the implementation of the MAC layer in a mobile terminal. A modular architecture proposal of the MAC layer, based on receiver and transmitter component, is described in fig 6. It details interaction between Mac layer and both LLC and PLCP layers. Various types of handshaking signals are integrated to manage and control transmission in both directions. Table 1 outlines the interfacing signals and briefly indicates their operations.The receiver component receives PMDUs from PLCP and decodes them into various types of paquets [14, 15, 16]. First it identifies the type of frames (signalization, data or control) and next processes them accordingly. For the handoff initialization and operation, the main task of the MAC receiver component consists of processing probe response frames and controls SNR level.

TABLE I. RECEIVER/TRANSMITTER COMPONENT INTERFACE SIGNALS.

Name DescriptionClk Operation clock

Canal_val Sets Channel value to physical layerOrder Used to order the answers in a well defined

orderPhy_start Physical layer notifies receiver start to

receive dataSig_level Indicates the signal force coming from APProb_resp MT receives the Probe Response frames

coming from APsPhys_data Data signals from physical layerProb_reqst Notifies transmitter send probe request frame

2008 International Conference on Signals, Circuits and Systems

-4-

Ack Notifies transmitter send acknowledge frameScan_fini Indicates host that all channels has been

scanned completely

The transmitter component allows (a) events detecting (b) parameters buffering and (c) message generating. Otherwise, it maintains a permanent interaction with the receiver component in order to manage events (SNR, New connection…) and satisfy requirements (service classes, addresses…). The transmitter is mainly responsible first, for handoff initialization by generating probe requests over different channels. Second it allows automatising handoff phases according to the specific approaches described in the section (4).

Phy_

start

Prob

_resp

Sig_le

vel

Phys_

dataProb_reqst

Ack Ca

nal_v

al

Orde

rScan_fini

Physical Layer:PLCP and PMD

MAC

LLC: Logic Link Control

Clk

Transmitter Part Receiver Part

16 4 2 416

Figure 5. Modular architecture proposal of the MAC layer.

A. Simulation models and results1) Basis model

Probe Response FramesProbe Request Frame(First channel)

MT Address AP Address SNR

Probe Request Frame(2nd channel)

Figure 6. Simulation of Scan Phase on the first channel.

A mobile station broadcasts probe request over three channels. On each channel, it expects to receive responses from three access points. Response frames as well as their SNR are buffered and then used to select the AP, which satisfy the mobile requirements. Fig 7 gives an example of an active scan timing diagram. It shows also probe response frames

identification, addresses extraction and SNR measurement. The rest of the handoff process reposes on authentication and association phases while each one a frame is sent to the selected AP and a response is received.

2) Handoff with reduced ScanFig 8 shows the simulation of a fast handoff processing model. Optimal handoff latency is improved by reducing the scanning phase, which finishes once an adequate AP is detected. A higher detected SNR avoids scanning the other channels and allows to join with the corresponding AP. Authentication and association phases are similar than those of the basis model.

This approach remains probabilistic opposite of the adequate AP order while an other AP may be detected within the rest of channels. In worst case, this approach improves the basis model performances

Probe Request Frame(First channel) Probe Response Frames Authentication frame Association frame

Association responseAdequate thershold on the first channel Authentication response

handoff finished

Figure 7. Reduced Scan.

3) Predictive model.

The predictive handoff model is similar than the basis model during the first three transitions. This period serves as training phase in order to discover the MT trajectory over an historical setting created with signalization messages between the MT and the meted AP. This model could predict the future AP since the fourth handoff execution. The MT authenticates with this AP without scanning step.

Fig 9 shows the predictive model simulation at the 5the handoff initialization. At this level, the MT trajectory is

discovered and the future AP is predicted according to the SNR drops

5th handoff initialisation Adresses of the three last APs whichaccomodated the MT

Old connection New connection

Handoff finished

...

Figure 8. Attachment within predictive model.

2008 International Conference on Signals, Circuits and Systems

-5-

historical transitions. When the SNR drops, the MT authenticates and joins with this AP without scanning.This approach improves reducing handoff latency compared to the two others models as outlined in fig 10.This study enables to conclude that the handoff latency depends on scan period or in other terms on the number of AP which operates under several channels. In fact, minimizing one among N channel to be scanned allows reducing almost 1/N of the total handoff latencyThe handoff latency measures the time between a probe requests is sent until an association reply is received. The basis model requires to seen all channels. It needs 184 clock cycles Without counting the Channel Switch and Transition overhead (CST). The second model provides, in general three responses according to the probe response order of the adequate AP. we consider hear six scenarios for six handoff execution.Scenario1, scenario2 and scénario5: we suppose that the adequate signal is received during Scan of the first channel (Half-time); In this case, the scan of the third and the secondchannel is not necessary.Scenario3, scenario4 and scénario6: means that the adequate signal is received on the second channel (Half-time). In this case, the scan of the third channel is not necessary.It is clear that there is significant decrease of handoff latency by proposed models.

1 2 3 4 5 60

50

100

150

Hand

off l

atenc

y (c

lock c

ycle)

Initialization numbers of handoff

Basis model Model with reduced scan: Proposed Predictive model: Proposed

Figure 9. Handoff latency for the three models.

B. Synthesis results

In this context, we have exploited FPGA xilinx virtex II proenvironment. This environment allows the implementation of communications systems programmable circuits. The advantage of using FPGA circuits is essentially the possibility of re-scheduling of circuits. For our application, synthesis RTL is made using the ISE 8.1 of the Xilinx FPGA virtex II proenvironment. We achieved the synthesis of the three, developed approaches. The results of synthesis are shown in the following table.

TABLE II. SYNTHESIS OF MODELS.

Number of Slices

Number of Flip Flops

Nb of 4 input LUTs

Nb of bonded IOBs

Frequency MHz

Basis Handoff 782 604 1381 40 132

Reduced model 705 608 1313 40 124

Predictive model 1165 995 816 41 150

VI. CONCLUSION

Supporting user mobility in WLAN remains a challenging task, especially with the QoS requirements of applications necessitating bounded transmission delay. The handoff process is a complex mechanism, involving significant delay, which can be detrimental to QoS guarantees and theconvectional layer-2 handoff consumes more time in the channel-scanning process. Based on these observations, this paper aims at reducing the handoff delay in WLANs using a hardware method. By maintaining information on the surrounding access points and by delivering this information to the mobile nodes upon request, significant improvements can be achieved. Our results show that when the MT requests network using reduced scan or predictive approach, it may establish connection with more performance. The proposed mechanisms are compared with standard process for the conventional layer-2 handoff process. The handoff latency is significantly reduced. This is more suitable for real time applicationsWe adopted the high level design for the realization of the systems. The description was undertaken with the high description language: VHDL. ModelSim was used to check the behaviour of the system at the RTL level. Synthesis was undertaken using the ISE 8.1 of the FPGA environment xilinx virtex II pro, in order to evaluate the circuit performances.

