SlideShare una empresa de Scribd logo
1 de 6
Descargar para leer sin conexión
V. V. N. S. S. L. M. Anusha. K, Dr. M. Sailaja / International Journal of Engineering Research
and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.2049-2054
2049 | P a g e
Efficient and Adaptable Technology Based VHOM Scheme in
UMTS/WLANOverlay Networks
V.V.N.S.S.L.M.Anusha.K*, Dr.M.Sailaja**
*(M.Tech, Dept.of ECE, University College of Engineering-JNTUK, Kakinada, India
**(Professor Dept.of ECE, University College of Engineering-JNTUK, Kakinada, India
ABSTRACT
The integration of UMTS and WLAN has
been seen as a promising approach toward 4G. I
am going to analyze different important issues for
the interworking of UMTS and WLAN networks.
SoI proposed a tightly coupled interworking
structure and my proposed schemes can keep
stations always being best connected due to ad-hoc
nature that means An adhoc network is a
collection of wireless mobile nodes dynamically
forming a temporary network without the use of
any existing networkinfrastructure or centralized
administration but in this paperi have considered
the device which has free channel it can share to
requester otherwise not.
Keywords-UMTS, WLAN, mobility, 4G, Ad-hoc
Network (as cognitive).
I. INTRODUCTION
Mobility is the very important feature of a
wireless cellular communication system. Normally,
continuous service is achieved by supporting handoff
(or handover) from one cell to another. Smaller cells
because an active mobile station (MS) to cross
several cells during a process of conversation. This
working call should be transferred from one cell to
another one in order to achieve call continuation
during boundary crossings. The handover process is
transferring an active call from one cell to another.
Handover initiation is the process of deciding when
to request a handoff. Handoff decision is based on the
RSS from the current BS and neighboring BSs. In my
project i amassuming distance indirectly proportional
to distance.
Handover can be classified using the
network type involved into horizontal and vertical
cases as an MT (mobile terminal) moves within or
between different wireless overlay networks[1].
Horizontal handoff[2] or intra-system
handoff is a handoff that occurs between the APs or
BSs of the same network technology. In other words,
a horizontal handoff occurs between the
homogeneous cells of a wireless access system.
Vertical handoff or inter-system handoff is a handoff
that occurs between the different points of attachment
belonging to different network technologies.
Handoffs can also be classified using the number of
connections involved as soft or hard.
A handoff is hard if the MT (mobile terminal) can be
associated with only one point of attachment at a
time. In other words, an MT may set up a new
connection at the target point of attachment after the
old connection has been torn down. A make before
break handoff occurs if the MT can communicate
with more than one point of attachment during
handoff. In this case, mobile terminal connection may
be created at the target point of attachment before the
old point of attachment connection is released. For
example, Mobile terminal equipped with multiple
network interfaces can simultaneously connect to
multiple points of attachment in different networks
during soft handoff.
Mobile ad-hoc networks are dynamic
networks in which nodes are free to move. A main
performance constraint comes from path loss and
multipath attenuation. Many Mobile ad-hoc network
routing protocols exploit multi-hop paths to route
packets. Probability of successful packet transmission
on a path is dependent on the reliability of the
wireless channel on each hop. In this paper, i assume
that all nodes know their positions and velocities, and
each and every node can measure the distance from
AP and BS. And we are assuming bandwidth by no
of users. In my project, whenever number of user
increases then bandwidth will reduce. We are setting
maximum 4 users mean Qos[7] is good otherwise it
will reduce.
A.UMTS Network
The Universal Mobile Telecommunications
System (UMTS) may be a third generation mobile
cellular system for networks supported the GSM
normal. Developed and maintained by the 3GPP (3rd
Generation Partnership Project). UMTS supports
most theoretical knowledge transfer rates of forty two
Mbit/s once HSPA+ is enforced within the network.
Users in deployed networks will expect a transfer rate
of up to 384 kbit/s.
