\relax 
\@writefile{toc}{\contentsline {leads}{\numberline {}ABSTRACT}{iv}}
\@writefile{toc}{\contentsline {leads}{\numberline {}\"OZ}{vi}}
\@writefile{toc}{\contentsline {leads}{\numberline {}DEDICATON}{viii}}
\@writefile{toc}{\contentsline {leads}{\numberline {}ACKNOWLEDGMENTS}{ix}}
\@writefile{toc}{\contentsline {leads}{\numberline {}TABLE OF CONTENTS}{x}}
\@writefile{toc}{\contentsline {leads}{\numberline {}LIST OF TABLES}{xii}}
\@writefile{toc}{\contentsline {leads}{\numberline {}LIST OF FIGURES}{xiii}}
\@writefile{toc}{\contentsline {leads}{\numberline {}LIST OF ABBREVIATIONS}{xvi}}
\@writefile{toc}{\contentsline {nodots}{\numberline {}CHAPTERS}{1}}
\@writefile{lof}{\contentsline {nodots}{\numberline {}FIGURES}{1}}
\@writefile{lot}{\contentsline {nodots}{\numberline {}TABLES}{1}}
\@writefile{toc}{\contentsline {chapter}{\numberline {1}INTRODUCTION}{1}}
\@writefile{lof}{\addvspace {10pt}}
\@writefile{lot}{\addvspace {10pt}}
\newlabel{chp:introduction}{{1}{1}}
\@writefile{toc}{\contentsline {chapter}{\numberline {2}BACKGROUND}{4}}
\@writefile{lof}{\addvspace {10pt}}
\@writefile{lot}{\addvspace {10pt}}
\newlabel{chp:background}{{2}{4}}
\@writefile{toc}{\contentsline {section}{\numberline {2.1}WiMAX Standards}{4}}
\@writefile{lot}{\contentsline {table}{\numberline {2.1}{\ignorespaces IEEE 802.16 Projects and Standards}}{5}}
\newlabel{tab:IEEE80216ProjectsAndStandards}{{2.1}{5}}
\@writefile{toc}{\contentsline {subsection}{\numberline {2.1.1}IEEE 802.16}{6}}
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.1.1.1}IEEE 802.16 OFDMA PHY}{6}}
\@writefile{lof}{\contentsline {figure}{\numberline {2.1}{\ignorespaces OFDMA Frequency description [7]}}{6}}
\newlabel{fig:chapter2_0}{{2.1}{6}}
\@writefile{lof}{\contentsline {figure}{\numberline {2.2}{\ignorespaces Example OFDMA Frame [7]}}{7}}
\newlabel{fig:chapter2_1}{{2.2}{7}}
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.1.1.2}IEEE 802.16 MAC}{7}}
\@writefile{lof}{\contentsline {figure}{\numberline {2.3}{\ignorespaces IEEE 802.16 Reference Model [8]}}{8}}
\newlabel{fig:chapter2_2}{{2.3}{8}}
\@writefile{lof}{\contentsline {figure}{\numberline {2.4}{\ignorespaces MAC PDU Format}}{9}}
\newlabel{fig:chapter2_3}{{2.4}{9}}
\@writefile{lot}{\contentsline {table}{\numberline {2.2}{\ignorespaces MAC Management Messages [7]}}{10}}
\newlabel{tab:MACManagementMessages}{{2.2}{10}}
\@writefile{lot}{\contentsline {table}{\numberline {2.3}{\ignorespaces QoS Classes [8]}}{11}}
\newlabel{tab:QoSClasses}{{2.3}{11}}
\@writefile{lof}{\contentsline {figure}{\numberline {2.5}{\ignorespaces Initialization of SS [7]}}{13}}
\newlabel{fig:chapter2_4}{{2.5}{13}}
\@writefile{lof}{\contentsline {figure}{\numberline {2.6}{\ignorespaces Network Initialization and Handover [7]}}{14}}
\newlabel{fig:chapter2_5}{{2.6}{14}}
\@writefile{toc}{\contentsline {subsection}{\numberline {2.1.2}IEEE 802.16j Multihop Relay Specification}{15}}
