Internati onal Journal of Computer & Mathematical Sciences IJCMS ISSN 2347 – 8527 Volume 4, Issue 6 June 2015 Improving Performance Metrics in Distributed Multihopping CSMA Network M.Bhuvaneswari1 , C.Kalaiselvi2 , M.Dhivya3 Assistant professor, Dept. of ECE, Ratnavel Subramaniam College of Engineering and Technology, Dindigul, Tamilnadu, India 1 Assistant professor, Dept. of ICE, Ratnavel Subramaniam College of Engineering and Technology, Dindigul, Tamilnadu, India 2 Assistant professor, Dept. of ECE, Ratnavel Subramaniam College of Engineering and Technology, Dindigul, Tamilnadu, India 3 Abstract- One of the challenges in multihop wireless networks is to maximize throughput over a communication channel. The utmost confront is to attain optimal throughput in a distributed manner. Recently, it has been shown that queue length based carrier sense multiple access (Q-CSMA) type random access algorithms can achieve the maximum possible throughput in adhoc wireless networks. A lot of work has been completed in this area of studies since the late 70s.In general, single channel to communication network is considered. In this kind of network, if more than one links are active in a certain neighborhood or more than one entity try to access a certain link, then collision will occur. When collision occurs, packets are not successfully transmits over the medium. So, a hybrid algorithm is defined, to improve the efficiency of collision avoided communication and to improve throughput and reduce latency. This algorithm based on hybrid Q-CSMA and DSR .In finally combining CSMA with DSR leads to very good d elay performance. It is proved that it should be straightforward to extend all algorithms to be applicable to networks with multihop traffic and congestion controlled sources. Index Terms: Greedy maximal scheduling (GM S), Maximal weighted scheduling (MWS), Longest queue first(LQF ),Que ue carrier sense multiple access(Q-CSMA) I. INTRODUCTION For wireless networks with limited sources, efficient resource allocation and optimization play an important role in achieving high network performance & reducing energy consumption. The performance metrics of interest in this paper are throughput and delay. The throughput performance of a scheduling algorithm is often characterized by the largest set of arrival rates under which the algorithm can keep the queues in the network stable. The delay performance of a scheduling algorithm can be characterized by the average delay experienced by the packets transmitted in the network. Although the recent results on CSMA-type random access algorithms show throughput-optimality, simulation results indicate that the delay performance of these algorithms can be quite bad and much worse than MWS and GMS. Thus, one of our goals in this paper is to design distributed scheduling algorithms that have low complexity, are provably throughput optimal and have good delay performance. Towards this end, we design a discrete-time version of the CSMA random access algorithm. The algorithm generates collision-free data transmission schedules while allowing for collisions during the control phase of the protocol. The performance metrics of interest are throughput and delay. The throughput performance of a scheduling algorithm is characterized by the largest set of arrival rates under which the algorithm can keep the queues in the network stable. The delay performance of a scheduling algorithm can be characterized by the average delay experienced by the packets transmitted in the network. Since many wireless applications nowadays have stringent bandwidth and delay requirements. Designing high-performance scheduling algorithms to achieve maximum throughput and low delay is of great importance, which is the focus of this paper. We also want the scheduling algorithms to be distributed and have low complexity/overhead since, in wireless scenarios. Normally there is no central ent ity and the resources at the nodes are very limited. It has been shown that carrier sense multiple access (CSMA) type random access algorithms can achieve the maximum possible throughput in adhoc wireless networks. However these algorithms assume an idealized continuous-time CSMA protocol where collisions can never occur In addition simulation results indicate that the delay performance of these algorithms can be quite bad. Although some simple heuristics can yield much better delay performance for a large set of arrival rates. In general they may only achieve a fraction of the capacity region. In this we propose a discrete time version of the CSMA algorithm. Central to our results is a discrete time distributed randomized algorithm that is based on the generalization of the Glauber dynamic physics, where multiple links are allowed to