Implementation of Quality of Services (QoS) for Based Wireless Mesh Network

Similar documents
MANET is considered a collection of wireless mobile nodes that are capable of communicating with each other. Research Article 2014

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol

Performance Evaluation of Routing Protocols in Wireless Mesh Networks. Motlhame Edwin Sejake, Zenzo Polite Ncube and Naison Gasela

Figure 1: Ad-Hoc routing protocols.

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

Implementation and Evaluation of Wireless Mesh Networks on MANET Routing Protocols

Mobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1

Gurleen Kaur Walia 1, Charanjit Singh 2

Performance Evaluation of MANET through NS2 Simulation

Performance Evaluation of Various Routing Protocols in MANET

Performance analysis of aodv, dsdv and aomdv using wimax in NS-2

QoS Based Evaluation of Multipath Routing Protocols in Manets

Performance Analysis of Proactive and Reactive Routing Protocols for QOS in MANET through OLSR & AODV

Estimate the Routing Protocols for Internet of Things

Routing Protocols in MANETs

Varying Overhead Ad Hoc on Demand Vector Routing in Highly Mobile Ad Hoc Network

Performance Analysis of MANET Routing Protocols OLSR and AODV

Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model

2013, IJARCSSE All Rights Reserved Page 85

Simulation and Comparative Analysis of AODV, DSR, DSDV and OLSR Routing Protocol in MANET Abstract Keywords:

A Survey - Energy Efficient Routing Protocols in MANET

Routing Protocols in MANET: Comparative Study

Anil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput.

A Review Paper on Routing Protocols in Wireless Sensor Networks

COMPARISON OF DSR PROTOCOL IN MOBILE AD-HOC NETWORK SIMULATED WITH OPNET 14.5 BY VARYING INTERNODE DISTANCE

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET)

Performance Of OLSR Routing Protocol Under Different Route Refresh Intervals In Ad Hoc Networks

INTERNATIONAL JOURNAL FOR ADVANCE RESEARCH IN ENGINEERING AND TECHNOLOGY WINGS TO YOUR THOUGHTS..

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

Performance Evaluation of Two Reactive and Proactive Mobile Ad Hoc Routing Protocols

Throughput Analysis of Many to One Multihop Wireless Mesh Ad hoc Network

Performance Evaluation of AODV DSDV and OLSR Routing Protocols with Varying FTP Connections in MANET

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

ROUTE STABILITY MODEL FOR DSR IN WIRELESS ADHOC NETWORKS

IEEE s ESS Mesh Networking

Quantitative Performance Evaluation of DSDV and OLSR Routing Protocols in Wireless Ad-hoc Networks

Analysis of Routing Protocols in MANETs

Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power

Mobile Communications. Ad-hoc and Mesh Networks

Routing protocols in Mobile Ad Hoc Network

A Survey on Wireless Routing Protocols (AODV, DSR, DSDV)

A COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE AND IEEE

COMPARE AND CONTRAST OF AODV ROUTING PROTOCOL WITH E-AODV FOR WIRELESS MOBILE ADHOC NETWORK

Optimizing Performance of Routing against Black Hole Attack in MANET using AODV Protocol Prerana A. Chaudhari 1 Vanaraj B.

PERFORMANCE COMPARISON OF AODV AND DSR ROUTING PROTOCOL IN MOBILE AD-HOC NETWORK

MANET TECHNOLOGY. Keywords: MANET, Wireless Nodes, Ad-Hoc Network, Mobile Nodes, Routes Protocols.

Performance Analysis Of Qos For Different MANET Routing Protocols (Reactive, Proactive And Hybrid) Based On Type Of Data

A Survey on Path Weight Based routing Over Wireless Mesh Networks

Mitigating Superfluous Flooding of Control Packets MANET

Mobility and Density Aware AODV Protocol Extension for Mobile Adhoc Networks-MADA-AODV

Performance Comparison of AODV, DSDV and DSR Protocols in Mobile Networks using NS-2

OPNET BASED SIMULATION AND INVESTIGATION OF WIMAX NETWORK USING DIFFERENT QoS

3. Evaluation of Selected Tree and Mesh based Routing Protocols

Performance Analysis and Enhancement of Routing Protocol in Manet

A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET

IJMIE Volume 2, Issue 6 ISSN:

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks

Scalability Performance of AODV, TORA and OLSR with Reference to Variable Network Size