REFERENCES

[1] M. Gast; 802.11 Wireless Network: The Definitive Guide, Second Edition, O’Reilly, 2005

[2] Fayza A. Nada; On using Mobile IP Protocols, Faculty of Computers and Information; Suez Canal University; Ismailia; Egypt; Journal of Computer Science 2 (2): 211-217, 2006

[3] H. Velayos and G. Karlsson; Techniques to reduce the IEEE 802.11b handoff time; In IEEE ICC, vol. 27, no. 1, June 2004, pp. 3844–3848.

[4] Arunesh Mishra, Minho Shin, William Arbaugh; An empirical analysis of the IEEE 802.11 MAC layer handoff. ACM SIGCOMM Computer Communications Review (ACM CCR), vol. 33, no. 2, April, 2003.

[5] Bob O’Hara, AI Petrick; IEEE 802.11 handbook – a designer’s companion, second ed., March 2005.

[6] IEEE Std 802.11-1997; Wireless LAN Medium Access control (MAC) and Physical Layer (PHY) specifications, (1997).

[7] A. Jain. Hando delay for 802.11b wireless LANs; Technical report. University of Kentucky, 2003.

[8] Y. Kim, H. Jung, H. H. Lee & K. R. Cho; MAC implementation for IEEE 802.11 wireless LAN, Router Technology, Department, Electronics & Telecommunications Research Institute, 2001.

[9] IEEE. Wireless LAN medium acces control (MAC) and physical layer (PHY) specifications, 1999.

2008 International Conference on Signals, Circuits and Systems

-6-

[10] IEEE. IEEE trial-use recommended practice for multi-vendor acces point interoperability via an inter acces point protocol across distribution systems supporting IEEE 802.11 operation, 2003.

[11] H. Velayos and karlsson G. Technique to reduce the IEEE 802.11b handoff time. In swedish National computer networking Workshop,2003

[12] IEEE 802.11, IEEE wireless LAN medium access control (MAC) and physical layer (PHY) specifications, Aug. 1999

[13] IEEE 802.11b, Wireless LAN medium access control (MAC) and physical layer (PHY) specifications: High-speed Physical Layer Extension in the 2.4GHz Band, IEEE Std 802.11b-1999

[14] Y. Kim, H. Jung, H. H. Lee & K. R. Cho, MAC implementation for IEEE 802.11 wireless LAN, Router Technology, Department,Electronics & Telecommunications Research Institute, 2001.

[15] XILINX, configurable Locallink CRC Reference Design, Nov, 2004[16] T. H. Meng; Design and implementation of an all-CMOS 802.11a

wireless LAN chipset, Communication magazine, IEEE, Vol.41, No.8, Aug. 2003.

SETIT 2004 International Conference: Sciences of Electronic,

Technologies of Information and Telecommunications March 15-20, 2004 – TUNISIA

Interopérabilité ETHERNET/WATM

Jamila BHAR; Ridha OUNI; Salem NASRI

Laboratoire d’Electronique et de Micro-Electronique (EµE), Faculté des Sciences de Monastir, Tunisie

[email protected]

Résumé— Parmi les besoins actuels dans le domaine de télécommunication, Nous distinguons le recourt à l’implantation des applications multimédias sur diverses architectures. Dans cet environnement hétérogène, une multitude de normes s’interfère interdisant l’interconnexion directe des réseaux. La complexité de l’interconnexion dépend de l’incompatibilité protocolaire des réseaux définis par la dissymétrie à chaque niveau de leurs modèles en couches. D’ailleurs, les passerelles sont les systèmes les plus complexes permettant l’interconnexion des réseaux. Cet article se dirige dans le cadre de l’interopérabilité des réseaux hétérogènes. La contribution principale de ce travail est le développement d’un mécanisme de conversion d’informations pouvant être échangées lors de l’interopérabilité Ethernet/WATM. L’interface proposée se charge de la gestion des procédures liées à la segmentation et au réassemblage des données.

La démarche suivie consiste en première étape à l’étude et à la spécification de l’interconnexion Ethernet/WATM. La deuxième étape a pour but de définir le flot de conception et la description des fonctions d’interconnexions. Dans la dernière étape, nous présentons les résultats acquis et nous mentionnons la possibilité d’entrevoir des nouveaux horizons pour optimiser l’approche proposée. Afin d’implémenter les fonctions élémentaires d’interconnexion, nous avons utilisé le langage de description VHDL et les outils de simulation et de synthèse V_system et FPGA_Adv.

Mots Clés: — Réseau, Interconnexion, Ethernet, WATM, VHDL.

1 INTRODUCTION La diversité des réseaux, l’orientation vers les

réseaux sans fils et le besoin de l’intégration des applications sur des architectures hétérogènes ont favorisé la tendance de la conception des systèmes d’interconnexion. Ces derniers permettent de fournir une large gamme de services multimédias et visent à homogénéiser l’environnement de communication.

Les tendances des recherches actuelles dans le domaine des réseaux s’orientent à l’exploitation de la diversité des réseaux. Ceci permet de profiter des avantages offerts par chacun et de développer des applications basées sur diverses architectures. L’étude et la contribution à l’interopérabilité des réseaux répandus avec ceux sans fils sont fortement demandées. Dans ce contexte, l’interfonctionnement Ethernet/WATM donne un exemple concret compte

tenu des caractéristiques et des performances de deux infrastructures.

Lors de l’interopérabilité entre les deux réseaux, de nombreux problèmes sont posés par l’hétérogénéité de l’environnement de communication. Les données transitant entre les deux réseaux utilisent des formats incompatibles. Les débits et les mécanismes de transmissions ainsi que les politiques de connexion sont propres à chaque réseau. Ce travail est une contribution à la conception d’un système d’interconnexion Ethernet/WATM. Nous nous intéressons à la spécification de l’interface cible ainsi que la conception d’un mécanisme de conversion de format de l’information.

