Demand-Aware Channel Scheduling To Achieve Better QOS in High Density Deployments 2016-2017
Demand-Aware Channel Scheduling To Achieve Better QOS in High Density Deployments 2016-2017
Demand-Aware Channel Scheduling To Achieve Better QOS in High Density Deployments 2016-2017
Chapter 1
INTRODUCTION
IEEE 802.11 Wireless LAN, commonly known as Wi-Fi is one of the greatest
prominent wireless communication tools advanced so far. The Unique form of the IEEE
802.11 standard was recognized in 1997 as a wireless network for wired LANs by means of
Ethernet technology. The significant achievement has run to the heavy deployment of
WLANs practically in all places. Since it is developed, the IEEE 802.11 specifications are
constantly developing to cover functionalities and few changes to the basic IEEE 802.11
standards. WLANs are extensively possible all over (apartment, municipal, industry and as
public hot spots). A wireless LAN (WLAN or Wi-Fi) is an information program organization
described to arrange location-independent agency to access among calculating devices by
means of transmission waves to moderate the cable framework. Effective 802.11 descriptions
[IEEE STD 802.11 (ISO/IEC 8802-11:1999)] as a common place designed for wireless LANs
was approved through an Institute of Electrical and Electronics Engineers contemporary
period in 1997. The indicated form of 802.11 gets intended at 1 Mbps and 2 Mbps data rates,
in addition, a stated essential inform systems for further work. In the commercial project,
wireless LANs are regularly carried out by the way of finishing network among the currently
supported system besides a set of user PCs, allowing these operators to wireless approach
towards the complete properties. In addition, the service areas about corporate net crosswise a
house. The extensive receiving of WLANs on business regulation guarantee to produce unity
and consistency between the numerous constructors. Similar to all IEEE 802.11 principles
work with the ground pair stages the ISO miniature, the physical layer also links layer.
Marginally LAN function, web OS, obligation, containing TCP/IP then Novell NetWare,
determination rush on 802.11 WLAN as well by the way of route above Ethernet.
The central dogma and advantage from Wireless LANs is enlarged flexibility. It is
released against typical network links; network operators can transfer most on the outside
limit and access LANs from near any place.
The further benefits for WLAN contain economical system structure intended at
hard to wire places like as old architecture besides solid wall design and compressed
charge to increase commonly in the dynamic situation needs persistent alterations,
recognition to marginal connection and fitting charges each device and user. The privilege
to travel action frequent user help for a variation of work environments, such as:
But, the huge density moreover achieves interferences further generally amongst wireless
Access Points (APs) also devices (or stations). Thus, many APs might operate more
damage than excellent and also obstruct the excellent show of WLANs.
1.1 Objective
Within dense deployment of Wireless LAN using IEEE 802.11, AP’s interference
increases and due to this grade of assistance degrades. Through developing the grade of
assistance latest details of throughput and end to end effective scheduling of channels must be
done.
To implement a solution for scheduling for timeslots in Wireless LAN
To reduce the contention
To reduce the channel interference
To improve the throughput like the Wireless LAN structure
To reduce the usual End to End delay for packets in Wireless LAN system
small-quantity congestion. The corporation most effective program signal route congestion as
the quantity of signal route congestion proceeds a predominant element in WLANs.
Fig 1.3: Overview of CO-FI. (1) Estimate subsequent service trade to stations; (2)
Give approval the controller of the traffic signal measurement for devices; (3) Calculate
period division distribution agenda for the services amongst form devices; (4) Assign the
framework to APs as of the controller; (5) Transfer framework moreover built on period
division distribution, if no time slot is allocated.
Chapter 1: Introduction: Here, some of the basic concepts of WLAN technology and
the motivation behind the project work are explained in brief.
Department of TCE, CMRIT, Bengaluru Page 4
Demand-Aware channel scheduling to achieve better QOS in high density deployments 2016-2017
Chapter 2: Literature survey: Here, different research works earlier done regarding
the concept of the project are discussed.
Chapter 4: System Analyze: Here, it explained about if the system is feasible enough
or not.