White Paper. Mobile Ad hoc Networking (MANET) with AODV. Revision 1.0

Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14

ENERGY BASED AODV ROUTING PROTOCOL FOR WIRELESS MESH NETWORK

Comprehensive Study and Review Various Routing Protocols in MANET

OPNET based Performance Evaluation of WIMAX Network with WIMAX Management using Different QoS

Computation of Multiple Node Disjoint Paths

Performance Analysis of AODV using HTTP traffic under Black Hole Attack in MANET

Introduction to Mobile Ad hoc Networks (MANETs)

ANALYSIS OF DIFFERENT REACTIVE, PROACTIVE & HYBRID ROUTING PROTOCOLS: A REVIEW

COMPARATIVE ANALYSIS AND STUDY OF DIFFERENT QOS PARAMETERS OF WIRELESS AD-HOC NETWORK

Performance Comparison of AODV, DSR, DSDV and OLSR MANET Routing Protocols

Considerable Detection of Black Hole Attack and Analyzing its Performance on AODV Routing Protocol in MANET (Mobile Ad Hoc Network)

Effect of Variable Bit Rate Traffic Models on the Energy Consumption in MANET Routing Protocols

Experiment and Evaluation of a Mobile Ad Hoc Network with AODV Routing Protocol

Performance of Ad-Hoc Network Routing Protocols in Different Network Sizes

Exploring the Behavior of Mobile Ad Hoc Network Routing Protocols with Reference to Speed and Terrain Range

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET

Performance Analysis of AODV, DSR and OLSR in MANET

Evaluation of Routing Protocols for Mobile Ad hoc Networks

Performance evaluation of reactive and proactive routing protocol in IEEE ad hoc network

International Journal of Advance Engineering and Research Development. Improved OLSR Protocol for VANET

Performance Tuning of OLSR and GRP Routing Protocols in MANET s using OPNET

Performance measurement of MANET routing protocols under Blackhole security attack

Multipath Routing Protocol for Congestion Control in Mobile Ad-hoc Network

SUMMERY, CONCLUSIONS AND FUTURE WORK

Performance Comparison and Analysis of DSDV and AODV for MANET

Performance Evaluation of AODV and DSR routing protocols in MANET

A Review of Reactive, Proactive & Hybrid Routing Protocols for Mobile Ad Hoc Network

A Study on Mobile Internet Protocol and Mobile Adhoc Network Routing Protocols

IMPLEMENTATION OF DYMO ROUTING PROTOCOL

BACKBONE NETWORK IN MESH NETWORKS

Relative Performance Analysis of Reactive (on-demand-driven) Routing Protocols

A Simulation study : Performance comparison of AODV and DSR

Lecture 13: Routing in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 3, Monday

MODIFICATION AND COMPARISON OF DSDV AND DSR PROTOCOLS

CLUSTER BASED ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS

Review on Packet Forwarding using AOMDV and LEACH Algorithm for Wireless Networks

Routing Protocols in Mobile Ad-Hoc Network

Different QoS Based TORA Reactive Routing Protocol using OPNET 14.5

A Novel Review on Routing Protocols in MANETs

Transcription:

Implementation of Quality of Services (QoS) for 802.16 Based Wireless Mesh Network Er. Gurpreet Kaur Research Scholar, CSE Department Guru Nanak Dev Engineering College, Ludhiana (Punjab) Er. Jasbir Singh Saini Associate Professor, CSE Department Guru Nanak Dev Engineering College, Ludhiana (Punjab) Abstract Day by day, the deployments of the networks are going beyond the imagination. Wireless mesh networks (WMNs) is dynamically self-organized and selfconfigured network with the nodes which automatically establishing and maintaining mesh connectivity among themselves. WiMAX technology provides wireless broadband service for fixed and/or mobile users. WiMAX Mesh Networks have two types of protocols. The Protocols at node level and protocols at the base station or access point level. In this paper, the basic node model has been modified to new node model, the nodes are able to re-route the data packets to other server that causes less packet loss or less data drop and improve the QoS for 802.16 based mesh networks. With the use of standard node model and modified node model simulation starts, accordingly the network discovers the route from source to destination and results have been calculated. OPNET has been used to evaluate the simulation results. Keywords: WMN, MANET, AODV, OLSR, BGP, NIC. 1. Introduction Wireless mesh networks (WMNs) is dynamically selforganized and self-configured, with the nodes in the network automatically establishing and maintaining the mesh connectivity with each other [1], [2]. This feature gives many advantages to WMNs such as low up-front cost, easy network maintenance, robustness, and reliable service coverage. A WMN includes mesh routers and mesh clients, mesh routers form the backbone of WMNs [1]. They provide network access for both mesh and conventional clients. Mesh clients can be either stationary or mobile and mesh routers have minimal mobility. Conventional nodes (e.g., desktops, laptops, PDAs, Pocket PCs, phones, etc.) can connect directly to wireless mesh routers, which are equipped with wireless network interface cards (NICs) [1]. Day by day, the deployments of the networks are going beyond the imagination. New network standards, new applications, applications of new standards are getting designed or under research. In recent years, the most revolutionary standard is 802.11 that came into picture in 1985. But as the usage of the networks increased, users required the wireless networks more flexible and easy to use. Users always need the networks ready to use and the networks that give the users free to move anywhere facility. By taking 802.11 base, research was carried out and new commercial standards like 802.15 (Wireless Personal Area Networks), 802.16 (WiMAX) came out as a result to meet the user requirements. IEEE standard 802.16 commonly known as Worldwide Interoperability of Microwave Access (WiMAX) [3].New technologies like MANETs, Mesh Networks is also designed for the deployment of different standards. Mesh Networks are a kind of personal internet. To get connected with different locations over the different geographical locations, firms need to get an internet connection from an Internet Service Provider (ISP) for which the firms have to pay big bounty to the ISPs [8]. Mesh Networks give an alternate to create a network of networks similar to the internet but smaller than the internet by passing to the ISPs. It is very important to understand all the pros and cons of the Mesh Network technology to make it more reliable and sustainable. Wireless broadband networks based on the IEEE 802.11 technology are being increasingly deployed as mesh networks to provide users with extended coverage for wireless Internet access [10]. A lot of research is going in the field of Mesh Networks in these days to extend to geographical limits 3754

of Mesh Networks, new optimized applications that could be used over the mesh networks, security procedures to ensure the integrity of the data exchanged over the mesh network etc. As the limits of mesh networks are increasing, users required them to be more flexible. Users required the use of various high data rate services like video conferencing, voice calling, online gaming etc. To deploy these kinds of networks data is affected. To reduce the effects like data drop, congestion etc. new node model, applications being introduced, it is compared and evaluated with the existing techniques efficiency. Performance is represented in graphical form. 2. Routing Protocols WiMAX Mesh Networks have two types of protocols. Protocols at node level (AODV, OLSR, DSR, DSDV etc) and protocols at the base station or access point level (BGP, RIP, IGRP etc) 2.1. Protocols at Node Level The Protocols that deals with the communication at the node level such that the communication takes place only between the nodes without the involvement of the access point. The node to node communication is a type of intracellular communication. 2.1.1. Ad-hoc On-Demand Distance Vector Routing Protocol (AODV). Ad Hoc on Demand Vector Routing Protocol (AODV) [5] adopts a very different mechanism to maintain routing information. The basic operations of AODV are Route (Path) Discovery for creating route from source to destination and Route (Path) Maintenance for dealing with topology changes. AODV is based upon the distance vector algorithm [7]. RREQ (Route REQuest), RREP (Route REPly), RERR (Route ERRor) packets are used by AODV. AODV routing protocol requests a route, when needed and there is no need to maintain routes to destinations that are not actively used in communication. Features of AODV protocol includes the loop freedom and the link breakages cause immediate notification to be sent to the affected nodes. It also uses routing tables to contain the information about the route and it relies on table entries to route RREP packets. Whenever a node wants to find or try to find a route to another node, it broadcasts a Route Request packet (RREQ) to all its neighbors. [4] The RREQ packet goes through the network until it reaches the destination of the packet [9]. RREP packet is generated to reply according to RREQ of the source node using the information of the route from the routing table. RREP is in reversible direction to RREQ. If any link breaks then RERR packet is generated to inform the neighboring nodes then all routes are discarded using that link. If source node moves and route to destination is still required then the Route Discovery process is reinitialized for the Route Maintenance operation. 2.1.2. Optimized Link State Routing Protocol (OLSR). Optimized Link State Routing Protocols is a proactive protocol [6]. The periodic nature of the protocol creates a large amount of overhead. In order to reduce the overhead, it limits the number of mobile nodes that can forward network wide traffic and for this purpose it uses Multi Point Relays (MPRs), which are responsible for forwarding routing messages. Mobile nodes which are selected as MPRs, can forward control traffic and reduce the size of control message. Every node selects a group of MPRs from its one hop neighbors. MPRs are selected by a node such that it may reach the two hop neighbor via at least one MPR. The MPRs used for forwarding the control traffic generated by that node. All the mobile nodes periodically broadcast a list of its MPR selectors instead of the whole list of neighbors. MPRs advertise link state information periodically in control messages for MPR selection. The routes are changed due to mobility and topology control (TC) messages are broadcasted throughout the network. All mobile nodes have the routing table that have the information of the routes to all reachable destination nodes. OLSR does not immediately notify the source after detecting a broken link and source node comes to know that route is broken, when the intermediate node broadcast its next packets. 2.2. Protocols at Access Point Level The Protocols that deals with inter cell communication and route the data between the nodes from one cell to others. 2.2.1. Border Gateway Protocol (BGP). Border Gateway Protocol (BGP) is protocol that is design to exchange information between the Autonomous Systems (AS). This routing protocol is designed for internet and it is responsible for maintenance of table of Internet protocol networks which authorize network reaching capability between AS. The Border Gateway Protocol (BGP) is also expressed as path vector protocol. It takes the routing decisions according to the policies, rules and path. It is developed to replace the Exterior Gateway Protocol (EGP) routing protocol. It plays key role for internet service. 3755