Dans cet article, nous introduisons l’environnement de l’application. Puis, nous présentons les systèmes d’interfaçage entre réseaux hétérogènes. Nous décrivons, ensuite, le flot de

SETIT2004

conception à suivre pour le développement de ces systèmes. Enfin, nous présentons le mécanisme d’adaptation de format de données développé ainsi que les résultats de simulations et de synthèse obtenues.

2 ENVIRONNEMENT DE L’APPLICATION Chaque nouvelle technologie cherche à

satisfaire les perspectives désirées par l’usager. L’objectif du développement des réseaux (haut débit) WATM et Ethernet est de fournir une large gamme de services multimédias. En effet, Les applications, basées sur les technologies de réseau sans fil à large bande telles que WATM, suivent une importante croissance. Un grand nombre de prototypes de WATM a été développé. Plusieurs protocoles ont été exécutés afin de garantir une meilleure qualité de service et une bande passante maximale. L’inspiration de WATM à partir de l’infrastructure ATM permet de bénéficier des avantages de ce dernier, ce qui est très utile pour des applications multimédias. L’implémentation de l’IP sur WATM permet de bénéficier des avantages de IP et de WATM en même temps. D’une part, l'adressage IP est aisé et fortement répandu. D’autre part le réseau Ethernet permet l’interconnexion d’un nombre élevé de systèmes informatiques. Il est devenu le réseau le plus populaire utilisé par la quasi totalité des entreprises utilisant un réseau LAN. Le réseau Ethernet offre des performances de sécurité, une capacité importante de transmission et une facilité d’utilisation[12].

Ethernet

Serveur

Passerelle WATM

Figure 1. Interfonctionnement Etherne/WATMt

L’interconnexion de ces réseaux haut débit permet le support de plusieurs applications hétérogènes avec des performances suffisantes. Toutefois, l’interconnexion de ces deux réseaux pose des problèmes de réalisation. Ces difficultés proviennent des différences des architectures de communication des réseaux communicants. Nous

nous intéressons, dans ce travail, à l’hétérogénéité entre Ethernet et WATM en terme de format des paquets de données. Dans les deux paragraphes qui suivent, nous présentons les formats de paquets d’information de deux réseaux à interconnecter.

2.1 Format des cellules WATM

La transmission des cellules WATM se fait à l’aide du MPDU (MAC Protocol Data Units). Le MPDU est composé d’un ensemble des données utiles précédées d’une entête. Des groupes de recherche telles que ATM Forum et PRISM ont proposé et essayé des prototypes utilisant la structure de la figure 2 [9][4][7].

Nous nous intéressons dans ce travail à maintenir le choix du format de cellule ayant une taille de 56 octets. Cette structure permet de conserver la taille 48 octets de la charge utile utilisée dans le réseau ATM. L’ajout de champ CRC permet la protection contre les erreurs qui sont plus important pour une liaison sans fil. L’insertion de deux champs Cell_seq_Num et ‘contrôle’ est très importante. Le premier champ permet de contrôler la séquence des cellules. Il contribue, au niveau de la couche WDLC, à la détection et correction des erreurs. Le champ ‘contrôle’ est utilisé par la couche WMAC pour le contrôle et la supervision des fonctions liées à la couche d’accès au média.

Toutefois, la taille de cellule représente un inconvénient en cas de perte de trame de données car le réseau sera obligé de retransmettre une quantité d’information plus importante que s’il utilise des pico cellules. Pour assurer un transfert fiable des informations WATM, la couche d’adaptation AAL5 joue un rôle très important. Elle traite des paquets de données de tailles variables et multiples de 48 octets et assure la génération des cellules WATM [2]. La figure 2 montre le format des cellules WATM.

Figure 2. Format d’une cellule WATM

2.2 Format des trames Ethernet Chaque message, émis par une station source, est

diffusé sur tout le réseau. Seule la station destinatrice reçoit, stocke en mémoire puis traite le message. Ce dernier est découpé en trames Ethernet de taille variable de 46 à 1500 octets de données utiles [1]. Chaque trame comporte aussi deux champs d’adresses de destination et de source, appelées encore adresses physiques ou MAC. Plusieurs

Entête watm

2 octets

Entête ATM

4 octets

Données utiles 48 octets

Crc watm

2 octets

TypeGFC

Cell_seq_NControl

VCI

PLT CLP

HEC

SETIT2004

protocoles sont véhiculés sur Ethernet. Le champ type permet d’identifier le protocole au niveau des couches supérieures et par conséquent le format des données. La queue de la trame Ethernet est un champ CRC de 4 octets permettant le contrôle d’erreurs de transmission. Ethernet supporte plusieurs protocoles sur ses couches supérieures : IP sur sa couche réseau et UDP, XTP et TCP sur sa couche transport. TCP/IP s’adapte convenablement avec Ethernet permettant une grande capacité de transmission et un contrôle de trafic et de congestion. La structure de la trame Ethernet est représenté par la figure 3.

Figure 3. Format de la trame Ethernet

Pour l’adaptation des formats des données à

échanger, des procédés de segmentation et de réassemblage sont nécessaires. Ces mécanismes de conversion de format des données sont basés sur des fonctionnalités assurant dans un sens de trafic la transformation des données Ethernet en un ensemble de cellules WATM. Dans l’autre sens, l’opération inverse est réalisée pour convertir des cellules WATM sous forme d’une trame Ethernet.

3 SPECIFICATION DE L’INTERCONNEXION La diversité des réseaux en terme d’architecture

et de protocoles de communication nécessite l’utilisation des systèmes d’interconnexion pour permettre leurs interopérabilités. Ces systèmes appelés passerelles, sont chargées de la conversion de protocoles, de contrôle de flux et de l’acheminement des paquets. La complexité de ces fonctionnalités dépendent de la dissymétrie des protocoles mis en jeu à chaque niveau du modèle en couche des deux réseaux.

