Cmjv03i02p0159

Page 1

J. Comp. & Math. Sci. Vol.3 (2), 159-165 (2012)

Packet Scheduling and Traffic Control in Wireless Networks SRI KRISHNA CHAITANYA J1 and MANI KANDAN. N2 1

Student, M.S (SE), School of Information Technology, VIT University, Vellore, India. 2 Assistant Professor, School of Information Technology, VIT University, Vellore, India. (Received on: February 27, 2012) ABSTRACT Improvement in the wireless network in recent years is very high; it becomes flexible and low-cost alternative to wired communication infrastructure. Wireless networks are different from wire line networks in errors depending on the location and time varying channel capacity. Scheduling algorithms supports the Quality of Support and guarantees for wireless networks. The wireless channel is bandwidth-limited and highly variable. The scheduling algorithm must be supported by admission control and congestion control, In order to provide guaranteed service to hosts. Performance of packet can be done effectively by the topology of network we will use. Normally Quality of Service will be achieved by queue scheduling mechanism and guaranteed service for completing reservation can be achieved by priority RR algorithm. In this study we will try to implement an algorithm which we combine both algorithms which is optimized for better scheduling of packet in wireless networks which will provide long term fairness for error free networks, channel utilization should be high, minimizing packet loss, delay bound for error free networks, multiple channels of traffic with Quality of Service. Keywords: Wireless networks, packet scheduling, traffic control.

1. INTRODUCTION Now days, people are using wireless networks to transmit data from one node to another node in a cluster. Normally they will use the technologies like broad bands, WIFI, WI-Max, Zigbee, and Mobile-Fi etc.

These wireless technologies will be used to provide quality of service (QoS), minimal time for transmission of packet in the cluster, traffic control in wireless networks. First time wireless telegraph was sent in 1896 by Marconi. In 19th century wireless networks were used in radios. After that

Journal of Computer and Mathematical Sciences Vol. 3, Issue 2, 30 April, 2012 Pages (131-247)


160

Sri Krishna Chaitanya, et al., J. Comp. & Math. Sci. Vol.3 (2), 159-165 (2012)

those were using in TV, Mobiles. The transmission of wireless signals will be in two ways. a) Analog signals b) Digital signals7. In 1st generation cellular and mobile phones people used analog technology. In current version we are using digital technology to provide better reception, security, value added services. There are so many technologies will be used for providing wireless connections10. Those are a) Broad Bands b) Blue tooth c) Wi-Fi d) Wi-Max e) Zigbee f) Mobile-Fi We need new technologies to provide Service Quality, traffic control and guarantee in wireless networks1. Normally problems occur in wireless networks are in the following a) High error rates b) Location dependent and time varying capacity c) Bandwidth d) User mobility e) Power constraint of mobile host Recently, there are so many proposed techniques and algorithms for scheduling of packet and traffic control in wireless networks. All those are interested in integration of wireless and wire line networks. In this work, we will study a new technique only on wireless networks, which exactly on wireless link models. 2. RELATED WORKS There are various algorithms exists to perform this operation. Every algorithm has its merits and demerits CSPDS- channel state dependent packet scheduling3. For each mobile’s packet a separate queue is

maintained. Within one queue, packets are served in an FIFO order. Across the queues the service policy could be decided according to service requirements. The link state monitor (LSM) monitors the link states for all mobile hosts. When the LSM determines that a link is in a bad state, it marks the affected queues. The scheduler does not serve the marked queues. The queue is unmarked after a time-out period, which may, for example, be the average link “error” duration. A link is considered being in a bad state when the acknowledgment for a data packet from the mobile is not received13. CSPDS+CBQ-CSPDS with class based queuing CBQ is a set of hierarchical channel-sharing guidelines for ensuring that classes receive their allocated share of bandwidth over a predefined time scale9. It also aims to distribute the excess bandwidth in a fair way. CBQ keeps track of the amount of service received by each class in a certain time-interval window. A class is called unsatisfied if it has persistent backlogs, and the service it recently received is less than its allocated fraction. The channel-sharing guideline of CBQ is that a class should be restricted from receiving service when it exceeds its allocated bandwidth share and contributes to any other class’ unsatisfied state. Such a queue is called a restricted queue6. IWFQ-idealized wireless fair queuing An IWFQ model is defined with reference to an error-free WFQ service system. Given the packet arrival sequence for each data flow, an error-free service is defined as the WFQ service for the flows with identical arrival sequences and completely error-free links. The service

Journal of Computer and Mathematical Sciences Vol. 3, Issue 2, 30 April, 2012 Pages (131-247)


Sri Krishna Chaitanya, et al., J. Comp. & Math. Sci. Vol.3 (2), 159-165 (2012) (201

received by a flow in the IWFQ system (with link errors) is compared with the error errorfree system. A flow is said to be leading, lagging, or in sync at any time instant if its queue size is smaller than, larger than, or the

same as the queue size in the error-free error system11. CIF-Q-channel channel condition independent packet fairing queuing Comparison of the Algorithm Properties1.