Chapter 2
LITERATURE SURVEY
The Literature survey is generally available within form toward resolving the
preparation of the existing project whichever supports toward invention outside faults in the
existing system & monitors on whichever unresolved difficulties individually can work
outside. Thus, the subsequent issues not only illuminate the related of the project then as well
discover the difficulties and faults whatever interested to introduce result and effort on this
project. A variability of inquiry must do finished on energy awake scheduling. Subsequent
sector determines the altered references in that talk approximately numerous subjects
associated with energy alert schedule.
V. Shrivastava [6] it says the broadcast area of WLANs excess to manage the
dispersed, unplanned-access miniature, as marked by the standard DCF instrument of the
802.11 standards. Although academic issue identifies that a central scheduled report route can
pick up advanced simplicity than its spread extends, to be expected difficult situation of a
well-known sequence has mute practicable consideration. In this complimentary, the author
took a moral, application and distribution oriented, notice in the path selections in aim
WLANs. Authors ultimate and implemented CENTAUR – a composite documents pathway
for aim WLANs one more associates the easiness of DCF mutually a finite approach of
centralized programme from an incredible interest mark.
M. Lacage [10] it describes today, 3 extraordinary physical (PHY) layers for the IEEE
802.11 WLAN; wholly of them literate talents. Through great show beneath variable settings;
those devices require correcting their communication price effective. Duration here charge
model algorithm is a current factor in their overall presentation, first literally few algorithms
a well-known as Auto Rate Fallback (ARF) or Receiver based Auto Rate (RBAR) were
distributed also the performance demanding situations related via all of these mechanisms
have never been discussed. In this complimentary, author alternately gives the well sized
characteristics of the 802.11systems that should be told under concern like algorithms are
intended. Especially, authors highlight the measure among reserved latency and excessive
inactivity structure, and it observes a sample of positive liveliest that founder as a choice of
the dissimilar classes. The study of an Adaptive ARF (AARF) algorithm for reserved
inactivity structures that come via ARF to deliver each temporary and lengthy-time period
model. The brand original algorithm has literally small difficulty in the meantime acquiring
an overall performance much like RBAR, which calls for reverse variations to the 802.eleven
MAC in addition PHY protocol.
trade union locations and employment in specifically appointed assembly settings, disordered
innate organizations are showing into the human as facing an exception. These systems
frequently employment various adjacent access points and stations on a similar channel, in
turn, because of the absence of a designation channels. Thus, inter-cell interference is
commonplace however no more well-understood. Giving to exact knowledge, the ability of
an 802.11 position is reputed by the degree of bright customers. Amazingly, it occupies that
mutually a classic TCP-predominant load, everyone framework throughput is described by
the period of time of constraining have to nib across the measure of customers. Consider, the
degree of multiple locations in one program levels mutually double the length of gain to
secure ideas. Thus, a hit access connect network tested absolutely tough eventually with
around one hundred clients. Various interfering access points, in any action, guidance
growing in the destruction that decreases throughput and alter work of commercial good in
the network.
Y. Lee [5] it describes the study of a wireless trade union area combine (WLAN) has
a significant announce of essential the excellent establishing of access points (APs) and
selection of channels to them. WLAN assistance in the distant as cleanly as private
atmospheres would be described in the decision to move up in the world the deadline analysis
and throughput. To extend the deadline analysis for WLAN trade areas, APs should be
equipped that the mixture of calling consistent at each commercial good limit point is to
maximize. Though, as users accessible to an AP stand in one shoe wireless channel
bandwidth by all of the remains in the uniform AP, AP finding must be intensely determined
to maximize the throughput by as a result of load balancing bounded by APs in addition
network delay for the customer transport urging. In this free of cost, subsequently, it asks for
the hand of a concern of enhancing AP finding besides channel selection in WLANs by
framing an excellent Integer Linear Programming (ILP) problem. The enhancing design is to
reduce the deadline of channel endeavor, whatever qualitatively denotes heavy traffic at the
rapid spot in WLAN trade zones. It is seen from the appearance outcomes that the
prospective manner finds the ideal AP establishing and channels which reduce the deadline of
channel utilization.