Le système d’interconnexion utilisé est constitué par un ensemble de mécanismes chargés des opérations d’émission et de réception des données. La conversion de format de trame nécessite l’intégration d’un ensemble de mécanismes faisant intervenir des mémoires et des fonctions de segmentation, de réassemblage et deux modules d’écriture et de lecture des données. La figure 4 montre une adéquation architecture-algorithme pour le mécanisme d’adaptation. La conception du mécanisme de conversion, devra respecter certaines

contraintes telles que les délais de transit et la taille de mémoire mis en jeu. Les mémoires sont utilisées pour stocker temporairement des informations reçues lors de la transaction des données entre les deux réseaux. Les unités de données sont mises à la disposition de ce système pour la segmentation ou le réassemblage avant d’être émises.

Figure 4. Architecture modulaire du mécanisme de conversion

La mémoire représente un élément essentiel

dans la conception d’une passerelle d’interconnexion. Elle joue le rôle d’intermédiaire entre les deux réseaux à interconnecter et participe à l’absorption de l’incompatibilité en terme de format de données et de débit. La DPRAM 128x32 utilisée est à double ports. Cette caractéristique offre la possibilité du fonctionnement en parallèle des états définies par le mécanisme. Les données peuvent être transférées sur des ports de 32 bits à l’aide des signaux DO (Data Out) et DI (Data In). Cette taille de port permet d’augmenter le taux de transfert de données. Deux signaux internes de statu sont définies pour indiquer les adresses de début et de fin de stockage. L’emploi de ces signaux facilite la gestion du mécanisme de réassemblage. Chaque signal est défini par 14 bits (figure 5) faisant intervenir les adresses début et fin de la plage mémoire utilisée.

Adresse « début »

14 bits

Adresse « fin »

14 bits

Figure 5. Format du registre Flag.

Les différents procédés intégrés dans ce système sont souvent complexes. Dans le cas général, ils sont très typiques à chaque application d’une organisation protocolaire.

Entête Ethernet 22 octets

Données De 46 à 1500 octets

CRC 4 octets

Préam-bule

7 octets

Délimit-eur

1 octets

Adr_D6 octets

Adr_S 6 octets

Type 2 octets

Trame Ethernet

Cellules WATM

Fin

Fin

Lect-ure

Segm-entation

Mémoires

Lect-ure

Réass-emblage

SETIT2004

4 ALGORITHME D’ADAPTATION

L’incompatibilité de point de vue de format de paquet exige au système d’interconnexion de transmettre les données au destinataire sous format compréhensible. Ceci nécessite la conversion des données. Le mécanisme de conversion peut être décrit selon trois états principaux : repos, réception (lecture/écriture) et conversion. Dans l’état de repos l’interface reste en état d’attente et de test en permanence de l’activation d’une demande de l’un des deux réseaux. L’état de lecture/écriture consiste à recevoir ou à transmettre des données à partir ou vers un autre réseau. Dans l’état de conversion, le mécanisme d’adaptation permet les modifications nécessaires pour transmettre des données dans le format adéquat du réseau destinataire.

L’algorithme développé est organisé en un ensemble de processus chargé chacun d’effectuer une tâche bien définie. Ces processus (séquentiels/concurrents) peuvent communiquer à travers des paramètres de sensibilités.

Figure 6. Algorithme d’adaptation de format de l’information

La figure 6 montre l’algorithme de conversion

de format faisant intervenir plusieurs MEFs. En effet, les trames de données émises à partir du réseau Emetteur sont reçues, puis stockées temporairement dans la mémoire. A la détection de la fin du message indiqué par le EOP (end Of Packet) la passerelle initialise une demande d’émission de données vers le réseau Destinataire. Dès qu’elle reçoit une confirmation, elle active un signal pour le début de segmentation ou de réassemblage de l’information stockée. Cette information est présente dans la plage mémoire limitée par deux adresses affectées chacune sur 14 bits du registre flag (figure 5). Pour indiquer le début ou la fin de l’émission ou de la réception nous avons utilisé les signaux à courte durée de transmission RTS et CTS. Il est à noter que grâce au fait que le RTS et le CTS sont des trames courtes, le

nombre de collisions est réduit, puisque ces trames sont reconnues plus rapidement par le destinataire.

Pour permettre une meilleure gestion de la communication et maintenir les performances de chaque réseau, une méthodologie de conception est nécessaire. les concepteurs proposent d’utiliser diverses approches méthodiques pour automatiser le flot de développement. Nous présentons dans le paragraphe suivant l’environnement de conception adopté pour ce travail.

5 ENVIRONNEMENT DE CONCEPTION 5.1 Flot typique de conception

Actuellement, la plupart des travaux se réalisent sur des niveaux permettant de réduire la complexité et le temps de conception. Ceci est dû au grand développement dans le domaine de la microélectronique, de l’informatique et des télécommunications. Cette évolution est accompagnée d’une apparition de nouvelles techniques de conception de plus en plus performantes. Ces techniques interviennent le long du chemin des données depuis le réseau, à travers des entités de traitement. Ce type d’approche de conception s’effectue selon une méthode hiérarchique descendante, appelée aussi conception top-down. L’approche descendante part du système en circuits puis sous circuits et évolue ainsi jusqu’au schéma composé de transistors en passant par différents niveaux d’abstraction. L’abstraction d’un composant est une description succincte qui supprime les détails d’implantation [6] [8][10].

Un flot de la méthode descendante est complété par l’ajout des étapes de validation. Le circuit modélisé peut être validé par mode de simulation à tous les niveaux de description. Cette opération est possible à partir d’un fichier de test nommé test-bench dans le cas de l’utilisation du langage VHDL. En effet, nous pouvons définir le flot de conception à partir de trois phases principales : il s’agit de la spécification, de la vérification et de la synthèse. D’abord, la spécification du système dans son environnement traduit, à l’aide d’un langage de description matériel ou HDL (Hardware Description Language), sa description à un niveau d’abstraction bien déterminé. La simulation du système permet de vérifier son comportement. Enfin, la synthèse permet le passage d’un niveau d’abstraction à un niveau plus bas, jusqu’au niveau "portes logiques" avant l’intégration sur FPGA ou ASIC [3]. 5.2 Langage de description

La sélection d’un langage se résume généralement à un compromis entre plusieurs critères de computation : la puissance d’expression

Repos

Demande de réception

Réception

Demande de conversion

Reass-emblage

Segm-entation

SETIT2004

du langage, les possibilités d’automatisation fournies par les modèles à travers le langage et les capacités supportées par l’outil. Pour évaluer les performances du modèle proposé, le langage de description d’architecture VHDL (Vhsic Hardware Description Language) a été choisi [11]. Le langage VHDL permet de décrire les différents états du mécanisme de conversion. L’utilisation de ce langage vise la réduction de la complexité et du cycle de développement, à travers les possibilités de description (RTL, Structurelle), de vérification à tous les niveaux d’abstraction et d’automatisation de la synthèse. 5.3 Outils de simulation et de synthèse

La vérification au niveau RTL(Register Transfer Level) aussi bien qu’au niveau "portes logiques" justifie le comportement du système pendant une phase avancée de la conception. Le but de la vérification du système est de voir la réaction de tous les signaux de sortie du système en fonction des différents états pris par les signaux à l’entrée. Le concepteur pourra alors déterminer si le comportement observé est en accord avec le cahier des charges.