update their states in a single time slot. 80 M.Bhuvaneswari, C.Kalaiselvi , M.Dhivya Internati onal Journal of Computer & Mathematical Sciences IJCMS ISSN 2347 – 8527 Volume 4, Issue 6 June 2015 II. SYSTEM ARCHITECTURE Fig.2. System Architecture III. BASIC SCHEDULING ALGORITHM A scheduling algorithm is a procedure to decide which schedule to be used (which set of links to be activated) in every timeslot for data transmission. The capacity region of the network is the set of all arrival rates for which there exists a scheduling algorithm that can stabilize the queues, i.e., the queues are bounded in some appropriate sense depending on the arrival model used. I say that a scheduling algorithm is throughputoptimal, or achieves the maximum throughput, if it can keep the network stable for all arrival rates in . Divide each timeslot into a control slot and a data slot. (Later, we will further divide the control slot into control mini slots.)The purpose of the control slot is to generate a collision-free transmission schedule used for data transmission in the data slot. To achieve this, the network first selects a set of links that do not conflict with each other, denoted by. Note that these links also form a feasible schedule, but it is not the schedule used for data transmission. We call the decision schedule in time slot. A. Packet Generation A packet generation model is a traffic generation model of the packet flows or data sources in a packetswitched network. These models are useful in the development of telecommunication technologies, in view to analysis the performance and capacity of various protocols. The network performance can be analyzed by network traffic measurement in a test Bed network, using a network generator such as iperf, bwping and Mausezahn. The traffic generator sends dummy packets, often with a unique packet identifier, making it possible to keep track of the packet delivery in the network. First generates the certain no of packets and transmit the packet in the network traffic. There the packet must be identified and there will be two conditions. If the packet matches then the process will be stopped. else also the packet generation will be stopped. Packet filters act by inspecting the "packets" which transfer between computers on the Internet. If a packet matches the packet filter's set of rules, the packet filter will drop the packet, or reject. B. User Polling User polling is a variation of the traditional polling technique and allows emulation of an information push from a server to a client. With user polling, the client requests information from the server in a similar way to a normal poll. The server does not have any information available for the client, instead of sending an empty response; the server holds the request and waits for some information to be available. The performance of a simple distributed scheduling policy, maximal scheduling, which had earlier been investigated in context of node-exclusive spectrum sharing model and input-queued switches. The characterizations demonstrate that the performance bounds depend heavily on the nature of communication and interference models. Traditional maximal weight scheduling (MWS), although through put optimal, is difficult to implement in distributed networks. CSMA scheduling algorithm that can achieve them axial through put distributive. The client will normally then immediately re-request information from the server. so that the server will almost always have an available waiting request that it can use to deliver data in response to an event. User polling is itself not a true push, but can be used under circumstances where a real push is not possible, and offers many of the same benefits in terms of rapid delivery. C. Network Monitoring The term network monitoring describes the use of a system that constantly monitors a computer network for slow or failing components and that notifies the network administrator. A network monitoring system monitors an internal network for problems. 81 M.Bhuvaneswari, C.Kalaiselvi , M.Dhivya Internati onal Journal of Computer & Mathematical Sciences IJCMS ISSN 2347 – 8527 Volume 4, Issue 6 June 2015 It can find and help resolve snail-paced webpage downloads, lost-in-space e-mail, questionable user activity and file delivery caused by overloaded, crashed servers, dicey network connections or other devices. Monitoring an active communications network in order to diagnose problems and gather statistics for administration and fine tuning. Network monitoring can be achieved using various software or a combination of plug-and-play hardware and software appliance solutions. Virtually any kind of network can be monitored. It doesn't matter whether it's wireless or wired, a corporate LAN, VPN or