N. Ahmed [15] depicts optimally selecting occupied framework for achieves opinions
in essay transmission LAN environment is a theoretical and well-studied issue. Dissimilar
past trade, the SMARTA self-managing receiver LAN construction dynamic balance together
access hold channel position and capacity stages in the deal to consistent variations in the
wireless environment to improve unpredictable neutral purposes, at the same time taking into
the budget the reasonable environment of RF delivery, and running mutually unchanged
inheritance customers. It considers the SMARTA architecture over replicate and exhibit that
our consolidation is not individual efficient, but then again furthermore brings proper
advancement completely existing methods. For lesson, in an accurate scenario, SMARTA
bounce afford 50% in a superior way throughput and 40% lower exhibit apiece-package
obstruct than a member-enhanced conformation. Also, SMARTA cancels naturally rearrange
stations and capacity stages in energy to mutually low and rich variations in the RF
atmosphere discipline to customer program.
J. Elson [16] Time synchronization is a main part of organization for some extent
allotted device allocate, Wi-Fi sensor nets kind usage of corresponding time, however
regularly have specific necessities in the capacity, period, and accuracy of the organization
finished, in addition to the time and power essential to attain it. Existing time organization
techniques want to be stretched to fulfill these innovative requirements. Individually plan the
organization necessities of upcoming sensor nets and current execution of our individual
small power management scheme, submit-factor organization. Our own selves additionally
define an experimentation that symbolizes its act for making small-survived and limited in
height precision organization by means of precise miniature electricity.
Summary
This chapter specially deliberates kind of the papers, the web-site which might be
mentioned in the meantime making this interpretation document and it shows a data on a
pinnacle of each different to an improvement of normal conduct, their real answers, methods
and moreover their benefits & limits.
Chapter 3
Device Prerequisite:
Flexibility: Because the operating system program is advanced new Java it package be
implemented on whatever degree for that the JVM is obtainable through slight or not at all
changes.
Exactness: The monitored distinct constant of occasions take a look at a parent out and
additionally correct trying out, is achieved to validate the exactness of the information.
Ease of Use: The front quit is organized in this kind of manner that it gives an interface that
grants the user to cooperate in a clean appearance.
Moderate: The whole device is damaged and addicted to many application and well-defined
interfaces are superior to discover the gain of affability of the device.
Robustness: The present software program should do work for any number of nodes and
ought to not suspend.
Structural Requirements:
Progress Recognized: IEEE recognizes are worn out to promote the presentation that is
recognized through the normal operating system builders all above the sphere.
Layout Technique: Modular layout approaches are tested to design the project. The study of
this program is as it can be the critical factor charming how matters stack up the software
program and have a main power at the behind phases, mainly trying out and preservation.
User Prerequisite:
The operator essential to be capable of imagining the simulation behavior in an NAM
window.
The operator essential to be capable of seeing the performance graph at the use of a
single command.
Mission profile or scenario: The mission of the project is to reduce the collision among AP
and increase the throughput.
Performance and related parameters: The throughput of the proposed solution must be
higher than CSMA and the delay must be lower than CSMA.
Utilization environments: The system must not consume more than 20% CPU.
Operational life cycle: Once the AP becomes alive user equipment can send traffic request
through AP.
The center of NS-2 is likewise composed in C++, but then again the C++ imitation
stuff is related to follower things in OTcl and factors may be related to collected language
domain names. Replica writings are composed now the OTcl language, a spread of the Tcl
writes a language. Inside the time plot where in NS-2 changed into granting (the mid-1990s),
this gave each an extraordinary region in keeping far from many disturbing recompilations
and furthermore permitting likely less demanding setup structure design for representing
simulations. NS-2 has a co-worker interest protest referred to as the community illustrator,
NAM-1, initially confident by using Mark Handley, applied for a notion of the execution
final results then for (constrained) graphic setup of execution situations.
Gnu plot can create output in a straight line on screen, or in diverse formats of
photos, documents, in addition to Portable Network Graphic (PNG), Encapsulated PostScript
(EPS), Scalable Vector Graphics (SVG), JPEG and plenty of overseas. It is likewise carried
out of manufacturing Latex code; it may be concerned without delay in latex documents,
manufacture usage of Latex’s spring and effective formulae facilities. This system may be
used each attractively in batch mode and the use of scripts. The program is properly sustained
and documented. Tremendous assist can also be originated on the internet.