Les outils de simulation (V-system) et de synthèse (FPGA_Adv) permettent aux concepteurs d’évaluer l’espace entier de conception : puissance des techniques utilisées, qualité d’implémentation, atteindre une implémentation optimale. Ceci est atteint en recherchant automatiquement le meilleur établissement des Machines d’Etats Finies (MEFs) et l’allocation des unités de conception. Quelque soit le niveau d’abstraction, la synthèse prend en compte différents objectifs d’optimisation, tels que la minimisation du délai, de la surface [5] ou bien plus récemment, de la consommation du circuit.

6 RESULTATS DE SIMULATION

Les résultats de simulation de notre description VHDL montre le comportement des différents signaux de données, de dialogue et de contrôle lors de l’échange des informations entre les deux profils de communication Ethernet et WATM. Le transfert des données entre les deux réseaux peut se dérouler d’une manière séquentielle ou concurrente. 6.1 Processus de Segmentation

La figure 7 montre la simulation de deux processus de lecture et de segmentation. En premier lieu, la figure montre l’acquisition d’une trame Ethernet initialisé par les signaux RTS et CTS. Les signaux CS_a1, WR_a1, AD_a1 et DI_a1 traduisent

l’écriture en mémoire de la trame lue sur le bus DI_a1.

En second lieu le processus actif est celui de segmentation de la trame et son émission en cellules WATM. Ces deux processus sont régis par plusieurs états concurrents et séquentiels. L’émission de chaque cellule est précédée par une demande et une confirmation à travers les signaux ‘RTS_Watm’ et ‘CTS_Watm’. La génération de la dernière cellule à transmettre au réseau WATM s’effectue selon la taille de données utiles qui reste. En général, elle est complétée par des bits de bourrages afin de respecter le format utilisé. Les derniers octets de cette cellule contients nécessairement les champs (CPCS-UU, CPI, Length et CRC) afin de permettre au niveau de la destination le reassemblage d’une unité de données de type AAL5. 6.2 Processus de réassemblage

La figure 8 montre l’acquisition des données WATM et le déroulement de la phase de réassemblage des cellules reçues. La procédure de réception des cellules s’initialise par le dialogue entre le réseau WATM et la passerelle, gérée par les signaux RTS_WATM et CTS_WATM. Durant cet état, les cellules WATM sont stockées en mémoire. Les charges utiles de l’information stockée sont ensuite réassemblées pour les envoyer ensuite au réseau Ethernet (DO_Eth). La passerelle gère la mémoire en lecture afin d’extraire la charge utile de la trame à émettre avec le rythme d’horloge CLK_Eth.

Dans certain cas, le processus de réassemblage passe à l’état de bourrage qui permet de respecter le format de la trame Ethernet. Ce processus s’achève par l’envoi du champ de contrôle ‘CRC_Eth’.

7 SYNTHESE DU SYSTEME

Les résultats de synthèse sont établis dans l’environnement de développement FPGAdvantage. Cet environnement permet l’implémentation des systèmes de communication sur circuits programmables. L’avantage de l’utilisation des circuits FPGAs est essentiellement la possibilité de la re-programmation du circuit. Ceci permet d’améliorer les performances de l’application à l’issu des tests d’expérimentation. Les résultats de synthèse montrent aussi le degré de complexité du système à concevoir. La synthèse est réalisée en imposant des contraintes à fin de minimiser le délai de propagation (temps critique) ou la surface d’intégration. Le délai (ciblé sur la technologie AMS(Austria Mikro Systeme)) peut être optimisé pour améliorer les performances de la passerelle en

SETIT2004

terme de rapidité ou fréquence de fonctionnement atteinte.

Figure 7. Simulation du processus de la segmentation d’une trame Ethernet

Figure 8. Simulation du processus de réassemblage des cellules WATM

Réception de cellules WATM

Démarrer réassemblage (signal interne)

Génération de l’en-tête Ethernet

Emission trame Ethernet

Stockage de données Ethernet en mémoire

Emission d’une cellule WATM

Dialogue avec l’Ethernet (demande-réponse)

Dialogue avec WATM (demande-réponse)

SETIT2004

Pour notre application, la synthèse RTL est faite à l’aide de l’outil LenordoSpectrum de l’environnement FPGAdvantage. les résultats de synthèse donnent une estimation sur les performances du circuit cible. Ces performances sontévaluées en termes de nombre de générateurs de fonction (Function generator FG). Les résultats de synthèse donnent une idée sur les possibilités d’implémentation sur FPGA. Nous remarquons par exemple que l’implémentation sur un seul FPGA de type 4036xlBG352 est possible. Pour les autres types, l’implémentation nécessite plusieurs circuits FPGA dont leur capacité permet la programmation du système conçu. Ce ci dépend notamment du nombre de module introduit par l’algorithme. Cette solution de partitionnement peut engendrer des délais supplémentaires à causes des interconnexions entre les différents FPGAs. Table 1. Résultats de synthèse en vue d’intégration sur circuit programmable

(Xilinx famille 4000)

FGs HFGs IOs Circuit

Disp Utilis Disp Utilis Disp Utilis 4010PQ208 800 438.00

% 400 183.75% 160 94.38%

4013xlPQ160 1152 208.68

% 576 155.73% 112 134.82

% 4013PQ208 1152 299.65

% 576 126.56% 192 78.65%

4036xlBG352 2592 92.75% 1296 69.21% 256 58.98%

Il est donc très important de fixer le bon choix

de la technologie permettant d’obtenir des résultats plus intéressants et d’avoir plus en détails les caractéristiques (fréquence, surface, consommation etc..) pour une solution de prototypage.