\@writefile{lof}{\contentsline {figure}{\numberline {2.7}{\ignorespaces Examples of usage scenarios for fixed (F-Rs), nomadic (N-RS), and mobile stations (M-RS) [3]}}{15}}
\newlabel{fig:chapter2_6}{{2.7}{15}}
\@writefile{lof}{\contentsline {figure}{\numberline {2.8}{\ignorespaces Usage scenario for transparent relays}}{16}}
\newlabel{fig:chapter2_7}{{2.8}{16}}
\@writefile{lof}{\contentsline {figure}{\numberline {2.9}{\ignorespaces Usage scenarios for non-transparent relays}}{17}}
\newlabel{fig:chapter2_8}{{2.9}{17}}
\@writefile{lot}{\contentsline {table}{\numberline {2.4}{\ignorespaces Comparison between transparent and non-transparent modes of operation [2]}}{17}}
\newlabel{tab:ComparisonBtTransNontrans}{{2.4}{17}}
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.1.2.1}PHY Layer Specification}{18}}
\@writefile{lof}{\contentsline {figure}{\numberline {2.10}{\ignorespaces IEEE 802.16j Relay Frame Structure [1]}}{18}}
\newlabel{fig:chapter2_9}{{2.10}{18}}
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2.1.2.2}MAC Layer Specification}{18}}
\@writefile{lot}{\contentsline {table}{\numberline {2.5}{\ignorespaces Relay MAC Management Messages}}{19}}
\newlabel{tab:RelayMACMngPack}{{2.5}{19}}
\@writefile{lof}{\contentsline {figure}{\numberline {2.11}{\ignorespaces CID based connection management}}{20}}
\newlabel{fig:chapter2_10}{{2.11}{20}}
\@writefile{lof}{\contentsline {figure}{\numberline {2.12}{\ignorespaces Perform neighbor measurement report at a RS}}{21}}
\newlabel{fig:chapter2_12}{{2.12}{21}}
\@writefile{lof}{\contentsline {figure}{\numberline {2.13}{\ignorespaces Handling RS Measurement Report}}{21}}
\newlabel{fig:chapter2_13}{{2.13}{21}}
\@writefile{lof}{\contentsline {figure}{\numberline {2.14}{\ignorespaces Network reentry after path selection}}{22}}
\newlabel{fig:chapter2_14}{{2.14}{22}}
\@writefile{lof}{\contentsline {figure}{\numberline {2.15}{\ignorespaces CID assignment in embedded path management}}{22}}
\newlabel{fig:chapter2_15}{{2.15}{22}}
\@writefile{toc}{\contentsline {section}{\numberline {2.2}Mobile IP}{23}}
\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.1}Overview of Protocol}{23}}
\@writefile{lof}{\contentsline {figure}{\numberline {2.16}{\ignorespaces CID based connection management}}{24}}
\newlabel{fig:chapter2_16}{{2.16}{24}}
\@writefile{lof}{\contentsline {figure}{\numberline {2.17}{\ignorespaces CID assignment in embedded path management}}{25}}
\newlabel{fig:chapter2_17}{{2.17}{25}}
\@writefile{toc}{\contentsline {chapter}{\numberline {3}LITERATURE SURVEY}{26}}
\@writefile{lof}{\addvspace {10pt}}
\@writefile{lot}{\addvspace {10pt}}
\newlabel{chp:literaturesurvey}{{3}{26}}
\@writefile{toc}{\contentsline {section}{\numberline {3.1}Shortcut Routing}{26}}
\@writefile{lof}{\contentsline {figure}{\numberline {3.1}{\ignorespaces Communication path of the MR networks [11]}}{27}}
\newlabel{fig:chapter3_1}{{3.1}{27}}