Summary
Chapter 4
SYSTEM ANALYZE
System Analyze is the way to innovation of the finest solution for the issue. It is the
procedure by that it can find out almost the current issues, characterize things and requests
and estimates the results. It is the state of mind almost associated and the issue includes an
arrangement of innovations that supports in taking care of these issues. Feasibility thinks
about assuming an essential part in system analyze which provides the objective for outline,
also an improvement.
The project is simulated on NS2. For simulation, just a single PC is required and no
additional equipment is required. So financially the project is practical.
This project requires coding in TCL and TCL language is very easy to learn. So the
project is in fact achievable.
The project does not have any social impact therefore socially the project is feasible.
Summary
The main goal of this section is to contact out even if the program is feasible
sufficient or no longer. For those explanations, dissimilar types of test, a well-known as the
Feasibility study, Technological feasibility, financial feasibility etc. remains performed.
Chapter 5
SYSTEM ARCHITECTURE
System Architecture is a creative process of design is a key to the operational system.
The system "Architecture" is described as "The manner in the track of making use of
different techniques and requirements with the give up idea of characterizing a procedure or a
system in appropriate element to allow its physical reaction". Distinct plan mechanisms are
taken after to define alert system. The plan detail represents the factors of the system, the
condiments of the device and their presence to give end-clients.
System exploration: This stage is bothered to almost increase of a constraint of the system.
This procedure includes producing best and requirement check.
System layout: Keeping the requirements as the main priority the system determinations are
made an interpretation into a product description. In this stage the designer pressures on
calculation, information structure, programming engineering etc.
Coding: In this stage software engineer begins his coding keeping in mind the end goal to
give an entire outline of a product. As such system particulars are just changed over into
mechanism coherent figure code.
Execution: The implementation stage includes the real coding of the product. The profit of
this stage is usually the study, executables, user booklets then extra programming documents.
Analysis: In this stage totally databases are coordinated in addition, tried to guarantee that the
total structure accommodated the software necessities.
Resources: The resources stage is the greatest stage in whichever the operating system is
refreshed to satisfy the altering client require, adjust to accommodate a change in the outer
condition, rectify mistakes and neglect an already unexplored mistakes in the analysis stage,
upgrade the effectiveness of the program.
Prerequisite
Identification
System
Architecture
Execution
Testing
Analyze
Resources
Configuration: Initialize the network with parameters called no of nodes and communication
range.
Simulator: Network created and simulator will generate a new AP and MS. AP will demand
request to Scheduler. Timeslot allocated and data transfer to MS
Node: Node may be AP or MS where data transferring takes place, and AP node scheduling
is done based on the demand and timeslots.
Fairness Guarantee: To give the equal share of time slots to all the Aps.
Configuration
+createNetwork() 1
+addAP()
+addStations() Simulator
+viewNetwork()
+stratSimulation() +addNode()
1 +startSimulation()
1 +collectStatistics()
1 1
MS App
Node 1..*
+generateRequest()
+init()
1 +setRole()
AP App +getThroughput()
+getDelay()
1
+calculateDemand()
1 1
+requestScheduler()
+transferData()
+setSchedule() Scheduler
+processAPRequest()
In the above class diagram, the classes are Configuration, Simulator, MS app, AP app,
Node. Each class generalized with the other classes with the relationship instances mentioned
in the above diagram. And each class having separate operations mentioned in the diagram
Start Simulation Start the simulation and run simulation until stop
time.
DOD, information objects movement as of an outside information basis or an inner data keep
to interior records save or exterior information go down, complete an inner outflow.
A background-degree or level 0 data float drawing displays the interplay among the
device and outside operator that deed as data resources and data go down. Arranged the
textual content drawing the system's interfaces through the outdoor world are showed in basic
languages in the circumstance of data outflow crosswise the device border. The framework
drawing indicates the complete device as the only method and offers no signs as to its interior
corporation. Data go with the flow diagram are essentially for the reason of input, output and
the manner is converting the input to the output. Input is traffic request shape station.
Scheduling is the process, for every manner it has to provide the numbers. The output is data
uploaded to stations. Scheduling is the high-level process.