8 CONCLUSION

Dans cet article, nous avons proposé des algorithmes permettant l’adaptation de format des informations pouvant transiter entre les deux profils de communications Ethernet et WATM. Ces algorithmes intègrent des mécanismes de traitement des données à savoir la réception, l’émission, la segmentation dans un sens du trafic et le réassemblage dans l’autre sens. Nous avons adopté la conception de haut niveau pour la réalisation du système. En effet, la description été entreprise avec le langage de haut niveau VHDL. ModelSim de l’environnement FPGAdvantage et V-system ont été utilisé afin de vérifier le comportement du système au niveau RTL. L’étape de synthèse a été entreprise

à l’aide de l’outil LeonardoSpectrum de FPGAdvantage afin d’évaluer les performances du circuit.

Ce travail se présente comme la brique de base dans la conception d’une passerelle d’interconnexion Ethernet-WATM. La fonction réalisée actuellement permet les conversions de format des paquets échangés. Plusieurs travaux sont en perspectives permettant des fonctions liées à la fiabilité de transfert et à l’acheminement des paquets.

REFERENCES [1] Histoire et évolution d’Ethernet ; Réseaux hauts débits ;

Hervé GILBERT ; Université Jean Monnet Saint Etienne Novembre 1999.

[2] An Adaptative Data Link Layer Protocol for Wireless ATM Networks ; Sunil Jagannath ; Department of Electrical Engineering and Computer Science; University of Mysore India 1994.

[3] FPGA et Parallelisme ; Frédéric Magniette, Olivier Martin ; DEA Informatique Université Paris XI – Orsay ; Janvier 1998.

[4] Design and Performance of Radio Access Protocols in WATMnet, a Prototype Wireless ATM Network; P. Narasimhan, S.K. Biswas, C.A. Johnston, R.J. Siracusa & H. Kim; C&C Reserch Labs, NEC USA.

[5] Interoperability of ATM – Ethernet Interworking System : Design and Congestion Control. R.Ouni, S.Adel, N.Salem and all ; Laboratoire d’EµE, Faculté des Sciences de Monastir, Institut National Polytechnique de Grenoble (INPG). ECUMN’2000 Institut Universitaire de technologie de Colmar.

[6] Thèse : Conception d’un système d’interface pour l’adaptation de protocoles de communication entre réseaux locaux : Application à la conception d’une passerelle Ethernet-ATM ; OUNI Ridha ; Université du centre Faculté des sciences de Monastir Février 2002.

[7] A protocol Aided Concatenated Forward Error Control for Wireless ATM. Jong Park, Departement of Electrical Engineering Korea Military Academy; James Caffery, Departement of ECECS University of Cincinnati; IEEE-2002.

[8] Thèse : Développement d’une Méthodologie de Conception Matériel à Base de Modules Génériques VHDL/VHDL-AMS en Vue d’une Intégration de Systèmes de Commande Electriques ; Youssef KEBBATI ; Université Louis Pasteur – Strasbourg ; 2002.

[9] Implementing distributed and dynamic resource allocation in WATM; Christian Sinner*; Michael Wolf**; *Siemens, Research and Predevelopment; **DaimlerChrysler, Research and technology; Germany; Computer Networks 1999.

[10] Thèse : Intégration des fonctionnalités multimédia dans les systèmes répartis temps réel : Application au système de communication industrielle ; SOUDANI Adel ; Université du centre Faculté des sciences de Monastir Février 2003.

[11] Modélisation de systèmes intégrés Numériques : Introduction à VHDL ; Notes de cours à option 2ème cycle version 2001 ; Alain Vachoux.

[12] Gigabit Ethernet; Vijay Moorthy; http//www.cis.ohio-state.edu/~jain/cis788-97/gigabit_ethernet/index.htm 2000.

Improvements of the ABR loop performances in a wireless ATM network

Jamila BHAR, Ridha OUNI, Abdelhamid HELALI, Salem NASRI Electronic and Micro-Electronic (EµE) Laboratory,

Faculty of Sciences of Monastir, Tunisia {jamilabhar; ridha_ouni}@yahoo.fr

Abstract There were a number of research activities to promote multimedia and wireless applications rate. Efficient flow and congestion control mechanisms are needed in high-speed networks to meat the new constraints and to offer best quality of service. Mechanisms founded on the rate adjustment had a particular interest. Wireless ATM technology, based on a number of wired ATM protocols and services, is considered a solution for these requirements. It provides multimedia services to mobile users and promises a support of quality of service (QoS). Otherwise, the WATM performances depend on the adopted mechanisms for flow and congestion control. So, several factors can influence this mechanism such as error probability on the wireless link and Handover procedure type. The ABR service, standardized by the ATM forum, is the most widespread traffic congestion control mechanism permitting to provide fair sharing resources. ABR specifications were designed to enable efficient bandwidth allocation and low cell loss ratio. This paper addresses the interaction among the flow control algorithm, the Handover procedure, and the resulting QoS characteristics. We present a novel ABR congestion control algorithm which is adaptive to changing network conditions and robust to terminal mobility. The objective of this algorithm is to achieve a high utilization factor and to maintain the compatibility between the wired and wireless link constraints. Therefore, it was important to develop the necessary mobility enhancements, such as handovers and radio resource management. This approach guarantees the development of an effective control strategy for the congestion control mechanism. Keywords Wireless ATM, ABR, Handover, QoS 1. Introduction The goal of the ABR congestion control mechanism is to fairly share the bandwidth, left over from high priority services, by the ABR connections and to minimize cell loss ratio. The ABR service developed for ATM network cannot be the same used in the wireless ATM environment for various reasons. Indeed, there are supplementary

