Mobility Management Schemes for WMNS Using Pointer Forwarding Techniques
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 6
Abstract
Abstract: The efficient mobility management schemes based on pointer forwarding for wireless mesh networks (WMNs) with the objective to reduce the overall network traffic incurred by mobility management and packet delivery. The proposed schemes are as per-user-based, i.e., the optimal threshold of the forwarding chain length that minimizes the overall network traffic is dynamically determined for each individual mobile user, based on the user’s specific mobility and service patterns. Wireless Mesh Networks (WMN’s) are achieving swiftly developing focus in current years, and are commonly recognized as an advanced option for nest era wirelessnetworks. Contrasted with regular wireless and mobile networks, eg .Wi-Fi based wireless networks and mobileIP networks, WMN’s have the advantages of low price, easy implementation, self organization and self healing, and being compatible with current wired and cordless networks by the gate way/bridge circuit feature of mesh network routers. A WMN is manufactured up of mesh network routers and mesh customers. In this paper two per-user-based mobility management schemes for WMN’s, namely, the static anchor method and dynamic anchor method. Both techniques are depending on pointer forwarding, i.e., a chain of forwarding pointer is used to trace the current location of mesh client. The optimum limit of the transmission sequence length is identified for very personal mesh client dynamically depending on the mesh client’s specific mobility and service pattern’s. paper illustrate that for both strategies, there exists on optimum limit of the transmission sequence length that reduces the overall network traffic received by mobility management and packet transmission when given a set of variables characterizing the particular mobility and service design of a mesh client
Authors and Affiliations
B. Mounika , A. Harathi , S. G. Nawaz , R. Ramachandra
Energy Consumption Algorithms on Green Computing Technology
Green computing is the eco-friendly technology for the environmentally responsible of computers and their resources usage. Green computing is also defined as the way that reduces their environmental impact on study of de...
Recapitulating the development initiatives of a robust information security safeguard: RITSB-the proposed solution
Most current information security systems performance vary with the nature of the filed its being operating. With an increased emphasizes on the adoption of security tools and technologies, the anomalies and &nb...
Advanced Redundancy Management Of Heterogeneous Using The Packet Dropper With Nodes For Multipath routing
Abstract: Developing a secured environment for detectingmalicious nodes in a heterogeneous wireless sensor network(HWSN).Here which is analysing the best redundancylevel using path redundancy and sourceredundancy.P...
Review of Ensemble Based Classification Algorithms for Nonstationary and Imbalanced Data
Learning data samples from a non-stationary distribution has been shown to be a very challenging problem in machine learning, because the joint probability distribution between the data and classes changes over time. Mos...
Novel Approach For Isolated Left Endobronchial Intubation With Single Lumen Tube In Paediatric Patients
Background: Right thoracoscopy requires selective left endobronchial intubation which is technically difficult and demanding. We are presenting our experience of selective left bronchus intubation without any guidance,us...