service provider WAN. D. Packet Scheduling IP-packets sent from a station or AP is first converted from bit streams to radio signal, which is modulated to a frequency for a channel and after that transmitted into the air medium. All network nodes within the BSS network are using the same channel to communicate and all stations within the LAN have equal opportunity to access to the medium using DCF protocol, including AP. AP, which is the bridging node, has no privileges to transmit more on its downlink when sharing resources .But all flows from AP are treated equally and there is no contention among these. First in First out (FIFO), where aggregate flows are queued in an arrival manner. With N flows on the downlink, each flow receives 1/N of the availab le bandwidth capacity fairly. IV. ALGORITHM A. Q-CSMA Algorithm Link i selects a random (integer) back off time Ti uniformly in[0 ,W − 1] and waits for Ti control mini-slots. IF link i hears an INTENT message from a link in C (i) before the (Ti +1)-th control mini-slot, i will not be included in m (t)and will not transmit an INTENT message anymore. Link i will set xi (t)= xi ( t − 1). IF link i does not listen to an INTENT message from any link in C before the ( Ti +1) -th control mini-slot, it will send(broadcast) an INTENT message to all links in C at the beginning of the (Ti +1)-th control mini-slot. If there is a collision (i.e) if there is another link in C Transmitting an INTENT message in the same mini-slot), link i will not be included in m (t) and will set xi (t)= xi ( t − 1). If there is no collision, link i will be included in m (t) and decide its state as follows: If no links in C (i) were active in the previous data slot xi (t)=1 with probability pi , 0 <pi < 1 ; xi (t)=0 with probability ¯pi =1 − pi . else xi (t)=0 . IF xi (t)=1 , link i will transmit a packet in the data slot. B. D-GMS Algorithm Link i selects a random backoff time Ti = W ×└B − log b(qi (t)+1)┘++ Uniform[0 ,W − 1] and waits for Ti control mini-slots. IF link i hears an RESV message (e.g., an RTS/CTS pair) from a link in C (i) before the (Ti +1)-th control mini-slot, i will not be included in x(t) and will not transmit an RESV message. Link i will set xi (t)=0 . If there is a collision, link i will set xi (t)=0 . If there is no collision, link i will set xi (t)=1 IF xi (t)=1 , link i will transmit a packet in the data s lot. C. Hybrid Q-CSMA Algorithm IF wi (t) >w0 ( Q-CSMA Procedure) 82 M.Bhuvaneswari, C.Kalaiselvi , M.Dhivya Internati onal Journal of Computer & Mathematical Sciences IJCMS ISSN 2347 – 8527 Volume 4, Issue 6 June 2015 Link i selects a random backoff time Ti = Uniform [0 ,W0 − 1]. If link i hears an INTENT message from a link in C (i) before the (Ti+1)-th control mini-slot, then it will set xi (t)= xi ( t −1) and go to Step 1.4 If link i does not hear an INTENT message from any link in C (i) before the (Ti +1) -th control minislot, it will send an INTENT message to all links in C (i) at the beginning of the (Ti +1)-th control mini-slot. If there is a collision If there is a collision, link i will set xi (t)= xi (t − 1). If there is no collision, link i will decide its state as follows: If no links in C were active due to the Q-CSMA procedure in the previous data slot, i.e., NAi =0, xi (t)=1 with probability pi , 0 <pi < 1 ; xi (t)=0 with probability ¯pi =1 − pi . else xi ( t)=0 . If xi (t)=1 , link i will send an RESV message to all links in C (i) at the beginning of the (W0 +1)-th control mini-slot. It will set NAi =0 and transmit a packet in the data s lot If xi ( t)=0 and link i hears an RESV message from any link in C ( i) in the ( W0 +1)-th control minislot, it will set NAi =1 ;otherwise, it will set NAi =0 . If wi ( t) ≤ w0 ( D-GMS Procedure) If link i hears an RESV message from any link in C in the(W0 +1) -th control mini-slot, it will set NAi =1 and xi (t)=0and keep silent in this time slot else link i will set NAi =0 and s elect a random backoff time Ti =( W0 +1)+ W1 ×└B − log b(qi ( t)+1)┘++Uniform [0 ,W1 − 1] and wait for Ti control mini-slots. f link i hears an RESV message from a link in C (i) before the (Ti +1)-th control mini-slot, it will set xi ( t)=0 and beep silent in this time slot. If link i does not hear an RESV message from any link in C before the (Ti +1)-th control mini-slot, it will send an RESV message to all at the beginning of the (Ti +1)-th control mini-slot. If there is a collision, link i will set xi ( t)=0 . If there is no collision, link i will set xi ( t)=1 . If xi ( t)=1 , link i will transmit a packet in the data s lot. V. SIMULATION RESULTS In this section, we evaluate the performance of different scheduling algorithms via simulations, which include MWS (only for small networks), GMS (centralized), D-GMS,Q-CSMA, and the