\@writefile{lof}{\contentsline {figure}{\numberline {3.2}{\ignorespaces DSA message flow in 802.16j and local forwarding}}{28}}
\newlabel{fig:chapter3_2}{{3.2}{28}}
\@writefile{toc}{\contentsline {section}{\numberline {3.2}Path Selection}{28}}
\@writefile{lof}{\contentsline {figure}{\numberline {3.3}{\ignorespaces Path selection of RS}}{29}}
\newlabel{fig:chapter3_3}{{3.3}{29}}
\@writefile{lof}{\contentsline {figure}{\numberline {3.4}{\ignorespaces Network Entry with path selection}}{30}}
\newlabel{fig:chapter3_4}{{3.4}{30}}
\@writefile{lot}{\contentsline {table}{\numberline {3.1}{\ignorespaces IEEE 802.16 Projects and Standards}}{30}}
\newlabel{tab:chapter3_1}{{3.1}{30}}
\@writefile{lof}{\contentsline {figure}{\numberline {3.5}{\ignorespaces An Example of MALF}}{31}}
\newlabel{fig:chapter3_5}{{3.5}{31}}
\@writefile{toc}{\contentsline {chapter}{\numberline {4}PROPOSED METHODS FOR TRAFIC AWARE ROUTING IN IEEE 802.16J NON-TRANSPARENT NETWORKS}{33}}
\@writefile{lof}{\addvspace {10pt}}
\@writefile{lot}{\addvspace {10pt}}
\newlabel{chp:workdone}{{4}{33}}
\@writefile{lof}{\contentsline {figure}{\numberline {4.1}{\ignorespaces IEEE 802.16j Non-transparent network}}{34}}
\newlabel{fig:chapter4_1}{{4.1}{34}}
\@writefile{toc}{\contentsline {section}{\numberline {4.1}Shortcut Routing}{34}}
\@writefile{toc}{\contentsline {subsection}{\numberline {4.1.1}Assumptions}{34}}
\@writefile{toc}{\contentsline {subsection}{\numberline {4.1.2}Cross Layer for Shortcut Routing}{35}}
\@writefile{lof}{\contentsline {figure}{\numberline {4.2}{\ignorespaces Multihop path creation procedure}}{35}}
\newlabel{fig:chapter4_2}{{4.2}{35}}
\@writefile{lof}{\contentsline {figure}{\numberline {4.3}{\ignorespaces Adding Cross Layer to RS protocol stack}}{36}}
\newlabel{fig:chapter4_3}{{4.3}{36}}
\@writefile{lof}{\contentsline {figure}{\numberline {4.4}{\ignorespaces Shortcut Routing with Cross Layer}}{38}}
\newlabel{fig:chapter4_4}{{4.4}{38}}
\@writefile{toc}{\contentsline {section}{\numberline {4.2}Hierarchical Addressing and Routing for IEEE 802.16j Multihop Relay Networks}{39}}
\@writefile{lof}{\contentsline {figure}{\numberline {4.5}{\ignorespaces Hierarchical IP Address Assignment for 802.16j Network}}{40}}
\newlabel{fig:chapter4_5}{{4.5}{40}}
\@writefile{toc}{\contentsline {section}{\numberline {4.3}Enhanced Mobile IP for Shortcut Routing Enabled IEEE 802.16j Networks}{41}}
\@writefile{lof}{\contentsline {figure}{\numberline {4.6}{\ignorespaces Care of Address Assignment after Access Station Change}}{42}}
\newlabel{fig:chapter4_6}{{4.6}{42}}
\@writefile{lof}{\contentsline {figure}{\numberline {4.7}{\ignorespaces IP Address Assignment before Handover}}{43}}
\newlabel{fig:chapter4_7}{{4.7}{43}}
\@writefile{lof}{\contentsline {figure}{\numberline {4.8}{\ignorespaces Mobility Binding List and Visitor List after handover}}{44}}
\newlabel{fig:chapter4_8}{{4.8}{44}}
\@writefile{toc}{\contentsline {section}{\numberline {4.4}Traffic Aware Path Selection for Shortcut Routing Enabled IEEE 802.16j Multihop Relay Networks}{45}}