Traffic request from AP is taken as input and scheduling gives the frame slots for AP
to send data.
Advertise Frame to
Data transfer at AP Time slot
AP
Alocation
Table 5.7: Break the Scheduling into subprocess. The subprocesses are:
Summary
Chapter 6
EXECUTION
Execution is the module of the program in which the intellectual outline is transferred
into a functioning device. By that segment, the fundamental load besides the actual effect on
the current system moves to the person office. Inside the execution that the control is not
wisely arranged and organized, it is able to carry about ailment and distraction. The execution
organizes needs the following function.
Accurate arranging
Inquiry of system besides requirements
Layout of strategies to attain the exchange
Assessment of the transition strategy
Accurate choices with respect to determination of the stage
Suitable choice of the language for function progress
Admin, Scheduling, AP, and MS are the processes which were interacted through
messages showed in the above diagram.
Generated
request
Generate Schedule
Set schedule
Data transfer at
slots
Admin, Simulator, and Node, are the processes which were interacted through
messages shown in the above diagram.
Throughput
Get throughput
Delay
Get delay
calculateAverage
Average throughput
Average delay
Step2: Access Point is waiting for the request to estimate the traffic demand.
Step 5: In scheduler sets the frame and advertise to Access Point, in the Access Point within
the particular time slots the devices are configured.
terminology. Minor purposes behind that TCL is chosen as a programming terminology can
be arranged out as takes after:-
Tcl is easier. These out a C/Unix foundation, for the most part, discover Tcl
language structure far less demanding to learn and hold
Tcl is smaller
Tcl is simpler to enhance, install, and rebuild
Tcl source code customarily is a model of clarity. Perl source code customarily is
thick in delight
Tcl/Tk is significantly more compact than Perl/Tk, and by and large more present
TCP systems administration is more succinct and less scary
Tcl's executive, open and attachment are rings of available and compact usefulness, in
contrast with the practically equivalent to Perl offerings
Tcl's assured together channel API makes life significantly less demanding, especially
on Windows
As of hop 2001, Tcl's Unicode capacities are extensively further develop
As of hop 2001, Tcl's threading clever (perused "Tcl and strings") is significantly
further develop
Subjective stuff: a few people discover Tcl a superior fit to their own particular
sensibilities
Event follow and companions frequently block functionalities for usefulness superior
to strings
Tcl is route in front of Perl in VFS capabilities; combine gives a case of the potential
results
During the time "Tcl's string taking care of has been present composed by
paranoiacs", to cite DKF, TCL is insusceptible to several "design series
susceptibilities".
All processes are commands, counting language structures. They are composed in
prefix documentation
Commands are usually varied
In everything can be progressively re-imagined and outdated
All information kinds can be controlled as strings, as well as source code
Complete dynamic, class-based query framework, TclOO, which includes propelled
factors, as an instance, out-classes, channels, and mix in.
Phase-pushed integrates to attachments and record. Time placed totally and user
characterized act are additionally feasible.
Variable growth confined to static scope as a count number of direction, yet pinnacle
level and up air permitting procs to interface with the encasing capacities' scopes.
All charges characterized by Tcl itself create mistake messages on off base use.
Extensibility, by means of C, C++, Java, and Tcl.
Interpreted language utilizing bytecode.
Wherever Ti is the quantity of congestion acquire at the time oriel i, and ↵ is the
efficient that perform the grade of allowance the modern congestion.
11: n←0
12: A ←ÀPof (s) A: AP that s is coupled to
13: while n ≤ k do
14: m ← Get First Unallocated Slot (G)
15: Connection (A to s).add (m)
16: n ← n+1
17: ALLOCATOR (Ω – G) Designate resourcefully
For i=1:nodes
For j=1:nodes
Else
Conflictgraph(i,j) =0;
End
End
Summary
This session offers implementation plan of one and more APs of the controller in the
element. With the assist of information go with the flow determine, it further identifies the
layout of implementation for the assorted program that has stayed targeted everywhere in the
system layout. This chapter besides highlights the numerous capabilities of the notification
and terminology used for implementation reason.