3. Simulation and Performance Metrics Figure 3.1 shows the simulation environment of scenarios. 3.1. Simulation Environment The OPNET modeler 14.0 has been used to evaluate the Quality of Services for 802.16 based mesh networks to gather the results about the performance of the networks. Different networks having different features have been developed. To implement the 802.16 functionalities 15 servers, 15 Base Stations having 20 SSs (Subscriber Stations) in each cell have been used in scenarios. Each BS covers hexagonal structure geographic area in which node to node communication without the involvement of access points is done that is a type of intracellular communication. If the communication is between the different cells with the involvement of the access points then it is intercellular communication. So the nodes can communication with and without the involvement of the access points. WiMAX Mesh Networks have two types of protocols. Protocols at node level and protocols at the base station or access point level. The node level protocols are those in which communication takes place only between the nodes with intracellular communication. The node level protocol includes both proactive and reactive protocols such as AODV, OLSR, DSR, DSDV etc. The Access Point Level protocols are the protocols that deal with inter cell communication and route the data between the nodes from one cell to others. The access point level protocol includes BGP, RIP, IGRP etc. Client- Server applications are those that runs on client node and makes request to remote server and must installed on each node. Three different applications have been taken based on client-server architecture. Those are Email, FTP (File Transfer Protocol), HTTP (HyperText Transfer Protocol). Two ad-hoc routing protocols have been used at the node level which are AODV and OLSR. At access point level BGP routing protocol is used. Priority queuing is used for networks. A queue which has more packets than its maximum queue size those packets are dropped. A queue can store packets whatever the size of queue when this value is reached network is in the state of congestion. This means that a queue which has more packets than its maximum queue size will drop incoming packets until either maximum number of packets drops. While this value is not reached, a queue can store packets, whatever the size of the queue. When this value is reached the interface is in a state of congestion. RED (Random Early Detection) algorithm is used to avoid the congestion. RED has the ability to recognize and act upon congestion on output direction of interface so as to reduce or minimize the effect of that congestion by dropping packets randomly. Figure 3.1 Scenario deploying WiMAX The parameters are used with some specific values to evaluate the performance of scenarios. The parameters that have been used in the following experiments are summarized in Table 1. Table 1. Parameters for Simulation ATTRIBUTE Technology Model Family Physical Profile Applications Nodes 300 Simulation Time Routing Protocols VALUES WiMAX WiMAX Wireless OFDMA 20MHz Email/FTP/HTTP 3600 Seconds AODV/OLSR/BGP When the simulation starts, the network discovers the optimal route from source to destination. When there is lot of load of packets for destination nodes or intermediate nodes. Then the load of network, throughput, utilization, and queuing delay metrics are affected. To reduce load, packet loss, buffer overflow, 3756