constraints such as the difficulty to predict the traffic characteristics for mobile terminals, bandwidth loss caused by the supplementary fields in the header, interference phenomenon and important bit error rate on a wireless channel. For these reasons and to provide uniformity of end-to-end quality of service (QoS) guarantees by wireless ATM, it is necessary to focus on the improvement of the existing ABR flow-control algorithms performances. In this paper, we present a robust adaptive congestion control algorithm for ABR service in Wireless ATM networks. The principal design objective was to show that this algorithm performs better with various criteria related to ABR loop characteristics and Handover procedure decision. We consider wireless ATM network environment. The underlying WATM architecture of our study is derived from WAND project prototype [10]. We specify the ABR service class. The flow-control algorithm is specified with two control loops spanning the links between a mobile terminal and its adjacent base station as well as the latter and a data source. We study the impact of handover schemes on this algorithm. Handoff procedure must be capable of dynamically reestablishing virtual circuits to new base stations (BSs) while ensuring minimal loss of data. This paper proceeds as follows. The first section presents the general implementation of ABR flow-control algorithms in a Wireless ATM network. The WATM protocol architecture is also proposed. The next section deals with different types of handovers proposed in the literature, and gives handover solution to support ABR loop performances. The last section shows and evaluates simulation results. Conclusions are stated and issues for future research are discussed. 2. ABR flow-control in a Wireless ATM

network The network supervises without interruption the traffic and provides the feedbacks for the source terminal system. There are many rate-based congestion schemes. ERICA is used as the well-known algorithm [5]. For an ABR connection, information carried in ABR Resource

0-7803-8656-6/04/$20.00 ©2004 IEEE

Figure 1. Structure of VS/VD node

Management (RM) cells is primarily generated by ABR source end systems. The destination end system turned then the information received. The feedback information can be modified from the destination or/and switch traversed. Indeed, a switch along the path can specify explicitly the maximal supported cell transmission rate using the explicit rate (ER) field of an RM cell. For this purpose, it evaluates the bandwidth requirements of all assigned ABR connections, calculates a fair share of the available bandwidth and distributes it among all active ABR connections traversing the corresponding link. Before returning RM to the source, the ER in the RM cell is compared with the calculated ER value. As a consequence of the feedback mechanism, the source can adjust its rate according to this information. When the source receives the RM cell, it sets its current cell rate (CCR) to the ER in the RM cell. This last is periodically inserted into the stream of ABR data cells. RM cells that flow from source to destination are referred to as Forward RM (FRM) cells and RM cells that flow from destination to source are referred to as Backward RM (BRM) cells. The control cells FRM or BRM have the same cell data format. If the switch or the destination is congested they can send a BRM cell without waiting for the FRM cell. In this case, this cell is called OOR (Out Of Rate). The goal is to inform the ABR sources much faster about the congestion. It is distinguished by the BN (Backward Notification) field of the RM cell. Under circumstances such a WATM it is advantageous to divide the control loop into several coupled smaller loops by introducing virtual sources (VS) and virtual destinations (VD). The virtual sources and destinations have the following properties: Each control loop behaves in the same manner as a separate ABR loop. This VS/VD approach has the advantage to improve the response of the controls subject to changing ABR capacity.

Wireless ATM network is composed by Mobile Terminals (MTs), Base Stations (BSs) and switch. As shown in figure 2, BS is specified with mobility enhanced UNI/NNI and radio interface capabilities that provide the interface between the wired and the wireless portions of the network. Switch and BSs are wired together and represent the fixed network segment. Each BS communicates with all the MTs in its corresponding macro area. A number of BSs can be connected to the same switch. In the protocol stack, radio interface between the BS and the MT comprises the Radio Physical Layer (RPHY), the Radio Multiple Access Control Layer (RMAC) and the Radio Logical Link Control Layer (RLLC). It globally referred to as the Radio Access Layer (RAL). The end terminals require AAL Layer functions for end to end virtual connection. However, BSs and Switch support the ATM layer and can extract or insert handover protocol cells from/into the connection data flow [8; 10]. For the segmented ABR loop applied in wireless ATM environment, the base station acts as a Virtual Source (VS) and Virtual Destination (VD) pair. The base station consists of the part of deciding how to calculate ACR of loop2 and ER of loop1 (figure 1) [7]. In proposed mechanism, the BS with VS/VD system generate FRM cells to terminals and determines the ACR according to the CI/NI bits but also according to rules bellows: ACR is function of (CI, NI, ER, ACR) • If (CI='0' and NI='0') then ACR=min(ER,

ACR+RIF*PCR, PCR) • If (CI='1' and (NI='0' or NI='1')) then ACR=min(ER,

ACR-ACR*RDF, MCR) • If (CI='0' and NI='1') then ACR=min(ER, ACR) The adjustment of ER value is based on different parameters such as ER in BRM, CCR but also ACR of loop 2. The VD sends an OOR RM cell to ABR source when receiving a congestion indication from loop 1.

Figure 2. Protocol Stacks of Network Nodes

Wireless Channel

ABR

Source Base

station

ABR

Destination 1st Loop 2nd Loop

3. The Handover solution In systems such WATM, terminals will frequently change their attachment access point in the network due to movement of the WT(Wireless Terminal). When this occurs, the WT’s active connections must be transferred to the new base station, so that connectivity is maintained. In order to maintain desired quality of service (QoS), this work is focused on the handover scheme that allows a reliable control of connection’s transfer. Handover concerns all activities that can appear following the mobility of the terminal between the different zones covered by base stations such as : • The measure of the wireless channel parameters for

the current transmission. • The Handover procedure initiation. • The selection and the measure of the new wireless

channel parameters. Different handover schemes have been proposed for WATM. There are many works that have studied various aspects of the WATM handover requirements. Evaluations of the different proposals are though closely related to find the handover procedure that suit better with WATM constraints. The following is a description of handover algorithm working. Some details are omitted, and may be found in [1, 2, and 3].

a. Soft Handover: In this case, the handover can be predicted and MT initiates the handover procedure via the new BS. The mobile terminal connections are passed to the new base station without interrupting communication with the old base station. Indeed, data and control messages are transferred on the connection through the new BS before the old one is released. After a short time period the old connection is released.

b. Hard Handover: In this case, the handover occurs when the connection to the current BS is broken. The connections are interrupted at the old base station and re-established through the new base station. Indeed, the new BS is contacted first before the handover initiation is finished. The connection held by the old BS is released before the connection to the mobile through the new BS is established. Soft and Hard handovers are specific for each situation. They will be introduced according to sums criteria. The choice of handover type is then based on the network conditions. Regarding data communication, the corresponding handover procedures have to guarantee the sequence integrity and loss-free delivery of WATM cells during the transition process. In fact, we study the handover procedures impact on the efficiency of the ABR flow control protocol. During handover control messages are exchanged between base station and mobile terminals and between base stations themselves. These messages handle functions as connection and disconnection state transfer during handover. Handovers are typically initiated by MTs, but WATM networks should also be able to trigger handovers for network management purposes. The mobile terminal announces the beginning of its handover a short period before the real handoff procedure occurs. In this stage, an

