IJCNIS Vol. 3, No. 3, 8 Apr. 2011
Cover page and Table of Contents: PDF (size: 604KB)
Full Text (PDF, 604KB), PP.8-18
Views: 0 Downloads: 0
Hybrid Wireless Network, Superstore, Transaction Sensitive Level (TSL), Topology Management
With the development of large scale wireless networks, there has been short comings and limitations in traditional network topology management systems. In this paper, an adaptive algorithm is proposed to maintain topology of hybrid wireless superstore network by considering the transactions and individual network load. The adaptations include to choose the best network connection for the response, and to perform network Connection switching when network situation changes. At the same time, in terms of the design for topology management systems, aiming at intelligence, real-time, the study makes a step-by-step argument and research on the overall topology management scheme. Architecture for the adaptive topology management of hybrid wireless networking resources is available to user’s mobile device. Simulation results describes that the new scheme has outperformed the original topology management and it is simpler than the original rate borrowing scheme.
Shankaraiah, Pallapa Venkataram, "A Dynamic Topology Management in a Hybrid Wireless Superstore Network", International Journal of Computer Network and Information Security(IJCNIS), vol.3, no.3, pp.8-18, 2011. DOI:10.5815/ijcnis.2011.03.02
[1]J.Kilpi, A portrait of a GPRS/GSM session, Proceedings of ITC oc, Berlin Germany, 2003.
[2]A.K. Salkintzis, C Fors, R. Pazhyannur, WLAN-GPRS integration for next-generation mobile data networks,IEEE Wireless Communications 112-124 9(5)(2002).
[3]P.S. Henry and H. Luo, WiFi: Whats Next? IEEE Comm. Magazine, vol. 40, no. 12, pp. 66-72, Dec. 2002.
[4]P. Serrano-Alvarado, C. Roncancio, and M. Adiba, A Survey of Mobile Transactions, Distributed and Parallel Databases, vol. 16, no. 2, pp. 193- 230, 2004.
[5]M. Stemm, R.H. Katz, Vertical handoffs in wireless overlay networks, ACM Mobile Networks and Applications (MONET) 335-350,3 (4) (1998).
[6]N. Montavont, T. Noel, M. Kassi-Lahlou, MIPv6 for multiple interfaces, IETF Internet draft, draftmontavontmobileip-mmi-00.txt, July 2002.
[7]R. Ramanathan and R. Rosales-Hain, Topology control of multihop wireless networks using transmit power adjustment, in Proc. IEEE INFOCOM, vol. 2, Tel Aviv, Israel, pp. 404413, Mar. 2000.
[8]S. A. Borbash and E. H. Jennings, Distributed topology control algorithm for multihop wireless networks, in Proc. Int. Joint Conf. Neural Networks (IJCNN 02), Honolulu, HI, pp. 355360, May 2002.
[9]V. Rodoplu and T. H. Meng, Minimum energy mobile wireless networks, IEEE J. Sel. Areas Commun., vol. 17, no. 8, pp. 13331344, Aug. 1999.
[10]D. Rosenthal and F. Fung, gA Test for Non-disclosure in security level translations, h in The IEEE Symposium on Security and Privacy, pp. 196- 206, 1999.
[11]S. Sutikno and A. Surya, gAn architecture of F(22N) multiplier for elliptic curves cryptosystem, h in The ISCAS 2000 on Circuits and Systems, vol. 1, pp. 196-206, 2000.
[12]R. Wattenhofer and A. Zollinger, XTC: A practical topology control algorithm for ad-hoc networks, in Proc. 18th Int. Parallel and Distributed Processing Symp. (IPDPS04), Santa Fe, New Mexico, pp.216223, Apr. 2004.
[13]P.Gupta and P. R. Kumar, The capacity of wireless networks, IEEE Trans. Inf. Theory, vol. 46, no. 2, pp. 388404, Mar. 2000.
[14]N. Li, J. C. Hou, and L. Sha, Design and analysis of an MSTbased topology control algorithm, in Proc. IEEE INFOCOM, vol. 3, San Francisco, CA, pp. 17021712, Apr. 2003.
[15]Sun J, Riekki J, Jurmu M and Sauvola J, Adaptive connectivity management middleware for heterogeneous wireless networks. IEEE Wireless Communications, 12(6), 2005:18-25