\@writefile{toc}{\contentsline {subsection}{\numberline {4.4.1}Path Selection Metrics}{45}}
\@writefile{lof}{\contentsline {figure}{\numberline {4.9}{\ignorespaces MCS metric}}{46}}
\newlabel{fig:chapter4_9}{{4.9}{46}}
\@writefile{toc}{\contentsline {subsection}{\numberline {4.4.2}Integration with IEEE 802.16j Standard}{47}}
\@writefile{lof}{\contentsline {figure}{\numberline {4.10}{\ignorespaces Path Selection of MS at Network Entry}}{48}}
\newlabel{fig:chapter4_10}{{4.10}{48}}
\@writefile{lof}{\contentsline {figure}{\numberline {4.11}{\ignorespaces MS access station change in operational state}}{49}}
\newlabel{fig:chapter4_11}{{4.11}{49}}
\@writefile{lof}{\contentsline {figure}{\numberline {4.12}{\ignorespaces Access station change for operational RS}}{50}}
\newlabel{fig:chapter4_12}{{4.12}{50}}
\@writefile{toc}{\contentsline {subsection}{\numberline {4.4.3}Path Selection Method}{50}}
\@writefile{lof}{\contentsline {figure}{\numberline {4.13}{\ignorespaces Sent and Receive Data Metric Usage Scenario}}{51}}
\newlabel{fig:chapter4_13}{{4.13}{51}}
\@writefile{loa}{\contentsline {algorithm}{\numberline {1}{\ignorespaces $path\_select(N)$}}{53}}
\@writefile{loa}{\contentsline {algorithm}{\numberline {2}{\ignorespaces $rate\_station (S)$}}{53}}
\@writefile{toc}{\contentsline {chapter}{\numberline {5}SIMULATION RESULTS}{55}}
\@writefile{lof}{\addvspace {10pt}}
\@writefile{lot}{\addvspace {10pt}}
\newlabel{chp:simulation}{{5}{55}}
\@writefile{toc}{\contentsline {section}{\numberline {5.1}Simulation Environment}{55}}
\@writefile{toc}{\contentsline {subsection}{\numberline {5.1.1}NCTUns 6.0}{56}}
\@writefile{lof}{\contentsline {figure}{\numberline {5.1}{\ignorespaces Kernel Reentering Methodology}}{56}}
\newlabel{fig:chapter5_1}{{5.1}{56}}
\@writefile{lof}{\contentsline {figure}{\numberline {5.2}{\ignorespaces NCTUns Module Based Platform [17]}}{57}}
\newlabel{fig:chapter5_2}{{5.2}{57}}
\@writefile{toc}{\contentsline {subsubsection}{\numberline {5.1.1.1}Protocol Stacks of IEEE 802.16j Non-transparent Mode Networks in NCTUns}{57}}
\@writefile{lof}{\contentsline {figure}{\numberline {5.3}{\ignorespaces Protocol Stacks of IEEE 802.16j Non-transparent Mode in NCTUns}}{58}}
\newlabel{fig:chapter5_3}{{5.3}{58}}
\@writefile{lof}{\contentsline {figure}{\numberline {5.4}{\ignorespaces Procedure of packet scheduling in superordinate stations [17]}}{59}}
\newlabel{fig:chapter5_4}{{5.4}{59}}
\@writefile{toc}{\contentsline {subsubsection}{\numberline {5.1.1.2}Modification for Shortcut Routing}{59}}
\@writefile{lof}{\contentsline {figure}{\numberline {5.5}{\ignorespaces Protocol Stack of RS after modification}}{59}}
\newlabel{fig:chapter5_5}{{5.5}{59}}
\@writefile{toc}{\contentsline {subsection}{\numberline {5.1.2}WiMAX Multihop Relay Simulator}{60}}
\@writefile{lof}{\contentsline {figure}{\numberline {5.6}{\ignorespaces Simulation Model}}{61}}