hybrid Q-CSMA algorithm. In addition,we have implemented a distributed algorithm to approximate maximal scheduling (called D-MS), Fig.3. Comparison Graph 83 M.Bhuvaneswari, C.Kalaiselvi , M.Dhivya Fig.4. Transmission Graph Internati onal Journal of Computer & Mathematical Sciences IJCMS ISSN 2347 – 8527 Volume 4, Issue 6 June 2015 Fig.4. Time Line Chart for Packet Transfer Energy Calculation: 84 M.Bhuvaneswari, C.Kalaiselvi , M.Dhivya Internati onal Journal of Computer & Mathematical Sciences IJCMS ISSN 2347 – 8527 Volume 4, Issue 6 June 2015 VI. CONCLUSION A slotted distributed queue-length based CSMA/CA protocol that leads to collision-free data transmission schedules. The protocol is provably throughput-optimal. The discrete-time formulation allows us to incorporate mechanisms to dramatically reduce the delay without affecting the theoretical throughputoptimality property. In particular, combining CSMA with distributed GMS leads to very good delay performance. Our design focuses on routing that also balances the energy consumption, and forward the packet toward the sink through dense energy areas so as to protect the nodes with relatively low residual energy. A. FUTURE ENHANCEMENT In future, this project is discrete time version is going to be used to reduce the delay in order to get better performance than the previous performances .simulation results will give good delay performance. Designing of distributed scheduling algorithm is an important design aspect in this project in future .This algorithm generates collision free data transmission schedules while allowing for collisions during the control phase of the protocol. More concentration will be given to an energy balanced method, it takes a consideration of location and energy information. Simulation results show that the network lifetime will be increased. VII.REFERNCES [1] P.Chaporkar.k.Kar,and Sarkar.”Throughput Guarantees through maximal scheduling in wireless networks”.In Proceedings of 43rd annualallerton.conf.coomn,control,co mput.,sep 2005,PP 28-30 [2] A.Dimaki and J.Warland,”Sufficient conditions For stability of longest queue First scheduling:second order properties using fluid limits,”Adv.APPL.Probab vol 38,no 2,PP 505 -525,2006 [3] J.Ghaduri and R.Srikant,”On design of efficient CSMA algorith ms for wireless networks,”mar2010online] Avilable:http://arxiv.org/abs/1003 [4] L.Jiang and J.Walrand,”A distributed CSMA Algorith m fo r throughput and utility maximizat ion in wireless networks” in proceedings 46th Annu.Allerton conf.comun.,control.,control,co mput.,sep.2008pp.1511 -1519. [5] C.Joo,X.Lin,and .B.Shroff,”Understanding The capacity region of the greedy maximal scheduling algorithm in mu ltihop wireless,”IEEE/A CM rans.Networks”.,Vo l 17,no 4.pp.1132-1145 Aug 2009 [6] M.Leconte,J.Ni,andR.Srikant,’Improved bounds On the throughput and efficiency of greedyMaximal scheduling in wireless networks,”IEEE/ACMTrans.Netw.,Vol19,no 3,pp.1319-1331,sep.2010 [7] J.Ni,B.R.Tan and R.Srikant, ” Q-CSMA :Queue Length based CSMA/CA algorith ms for achieving maximu m throughput and low delay in wireless networks,” in proc.IEEE INFOCOMM,mar 2010 pp.1-5 [8] Q-CSMA :Queue- length- based CSMA/CA Algorith ms achieving maximu m throughput And low delay in wireless networks.,Jian Ni, Bo(Rambo)Tan,R.Srikant IEEE/ACM Transactions on networking Vo l.20,No.3, June 2012 M.BHUVANESWARI The author is working as an Assistant Professor in department of Electronics and Co mmunication Engineering at RatnaVel Subraman iam Co llege of Eng ineering and Technology, Dindigul. She received her BE(ECE) & M.E(Co mputer Science Engineering) degree fro m RatnaVel Subramaniam College of Engineering and Technology, Dindigul, affiliated to Anna University, Chennai. Her research interest is Networking. C.KALAISELVI The author is working as an Assistant Professor in department of Instrumentation and Control Engineering at RatnaVel Subramaniam College of Engineering and Technology, Dindigul. She received her BE(EEE) degree fro m PSNA College of Engineering and Technology, Dindigul, affiliated to Anna University, Chennai and M.E(Control & Instrumentation) fro m College of Engineering Guindy, Anna University, Chennai. Her research interests are Power Electronics, Digital Electronics & Electrical Mach ines. M.DHIVYA The author is working as an Assistant Professor in department of Electronics and Commun ication Engineering at RatnaVel Subramanian Co llege of Engineering and Technology, Dindigul. She received her BE (ECE) degree fro m the Lord Venkateshwara Eng ineering College, Kanchipuram, TN, India, in 2011 and the Master of Engineering (M.E.) degree fro m the PSNA CET, Dindigu l, TN, India. Her research interests include Networking and Embedded. 85 M.Bhuvaneswari, C.Kalaiselvi , M.Dhivya