Chapter 7
TESTING ANALYSIS
Testing Analysis is genuinely a progression of numerous checks whose main function
is towards completely practice the PC located system. However personal check has some
other reason, all together work to check that all the device components had been legally
integrated and gain assigned capacities. The checking out technique in reality, accomplished
to make that the item exactly does likewise what have to do. All through the analysis, the
main moves are concentrated on the exam then alteration of the source program.
The resulting System analysis desktop displays the purposes that were verified at the
stage of software design. The initial post inclines all the roles that were verified, and then the
additional support offers the explanation of the checks ended. Since OOPS design is
followed, each class is a unit and the test cases for each class is written and tested in unit
testing.
7.2 Integration
After finishing of system testing, singular capacities are included into classes. Once
more integration of numerous classes assumes into function finally incorporation of the front
end with lower back-end occurs. Based on sequence diagram training to be integrated is
observed and the combination testing is performed on the ones functions incorporated.
This approach initiates the improvement and testing through the segments at the
greatest minimum stage inside the software plan. For the reason that modules are mixed from
end to end, managing essential for segments subject to a known level is continuously
accessible. The accompanying integration trying out table establishes the capacities that
existed consolidated into various instructions and the elegance in general attempted for its
functionalities.
Start Simulation()
Class: Add Node() Class-tested to checked even if or Achieved
Simulator Start Simulation() not entire operations that have
Collect Statistics() been implemented are in work
efficaciously then correctly or no
longer
The system under concern is examined for person reputation via continuously in touch
with the prospective system users at the time of evolving and making adjustments anywhere
required in regard to the following factor:
Data display plan
Return display plan
List guided structure
The generic threat including the product size chance, business impact dangers,
patron–related threats, system threats, generation threats, improvement surroundings threats,
security threats etc. This assignment is advanced via considering a majority of these vital
matters.
Summary
This chapter manages a few sorts of testing. For example, system testing analysis that
is a strategy for analyzing the precise working of a specific segment of the basis program. It
is likewise mentioned as segment analysis. Other then these principles there are two sorts of
testing, numerous different sorts, for example, verification analysis, output testing, User
acceptance testing discussed here.
Chapter 8
SIMULATION
This chapter mainly explains the outcome of the project. The following snapshots
show the project code and graphs show the increasing of the throughput than the existing
system.
8.1 Simulation:
In terminal mode, go to the directory where the project is kept.
Remove the *.txt and *.jpg files in the project directory thereby previous performance
results are lost.
Go to file directory and open the sim conf.tcl and change the Val (AP) property to
change the number of AP.
Type the command in terminal mode ns chschedule.tcl and execute the simulation.
Hence, the Simulation is completed and checks the results.
The requested number of AP is created. The rest of nodes behave as MS and join to
the nearest AP. The conflict graph between AP is calculated and displayed. It has the
information of which all AP’s are conflicting with other AP.
In this project, it reduces the end-end-delay. The plot of average delay for varied
number of AP is shown. From this, the proposed result has low throughput value.
The plot of average Throughput for varied number of AP is shown. From this, the
average throughput in proposed result is higher than existing.
Summary
This session proposals a quick simulation of the predicted and received outcome when
for each and the individually segment is performed in their correct order.
CONCLUSION
The increased level of interference between wireless access points and stations due to
dense deployment of IEEE 802.11 Wireless LANs. In IEEE 802.11 individually popularized
to a Co-operate wireless design, CO-FI in order that decreases interference and
consequently upgrades wireless net presentation for signal downward congestion. It has
been implemented in centralized channel scheduler in NS2 and tested its performance. The
delivered approach to penalizing the time period in the network, slots is allotted inside the
conflict zones based on demand. With this scheme, collisions are reduced and the effective
throughput of the network is elevated and minimizes end to end delay.
REFERENCES
[1] Patro, S. Govindan, and S. Banerjee, “Observing Home Wireless Experience through
Wi-Fi APs,” in Proceedings of ACM MobiCom, 2013.
[2] M. A. Ergin, K. Ramachandran, and M. Gruteser, “Understanding the effect of access
point density on wireless LAN performance,” in Proceedings of ACM MobiCom,
2007.