Table 1 comparison of scheduling algorithms1

3. SYSTEM MODEL Presently existing system consists of nodes which all are connected with wireless network to base station and base station will be connected with wired network to the host. In this type of systems the packet will be transmitted in between host and base station as upload and download flow. There are so many algorithms to give explanations planations about the wireless network models.

161

Figure 1 wireless network model [2]

Journal of Computer and Mathematical Sciences Vol. 3, Issue 2, 30 April, 2012 Pages (131-247 7)


162

Sri Krishna Chaitanya, et al., J. Comp. & Math. Sci. Vol.3 (2), 159-165 (2012) (201

In this paper, we will discuss about the algorithm which will provide packet scheduling as well as control of packet in the traffic and priority to the packet to which node the presently routing packet in the network should deliver and also the node which receives the packet should deliver the report to the sender node. In this proposed system we will use the wireless link model where all base stations and hosts are connected ected by wireless networks. Here we will use all wireless networks to provide packet routing in the network. In this algorithm we should also find the shortest path from the sender node to destination node to know about the topology in which all nodes are interconnected. In this wireless link model there are only two states named as good and bad, where good state will tell about the error free flow of packets and bad state will tell about the error flow of packets. When a packet is delivered into a network which was proposed, then that packet will be prioritized to which node it has to sent first based on the priority given by that node. After prioritizing the packet, the packet should be scheduled based on the

priority given by that node. Two packets in the he network will not be sent to a single node at a given point of time. If this happens in a system then there should be a collision of packets which will be controlled in the network by applying any traffic control algorithm. This will be achieved by the proposing roposing system. All three works will be done in a single existing system.

Figure 2 wireless link models

4. SYSTEM ARCHITECTURE

Pn pack

Prioritizing system

Pr packe

Scheduling system

Sc packe

Controlled System

Cs packet

Fig.3 CIF scheduling with Priority algorithm

In this figure, Pn packets refers to set of packets delivered for prioritizing

Pr packets refers to set of prioritized packets delivered for scheduling Sc packets refers to set of scheduled packets delivered for controlling

Journal of Computer and Mathematical Sciences Vol. 3, Issue 2, 30 April, 2012 Pages (131-247 7)


Sri Krishna Chaitanya, et al., J. Comp. & Math. Sci. Vol.3 (2), 159-165 (2012)

Cs packets refers to set of prioritized, scheduled and controlled packets delivered into network 4.1 Prioritizing system Prioritizing will give the preference to a particular packet. When we give a high priority then the packet will be send first, low priority packet will send later after delivering of the high priority packet. There are so many algorithms for prioritizing a packet. We can use FIFO, priority algorithm, round robin algorithm etc. Here we will go for developing round robin algorithm because packet should be travelled based on the time delay in the channel. The packet also should collapse after reaching the correct destination to provide security in the channel. So that no one knows the data in the routed packet. We can form a queue with all packets, in that we will perform sorting based on the time given for packet for routing. Based on that time packet should route in the network and it should use the shortest distance in the network from the sending node to receiving node. 4.2 Scheduling system In the scheduling system we will schedule the packet in the network based on the time in the packet as well as the priority of the packet. For that we should use priority algorithms, after that we will schedule the packets. 4.3 Control system After performing scheduling we can control the traffic in the channel based on the time given to a packet. If we send only

163

one packet to the network for routing then we don’t have much traffic in the channel. We can control the traffic like this. We also control the packets in the network by placing the packets in the queue. 5. RESULTS AND DISCUSSIONS We can summarize the algorithms using in this work. In this work we will use so many algorithms which all are proposed previously for scheduling, traffic control and priority. Those algorithms are used to provide the scheduling or traffic control or priority but now we are going to develop an algorithm which will be used for all these three futures. There are so many another works regarding wireless networks. For the sake of completeness and for the sake of reliability we can propose so many works. We believe the following is the set of objectives that a good packet scheduling as well as traffic control algorithm should try to achieve. 1) 2) 3) 4) 5)

High wireless channel utilization Minimizing packet loss Providing priority to the packet Provide error free links Providing medium algorithm complexity

We can apply our proposed algorithm to an example which will describe very easily. We will take traffic in India as an example. The general public should have all traffic rules. Traffic police should give priority to the government people like ministers. They should stop the public when a minister travelling from one place to another place. This will be done in the priority system. When they are going on a