OOR-RM cell is sent to the virtual source to update the ER. These recent information permit the adaptation of rate in the new BS to avoid congestion. In this paper, we specified the source, the destination and the switch behaviours. We defined how a virtual source should behaves in response to BRM information and also how ABR loop is coupled with the flow control factors as well as the handover procedure for mobile terminals. Our strategy is to select one handover procedure and compare performance result on the ABR control protocol for different proposal schemes. This proposed solution is chosen for its flexibility and fairness properties. Consequently, the rate-based flow control algorithm is formulated as a dynamic problem where the goal is to evaluate if the ABR feedback control scheme ensures its QoS objective and improve flow control performances. 4. Results The most important criteria that a successful handover protocol for an indoor wireless ATM must fulfil are: Minimal Service Interruption, No Cell Reordering or Duplication and Minimal Cell Loss, QoS Maintenance, Maintaining the Cell Sequence, Robustness and Stability. This outcome is expected since the fast response of this scheme is guaranteed by sending BRM cells with recent information about the status of the wireless link between the new BS and the MT. This information is useful to set a connection as soon as the MT can reach its new BS during a handover. The performed simulation experiments allowed evaluating the efficiency of the ABR flow-control protocols ERICA with and without the VS/VD concept for a WATM environment. Particularly, the impact of different handover schemes (hard and soft handover) and the BS behaviour on ABR loop is evaluated. The ability of algorithms developed to achieve fairness in some interesting situations is investigated. For simulation, we used a dual port memory DPRAM128x32. To guarantee write and read operations managing, we developed a control mechanism for concurrent actions in the memory. We are mainly interested in the stability of the data flow and the influences of combined handover event in the ABR loop. Figure 3 shows the behavior of virtual source and virtual destination. Simulation results show that the BS with VS/VD behaviour informs the source with recent information faster than with one ABR loop. If we compare the hard and soft handover procedure on ABR loop, we note that there is a difference on the procedure during and on the delay to inform the BS to allocate the necessary terminal resources. Selecting one handover type is related to degree of network condition degradation. This strategy permits to establish the efficient reaction with minimal loss. 5. Conclusion In this paper we proposed and evaluated an ABR flow control algorithm for a Wireless ATM environment. This

Data cells Reception of FRM cell

Figure 3. VS/VD behavior of BS

algorithm ameliorates the congestion control performances by adding new constraints to the ABR loop. Results obtained justify that it is important to consider suitable handover protocols in order to maintain QoS parameters. The proposed mechanism supports optimum Handover procedure when required. Thus, it minimizes the total execution time of handovers. An additional advantage is focused on the same actions performed during soft and hard handovers. This characteristic facilitates the implementation of the required functional entities. In conclusion, the impact of handover protocols on WATM performances over ABR service class is considerable and provides an alternative approach that requires further studies. The aim of handoff signalling is to enable wireless terminals to move seamlessly between BSs while maintaining connections with their negotiated QoS. For this purpose, there is a close inter-working with the connection management and rerouting functions of the BS. The format of signalling messages exchanged at handover procedure may be also optimised to guarantee Qos requirements. Therefore, the employment of ARQ scheme will reduce the cell loss rate due to the error characteristics of the wireless link. The future work will adopt a rerouting scheme for proposed handoff procedure. The proposed handover mechanism can also be developed to support inter-switch handovers. References [1] Adaptation of the Fuzzy Explicit Rate Marking to ABR flow-control in wireless ATM Netwok; Michael Savoric, Department of Electrical Engineering Technical University of Berlin; Udo R.Krieger, Deutsche Telekom AG Technologiezentrum Am Kavalleriesand Germany. MMB 99, Trier, September 1999. [2] The Impact of Handover Protocols on the performance of ABR flow-Control Algorithms in a Wireless ATM Network; Michael Savoric, Adam Wolisz, Department of Electrical Engineering TU Berlin Germany; Udo R.Krieger, T-Nova Deutsche Telekom, Am Kavalleriesand Germany. European Transactions on Telecommunications (ETT) Journal, July-August 2000.

[3] Performance evaluation of Handover protocols for data communication in a Wireless ATM network; Udo R.Krieger and Michael Savoric; ITC16, Edinburgh, June 1999. [4] ABR Traffic Congestion Control Mechanism with VS/VD in Wireless ATM Networks; Moonsik Kang, Sangmin Lee, Department of Electronic Engineering, Kangnung National University Kangwon Kangnung Korea; 2000. [5] ERICA Switch Algorithm : A Complete Description, ATM Forum/96, Raj Jain, Shiv Kalyanaraman, Rohit Goyal, Sonia Fahmy, Ram Viswanathan; The Ohio State University Department of CIS Columbus; http://www.cis.ohio-state.edu/~jain/ [6] Source Behavior for ATM ABR Traffic Management: An Explanation; Raj Jain, Shivkumar Kalyanaraman, Sonia Fahmy and Rohit Goyal; Department of Computer and Information Science; The Ohio State University; and Seong-Cheol Kim; Samsung Electronics Co. Ltd.Chung-Ang Newspaper Bldg; 1996 [7] Design considerations for the virtual source/virtual destination; VS/VD feature in the ABR service of ATM networks; Shivkumar Kalyanaraman; Raj Jain; Jianping Jiang; Rohit Goyal; Sonia Fahmy; Department of Computer and Information Science, The Ohio State UniÕersity, Columbus, USA; June 1998 [8] Local and Global Handovers Based on In-Band Signaling in Wireless ATM Networks; M.AJMONE MARSAN; C.F.CHIASSERINI; A.FUMAGALLI; R.LO CIGNO and M.MUNAFÒ; Wireless Networks,2001 [9] Microcellular Handover in Wireless ATM; Fan Jiang ; Timo Käkölä; Proceedings of the 32nd Hawaii International Conference on System Sciences – 1999 [10] Implementation of the wireless ATM access terminal; Juha Ala-Laurila; Jussi Lemilainen; Nokia Wireless Business Communications, Computer Networks; 1999.

Data cells memorized

VS

VD

RM cell filtered

Emission of BRM cell

Emission of FRM cell

Reception of BRM cell