\newlabel{fig:chapter5_6}{{5.6}{61}}
\@writefile{lof}{\contentsline {figure}{\numberline {5.7}{\ignorespaces Discrete Time Simulation Logic}}{61}}
\newlabel{fig:chapter5_7}{{5.7}{61}}
\@writefile{toc}{\contentsline {section}{\numberline {5.2}Topologies and Simulation Results}{61}}
\@writefile{toc}{\contentsline {subsection}{\numberline {5.2.1}Scenario 1}{62}}
\@writefile{lof}{\contentsline {figure}{\numberline {5.8}{\ignorespaces Topology and Traffic description for scenario 1}}{62}}
\newlabel{fig:chapter5_8}{{5.8}{62}}
\@writefile{toc}{\contentsline {subsection}{\numberline {5.2.2}Scenario 2}{62}}
\@writefile{lof}{\contentsline {figure}{\numberline {5.9}{\ignorespaces Topology and Traffic description for scenario 2}}{63}}
\newlabel{fig:chapter5_9}{{5.9}{63}}
\@writefile{toc}{\contentsline {subsection}{\numberline {5.2.3}Scenario 3}{63}}
\@writefile{lof}{\contentsline {figure}{\numberline {5.10}{\ignorespaces Topology and Traffic description for scenario 3}}{63}}
\newlabel{fig:chapter5_10}{{5.10}{63}}
\@writefile{toc}{\contentsline {subsection}{\numberline {5.2.4}Scenario 4}{64}}
\@writefile{lof}{\contentsline {figure}{\numberline {5.11}{\ignorespaces Topology and Traffic description for scenario 4}}{64}}
\newlabel{fig:chapter5_11}{{5.11}{64}}
\@writefile{toc}{\contentsline {subsection}{\numberline {5.2.5}Scenario 5}{64}}
\@writefile{lof}{\contentsline {figure}{\numberline {5.12}{\ignorespaces Path selection results with traditional metrics for scenario 5}}{65}}
\newlabel{fig:chapter5_12}{{5.12}{65}}
\@writefile{lof}{\contentsline {figure}{\numberline {5.13}{\ignorespaces Path selection results with traffic aware metrics for scenario 5}}{65}}
\newlabel{fig:chapter5_13}{{5.13}{65}}
\@writefile{toc}{\contentsline {subsection}{\numberline {5.2.6}Scenario 6}{65}}
\@writefile{lof}{\contentsline {figure}{\numberline {5.14}{\ignorespaces Path selection results with traditional metrics for scenario 6}}{66}}
\newlabel{fig:chapter5_14}{{5.14}{66}}
\@writefile{lof}{\contentsline {figure}{\numberline {5.15}{\ignorespaces Path selection results with traffic aware for scenario 6}}{66}}
\newlabel{fig:chapter5_15}{{5.15}{66}}
\@writefile{toc}{\contentsline {subsection}{\numberline {5.2.7}Scenario 7}{66}}
\@writefile{lof}{\contentsline {figure}{\numberline {5.16}{\ignorespaces Base Topology}}{67}}
\newlabel{fig:chapter5_16}{{5.16}{67}}
\@writefile{lof}{\contentsline {figure}{\numberline {5.17}{\ignorespaces Uniformly Distributed MSs on Base Topology}}{68}}
\newlabel{fig:chapter5_17}{{5.17}{68}}
\@writefile{lot}{\contentsline {table}{\numberline {5.1}{\ignorespaces Abbreviations for Simulation Results of Different Methods}}{69}}
\newlabel{tab:chapter5_1}{{5.1}{69}}
\@writefile{lof}{\contentsline {figure}{\numberline {5.18}{\ignorespaces Simulation results for all traffic destinations are outside the region}}{70}}
\newlabel{fig:chapter5_18}{{5.18}{70}}