UMTS phones will use a Universal Subscriber
Identity Module, USIM (based on GSM's SIM) and
conjointly work (including UMTS services) with
GSM SIM cards. This is often a world normal of
identification, and permits a network to spot and
attest the (U) SIM within the phone. Roaming
agreements between networks leave calls to a client
to be redirected to them whereas roaming and
confirm the services (and prices) out there to the user.
V. V. N. S. S. L. M. Anusha. K, Dr. M. Sailaja / International Journal of Engineering Research
and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.2049-2054
2050 | P a g e
B. WLAN Network
WLANs are specified by are specified by
IEEE 802.11 standards, where the fundamental
access method is distributed coordination function
(DCF) known as carrier sense multiple access with
collision avoidance (CSMA/CA). Network allocation
vector (NAV) is the main scheme used to avoid
collision by setting a busy duration on hearing frame
transmissions from other stations. Hence, the
utilization of the WLAN channel is well reflected by
NAV.
The available bandwidth has been derived
from NAV.This network enables you to access the
Internet in localized hotspots via a wireless local
areanetwork (WLAN) access card and a PDA or
laptop.
COMPARISON BETWEEN UMTS AND
WLAN
RELATED WORK
[1]In this paper, author presents an overview of
issues related to horizontal and vertical handoffs and
also discussed the architecture of integrated WLAN
and WAANnetworks based on Mobile IPv6.
Pros and cons:
The Overlay Network is considered to
improve the different characteristics of wireless
access network technologies to satisfy the anytime,
anywhere, and any service needs of mobile users but
author used the wide area access network in which
Setting up a network can be an expensive and
complicated and also the bigger the network the more
expensive it is and the Security is a real issue.
[2]In this paper, author presents efficient handoff
schemes to enhance quality of service and provide
flawless mobility and it presents different and novel
aspects of handoff and discusses handoff related
issues of fourth generation systems.
Pros and cons:
The classification of handoffs, handoffs in
4G heterogeneous networks, handoff process and
vertical handoff decision functions are clearly
explained.
[3]In this paper, author presents a novel end-to-end
mobility management system for seamless and
proactive roaming across heterogeneous wireless
networks and this system integrates a connection
manager that intelligently detects the condition of the
wireless networks and a virtual connectivity-based
mobility management scheme that maintains
connection’s continuity using the end-to-end
principle.
Pros and cons:
A Heterogeneous wireless network is
proposed which has advantages like capable of
reacting to roaming events proactively and accurately
and maintaining the connection’s continuity with
small handoff delay but the technical details such as
network bandwidth and delay estimation, as well as
end-to-end mobility management were not fully
addressed.
[4]In this paper, author analyzes the most recent
research efforts in the area of handover management
in integrated WLAN/cellular networks, attempting to
categorize and comment on the proposed solutions.
The focus is placed mainly on the methods to
integrate two different architectures and on the
supported functionality of the integrated system.
Pros and cons:
A integrated WLAN/cellular network is
proposed to handle interference problems and also to
increase the bandwidth in limited geographical areas
but in this paper author uses WLANs and
GPRS/UMTS technology which has some drawbacks
like speed, reliability and distance factor.
[5]In this paper, author analyzes the most recent
research efforts in the area of handover management
in integrated WLAN and wireless metropolitan area
networks (WMANs). This integrated network will
bring a synergetic improvement to the services
provided to mobile users.
Pros and cons:
An integrated WLAN and wireless
metropolitan area network which considers the
handover decision algorithm based on MIH
framework but it does not consider the packet delay
and bandwidth while handoff is occurring.
[6]In this paper, author addresses a movement-aware
vertical (MAV) handover algorithm between WLAN
and Mobile WiMAX for seamless ubiquitous access.
MAV handover algorithm is proposed in this paper to
exploit movement pattern for avoiding unnecessary
handovers in the integrated WLAN and Mobile
WiMAX networks.