congestion the node model has been slightly modified. The new or modified node model perform as standard node model but it can re-route the path of packet when it is sent from source to destination if queue of receiving node is full and there is condition of data drop. In the scenarios using new node model, the nodes are able to re-route the data packets to other server on achieving the threshold of a server that cause in the less buffer overflow and less data dropped. There is less data drop and congestion because the re-routing of the data packets from the overflowed server to the under flowed server can make the data packets not be dropped and make their delivery more reliable. Then performance of new node model has been calculated using different metrics. model under different types of data traffic generated by using different types of applications (Email, FTP and HTTP). In the graphs, it has shown that for Email application, the load for the network new node model has decreased by 4.435%. Similarly, for HTTP the load is decreased by 2.587%.But a minute increase of 1.202% in the load has seen for FTP. 3.2. Performance Metrics Performance metrics are used for evaluation of performance. They represent different characteristics of the overall network performance. Average Queuing Delay(sec) The Average Queuing Delay represents instantaneous measurements of packet waiting times in the transmitter channel's queue. Measurements are taken from the time a packet enters the transmitter channel queue to the time the last bit of the packet is transmitted. Average Throughput(packet/sec) The Average Throughput represents the average number of packets successfully received or transmitted by the receiver or transmitter channel per second. Average Utilization The Average Utilization represents the percentage of the consumption to date of an available channel bandwidth, where a value of 100.0 would indicate full usage. Load(bits/sec) Load represents the total load (in bits/sec) submitted to WiMAX layers by all higher layers in all WiMAX nodes of the network. 4. Results and Analysis Figure 4.1 Load for AODV Protocol 4.2. Load for OLSR In figure 4.2, the load for OLSR protocol has increased for all the networks using new node model except the network using HTTP application. Comparison of original and modified node model is shown in these figures according to the parameters of different scenarios. 4.1. Load for AODV The figure 4.1 depicts the load possessed by the network using standard node model and modified node Figure 4.2 Load for OLSR Protocol In the case of the new node model based networks using Email and FTP applications, the network load has increased by 47.56% for both networks from the networks using the standard node models. Whereas for the new node model based network using HTTP 3757

application, the load possessed has decreased by 3.19%. 4.3. Average Queuing Delay for AODV For Email application, the queuing delay has decreased by 75.22% for the new node model based network configured by using a reactive protocol i.e. AODV. The queuing delay has decreased by 38.52% as well for FTP application for new node model network. The highest decrement in queuing delay has shown by HTTP application that is of 78.01 % for AODV protocol because of the less intermediate processing shown in figure 4.3. Figure 4.4 Average Queuing Delay for OLSR 4.5. Average Utilization for AODV Figure 4.3 Average Queuing Delay for AODV Figure 4.5 shows the average utilization for reactive protocol, such that AODV. 4.4. Average Queuing Delay for OLSR In figure 4.4, the average queuing delay has decreased by 74.17% for the new node model based network using Email application. For the new node model based network using FTP application, the queuing delay has decreased by 38.78% and for the network using HTTP application; the delay has decreased by 79.97%. It is due to its proactive nature, generally OLSR always possess less queuing delay for the data packets in the network because in reactive protocols i.e. AODV, once the packet has generated, it has to wait in the queue of the sender for its dispatch till the formation of the route between the sender and the receiver. But in the case of proactive protocols i.e. OLSR, in spite of creating routes on demand, all the routes are available in the route cache of every node. Once the packet has generated, the route has chosen according to the destination address present in the data packet. This helps to reduce the average queuing delay in the network. Figure 4.5 Average Utilization for AODV The graph depicts that the average utilization for the network deployed by using newly designed node models using Email application has increased by 44.81% and for the network using FTP application for data generation has increased by 18.36%. Due to which there is always under utilization of the available bandwidth for FTP application. The maximum increment in bandwidth utilization has seen for the network using HTTP, such that the utilization has increased by 56.83%. 3758