\@writefile{lof}{\contentsline {figure}{\numberline {5.19}{\ignorespaces Average latency of a packet where probability of selecting destination from same region is 0}}{71}}
\newlabel{fig:chapter5_24}{{5.19}{71}}
\@writefile{lof}{\contentsline {figure}{\numberline {5.20}{\ignorespaces Simulation results for probability of traffic destination being in same region with source is 0.25}}{72}}
\newlabel{fig:chapter5_19}{{5.20}{72}}
\@writefile{lof}{\contentsline {figure}{\numberline {5.21}{\ignorespaces Average latency of a packet where probability of selecting destination node from same region is 0.25}}{73}}
\newlabel{fig:chapter5_25}{{5.21}{73}}
\@writefile{lof}{\contentsline {figure}{\numberline {5.22}{\ignorespaces Simulation results for probability of traffic destination being in same region with source is 0.5}}{74}}
\newlabel{fig:chapter5_20}{{5.22}{74}}
\@writefile{lof}{\contentsline {figure}{\numberline {5.23}{\ignorespaces Average latency of a packet where probability of selecting destination from same region is 0.5}}{75}}
\newlabel{fig:chapter5_26}{{5.23}{75}}
\@writefile{lof}{\contentsline {figure}{\numberline {5.24}{\ignorespaces Simulation results for probability of traffic destination being in same region with source is 0.75}}{76}}
\newlabel{fig:chapter5_21}{{5.24}{76}}
\@writefile{lof}{\contentsline {figure}{\numberline {5.25}{\ignorespaces Average latency of a packet where probability of selecting destination from same region is 0.75}}{77}}
\newlabel{fig:chapter5_27}{{5.25}{77}}
\@writefile{lof}{\contentsline {figure}{\numberline {5.26}{\ignorespaces Simulation results for probability of the traffic destination being in the same region with the source is 1}}{78}}
\newlabel{fig:chapter5_22}{{5.26}{78}}
\@writefile{lof}{\contentsline {figure}{\numberline {5.27}{\ignorespaces Average latency of a packet where probability of selecting destination from same region is 1}}{79}}
\newlabel{fig:chapter5_28}{{5.27}{79}}
\@writefile{lof}{\contentsline {figure}{\numberline {5.28}{\ignorespaces Behaviors of algorithms according to the rate of regional traffic}}{80}}
\newlabel{fig:chapter5_23}{{5.28}{80}}
\@writefile{toc}{\contentsline {section}{\numberline {5.3}Comments}{81}}
\@writefile{toc}{\contentsline {chapter}{\numberline {6}CONCLUSION AND FUTURE WORKS}{82}}
\@writefile{lof}{\addvspace {10pt}}
\@writefile{lot}{\addvspace {10pt}}
\newlabel{chp:conclusion}{{6}{82}}
\bibcite{1}{1}
\bibcite{2}{2}
\bibcite{3}{3}
\bibcite{4}{4}
\bibcite{5}{5}
\bibcite{6}{6}
\bibcite{7}{7}
\bibcite{8}{8}
\bibcite{9}{9}
\bibcite{10}{10}
\bibcite{11}{11}
\bibcite{12}{12}
\bibcite{13}{13}
\@writefile{toc}{\contentsline {leads}{\numberline {}\uppercase {REFERENCES}}{86}}
\bibcite{14}{14}
\bibcite{15}{15}
\bibcite{16}{16}
\bibcite{17}{17}
\bibcite{18}{18}
\bibcite{19}{19}
\bibcite{20}{20}
\bibcite{21}{21}
\bibcite{22}{22}
\bibcite{23}{23}
\bibcite{24}{24}
\bibcite{25}{25}
\bibcite{26}{26}
\bibcite{27}{27}
\newlabel{`@lastpage'}{{6}{87}}