Journal of Computer and Mathematical Sciences Vol. 3, Issue 2, 30 April, 2012 Pages (131-247)


164

Sri Krishna Chaitanya, et al., J. Comp. & Math. Sci. Vol.3 (2), 159-165 (2012)

road the general public should not travel in that direction. After that they should schedule the direction of the travelling of minister. So that at every junction or at traffic signals they should schedule the time and give the correct way to him. After that they should control the traffic in that way so that minister or higher officials can travel very easily. In this way we can summarize our algorithm in a general way. 6. CONCLUSION By using this proposed approach, we can easily schedule, control and prioritize the packets so that we can send them in the minimized time in a very nearest path. So we can develop this algorithm very easily. This approach will reduce the time and cost factors of the system. In future, Wireless channel is bandwidth limited and highly variable. The proposed scheduling algorithm should be supported by congestion control as well as admission control. The performance of scheduling algorithm should be based on those two components. We can study how to improve an optimized algorithm which will satisfy those two components and provide packet scheduling too. 7. REFERENCES 1. YAXIN CAO AND VICTOR O. K. LI, FELLOW, IEEE,” Scheduling Algorithms in Broad-Band Wireless Networks” 2. J. Wroclawski, “The use of RSVP with IETF integrated services,” RFC2210, Sept. (1997). 3. S. Blake et al., “An architecture for differentiated services,” RFC2475, Aug. (1998).

4. “How Optimal are Wireless Scheduling Protocols?” 5. Chen, S., and Park, K. An architecture for non cooperative QoS provision in many-switch systems. In Proc. IEEE INFOCOM '99, pp. 864-872 (1999). 6. M. Andrews, K. Kumaran, K. Ramanan, A. L. Stolyar, R. Vijayakumar, and P. Whiting, “CDMA data QoS scheduling on the forward link with variable channel conditions,” Bell Labs., Murray Hill, NJ, Tech. Rep., Apr. (2000). 7. P. Bender, P. Black, M. Grob, R. Padovani, N. Sindhushayana, and A. Viterbi, “CDMA/HDR: A bandwidth efficient high speed wireless data service for nomadic users,” IEEE Commun. Mag., Vol. 38, No.7,pp.70–77, Jul. (2000). 8. R. Berry, “Power and delay optimal transmission scheduling: Small delay asymptotics,” in Proc. IEEE Int. Symp. Inf. Theory, Yokohama, Japan, 29 Jun.– 4 Jul, p. 426 (2003). 9. R. Berry and R. Gallager, “Communication over fading channels with delay constraints,” IEEE Trans. Inf. Theory, Vol.48,No.5,pp.1135-1149, May (2002). 10. D. Bertsimas, I. Ch. Paschalidis, and J. N. Tsitsiklis, “Asymptotic buffer over flow probabilities in multiclass multiplexers, part II: The GLQF policy,” MIT LIDS, Cambridge, MA, Tech. Rep. LIDS-P-2342, (1996). 11. D. Bertsimas, I. Ch. Paschalidis, and J. N. Tsitsiklis, “Asymptotic buffer over flow probabilities in multiclass multiplexers: An optimal control approach,” IEEE Trans. Autom. Control, Vol.43,No. 3, pp. 315–335, Mar. (1998). 12. T. Bonald, S. C. Borst, and A. Proutiere, “How mobility impacts the flowlevel

Journal of Computer and Mathematical Sciences Vol. 3, Issue 2, 30 April, 2012 Pages (131-247)


Sri Krishna Chaitanya, et al., J. Comp. & Math. Sci. Vol.3 (2), 159-165 (2012)

performance in wireless data systems,” in Proc. IEEE Infocom, Hong Kong, Mar. Vol. 3, pp. 1872–1881 (2004). 13. S. C. Borst, “User-level performance of channel-aware scheduling algorithms in wireless data networks,” in Proc. IEEE Infocom, San Francisco, CA, Jun., pp. 321–331 (2003). 14. G. de Veciana and J. Walrand, “Effective bandwidths: Call admission, traffic policing and filtering for ATM

165

networks,” Queueing Syst. Theory Appl., Vol. 20, pp. 37–59, (1995). 15. A. Dembo and O. Zeitouni, Large Deviations Techniques and Applications, 2nd ed. New York: Springer-Verlag, (1998). 16. A. Eryilmaz, R. Srikant, and J. R. Perkins, “Stable scheduling policies for fading wireless channels,” IEEE/ACM Trans. Netw., Vol. 13, No. 2, pp. 411– 424, Apr. (2005).

Journal of Computer and Mathematical Sciences Vol. 3, Issue 2, 30 April, 2012 Pages (131-247)


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.