[3] V. Mhatre, K. Papagiannaki, and F. Baccelli, “Interference mitigation through power
control in high density 802.11 Wlans,” in Proceedings of IEEE INFOCOM, 2007.
[4] R. Gummadi, D. Wetherall, B. Greenstein, and S. Seshan, “Understanding and
mitigating the impact of rf interference on 802.11 networks,” in Proceedings of ACM
SIGCOMM, 2007.
[5] Y. Lee, K. Kim, and Y. Choi, “Optimization of app placement and channel
assignment in wireless LANs,” in Proceedings of IEEE LCN, 2002.
[6] V. Shrivastava, N. Ahmed, S. Rayanchu, S. Banerjee, S. Keshav, K. Papagiannaki,
and A. Mishra, “CENTAUR: Realizing the Full Potential of Centralized WLAN
Through a Hybrid Data Path,” in Proceedings of ACM MobiCom, 2009.
[7] J. Manweiler, N. Santhapuri, S. Sen, R. Choudhury, S. Nelakuditi, and K. Munagala,
“Order matters: Transmission reordering in wireless networks,” IEEE/ACM
Transactions on Networking, vol. 20, no. 2, pp. 353–366, Apr. 2012.
[8] D. Zhao, M. Zhu, M. Xu, and J. Cao, “Downlink packets scheduling in
enterprise WLAN,” in Proceedings of IEEE WCNC, 2013.
[9] Kamerman and L. Monteban, “Waveland-ii: A high-performance wireless LAN for
the unlicensed band,” Bell Labs Technical Journal, vol. 2, no. 3, pp. 118–133, 1997.
[10] M. Lacaze, M. H. Manshaei, and T. Turletti, “IEEE 802.11 Rate Adaptation: A
Practical Approach,” in Proceedings of ACM MSWiM, 2004.
[11] H. Falaki, D. Lymberopoulos, R. Mahajan, S. Kandula, and D. Estrin,“A First Look at
Traffic on Smartphones,” in Proceedings of ACM IMC, 2010.
[12] A. Gupta, J. Min, and I. Rhee, “Wifox: Scaling Wi-Fi performance for large audience
environments,” in Proceedings of ACM CoNEXT, 2012.
[13] “Ericsson Mobility report,” http://www.ericsson.com/mobility-report, Nov. 2012.
[14] K. Jain, J. Padhye, V. N. Padmanabhan, and L. Qiu, “Impact of Interference on multi-
hop wireless network performance,” in Proceedings of ACM MobiCom, 2003.
[15] N. Ahmed and S. Keshav, “Smart: A self-managing architecture for thin access
points,” in Proceedings of ACM CoNEXT, 2006.
[16] J. Elson and D. Estrin, “Time synchronization for wireless sensor networks,” in
Proceedings of the 15th International Symposium on Parallel and Distributed
Processing, Apr. 2001, pp. 1965–1970.
[17] V. Shrivastava, S. Rayanchu, S. Banerjee, and K. Papagiannaki, “PIE in the Sky:
Online Passive Interference Estimation for Enterprise WLANs,” in Proceedings of
USENIX NSDI, 2011.
[18] N. McKeown, T. Anderson, H. Balakrishnan, G. Parulkar, L. Peterson, J. Rexford, S.
Shenker, and J. Turner, “OpenFlow: Enabling innovation in campus networks,”
SIGCOMM Computer Communication Review, vol. 38, no. 2, pp. 69–74, Mar. 2008.
[19] P. Djukic and P. Mohapatra, “Soft-TDMAC: A Software TDMA-Based MAC over
Commodity 802.11 Hardware,” in Proceedings of IEEE INFOCOM, 2009.
[20] G. Bianchi, P. Gallo, D. Garlisi, F. Giuliano, F. Gringoli, and I. Tinnirello, “MAClets:
Active MAC Protocols over Hard-coded Devices,” in Proceedings of ACM CoNEXT,
2012.
PUBLICATION
Sharmila K P, Dr. C. Ramesh, Ramajigalu Manjunath Sumana "Cellular Proximity Services
For Alert in V2V Communication", International Journal of Engineering Trends and
Technology (IJETT), V46 (8), 454-456 April 2017.