4.6. Average Utilization for OLSR Figure 4.6 shows the average utilization of the channel bandwidth possessed by the network configured by using OLSR protocol using different applications. The average utilization of channel for the new node model based network using Email application to generate data has increased by 40.85%. For the network using FTP application, the increment in the utilization is of 27.76% and for HTTP application deployed in new node model network; the utilization of the channel bandwidth has increased by 63.16 % from the utilization of channel possessed by the network of standard node models. Figure 4.7 Average Throughput for AODV 4.8. Average Throughput for OLSR Figure 4.6 Average Utilization for OLSR 4.7. Average Throughput for AODV Average Throughput of the networks based on new node model and standard node model using different types of applications configured by using a proactive protocol, such that OLSR has shown in figure 4.8. For the new node model network using Email application for the data generation and configured by using OLSR routing protocol, the average throughput has increased by 40.58%. The Figure 4.7 shown the average throughput possessed by the network configured by using a reactive protocol, AODV under different applications generating different types of data. The rendered graph depicts that the average throughput for the network designed by using new node model using Email application to generate data in the network has increased by 44.61% from the network using standard node models using same application under same configuration. For the network based on new node model using FTP application, the average throughput has increased by 18.08% and the same network using HTTP application, the average throughput has increased by 56.18% from the network based on standard node models using same applications. Figure 4.8 Average Throughput for OLSR When the data generated in the network is of FTP application then the average throughput of the network has increased by 20.02% and for HTTP application, the average throughput has increased by 62.68%. 3759

5. Conclusions and Future Scope In this work, various 802.16 Mesh Network test beds have been developed in order to evaluate and enhance the performance in terms of various parameters like Load, Average Queuing Delay, Average Throughput, and Average Utilization. Scenarios have been developed using OPNET simulator having BSs, SSs, and servers. To evaluate the results from scenarios, node level protocols such as reactive AODV, proactive OLSR, access point level BGP protocol and different types of data traffic generated by using different types of applications (Email, FTP and HTTP). The basic node model has been slightly modified to new node model, the nodes are able to re-route the data packets to other server that causes less packet loss or less data drop and improve the Quality of services for 802.16 based mesh networks. The results obtained during the experimentation shows an improvement as compared to the standard. There is scope to improve the work done by increasing the number of cells in the network along with increasing the number of nodes in each cell to increase the density of the nodes in the networks from the perspective of to generate more data in the network to stretch the working of the networks to their maximum limits. In the given work, only client-server architecture based applications such as HTTP, FTP and Email have been used. To make the designed networks more versatile, peer to peer applications such as video conferencing, voice calling etc may be used and the results of other performance evaluation metrics could be considered to make the concluded results more justified. 6. References 1. Akyildiz, I.F and Wang, X. (2005), A Survey on Wireless Mesh Networks, In Communications Magazine of IEEE, Vol. 43, pp. S23-S30. 2. Guardalben, L., Villalba, L.J.G., Buiati, F., Camponogara, E. (2011), Self-Configuration and Self- Optimization Process in Heterogeneous Wireless Networks Open Access Journal on the Science and Technology of Sensors and Biosensors, ISSN 1424-8220 3. Li, Y., Yang, Y., Cao, C., Zhou, L. (2009), QoS Issues in IEEE 802.16 Mesh Networks In proceeding 1st International Conference on Information Science and Engineering, pp. 2687-2690. 4. M., V., Patel, A., Kulkarni, L.(2010), QOS Parameter Analysis on AODV AND DSDV Protocols in a Wireless Network In Proceeding Indian Journal of Computer Science and Engineering, Vol. 1, No. 4, pp. 283-294. 5. Rajkumar, G., Kasiram, R., Parthiban, D. (2012), Optimizing Throughput with Reduction in Power Consumption and Performance Comparison of DSR and AODV Routing Protocols In proceeding of 2012 International Conference on Computing, Electronics and Electrical Technologies, pp. 943-947. 6. Rao, S.S.N., Krishna Y.K.S., Rao, K.N. (2011), A Survey: Routing Protocols for Wireless Mesh Networks, Proceeding International Journal of Research and Reviews in Wireless sensor Networks, Vol. 1, No. 3, ISSN: 2047-0037. 7. Royer, E. M., Chai-Keong Toh, S. B. (1999), A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks IEEE Personal Communications, Vol. 6, Issue 2, pp: 46-55. 8. Seyedzadegan, M., Othman, M., Ali, B. M., Subramaniam, S. (2011), Wireless Mesh Networks: WMN Overview, WMN Architecture In proceeding of 2011 International Conference on Communication Engineering and Networks, Vol. 19, pp. 12-18. 9. Tuteja, A., Gujral, R., Thalia, S. (2010), Comparative Performance Analysis of DSDV,AODV and DSR Routing Protocols in MANET using NS2 In proceeding International Conference on Advances in Computer Engineering, pp. 330-333. 10. Wu, T. and Hsieh, H. (2007), "Interworking Wireless Mesh Networks: Performance Characterization, and Perspectives In Proceeding of Global Telecommunications Conference, GLOBECOM 07, pp. 4846-4851. 3760