Pros and cons:
A novel MAV handover algorithm is
proposed for interworking between WLAN and
Mobile WiMAX to avoid Frequent handovers for a
short time period of time and there is an higher
V. V. N. S. S. L. M. Anusha. K, Dr. M. Sailaja / International Journal of Engineering Research
and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.2049-2054
2051 | P a g e
chance of packet loss, delay are affecting the overall
throughput but he considers only about the velocity
of mobile station but not about the other factors.
[7]In this paper, author considers the quality-of-
service oriented intersystem handover between the
IEEE 802.11b network and the overlay network. He
proposes the handover scheme and algorithm that
guarantee to simultaneously meet the three key QoS
values, that is, minimum data rate; the maximum data
block delay and the maximum data error rate, for the
number of uplink and down link multi service
connections.
Pros and cons:
A handover scheme and algorithm is
proposed that guarantee to simultaneously meet the
three key QoS parameters as well as the maximum
call-dropping probability and the maximum average
number of ping-pong event constraints but When the
number of fixed stations in the IEEE 802.11b cell is
high, station collision probability is also high and the
QoS requirements of the mobile stations arriving at
the IEEE 802.11b cell cannot be satisfied at least for
the real-time traffic.
[8]In this paper, author defines specific bandwidth-
related metrics, focus on the scope and relevance of
each. Particularly, he differentiates between the
bandwidth of a link and the bandwidth of a sequence
of successive links.
Pros and cons:
A specific metrics, calculation techniques
and tools are used to estimate available bandwidth
and capacity of the links but didn’t consider about the
other factors like packet delay and bit rate.
[9]In this paper, author proposes a scheme, named
Bandwidth Recycling, to recycle the unused
bandwidth without changing the existing bandwidth
reservation. The theme of the scheme is to allow
other SSs to utilize the unused bandwidth when it is
available
Pros and cons:
An algorithm is proposed which considers
about the subscriber stations to utilize the unused
bandwidth and it shows that it can further improve
the overall throughput by 40 percent when the
network is in the steady state but it is only for
homogeneous network and a light overhead is
present.
[10]In this paper, author proposes a handover scheme
with geographic mobility awareness, which considers
the historical handover patterns of mobile devices.
HGMA can conserve the energy of handover devices
based on triggering of mobile devices from
unnecessary handovers according to their received
signal strength and moving speeds and it contains a
handover[5] candidate selection method for mobile
devices to intelligently select a subset of Wi-Fiaccess
points or WiMAX relay stations to be scanned.
Pros and cons:
A method is proposed to reduce the energy
consumption of a handover operation and also to
improve QoS satisfaction ratio to handover devices
but in this paper author discuss only about the energy
consumption but not about the remaining factors in
taking handoff decision.
II. EXISTING TECHNIQUE
In previous QoS based VHO methods for
overlay networks, Quality of service[7]parameters
are considered in handoff decisions. However, the
handover procedures are normally started when the
stations move across the border of WLANs.
As a result, the fixed stations and the mobile stations
within overlapped areas cannot benefit from VHOs.
Authors proposed a tightly coupled interworking
structure. Further, seamless and proactive[3] vertical
handoff scheme is designed based on the architecture
with aims to provide always the best quality of
service for users.
DISADVANTAGES
Due to the newly developed UMTS, there
have been some advantages, but still limited
proposals made for VHOs in UMTS/WLAN overlay
networks.Author proposed schemes can keep stations
always being best connected. But when system is out
of the range then no communication in that model.
III. PROPOSED TECHNIQUE
In my project I have implementing the ad-
hoc technology in infrastructure system called as
cognitive radio network. In proposed model,
whenever system is out of range of all the base
station and AP. Then it can make the communication
though the primary user when PU is free. In this
model we are considering requesting device as the
secondary device and which one is helping to make
communication that is primary user.
Cognitive radiosare cognizant of their surroundings
and bandwidth availability and are able to
dynamically tune the spectrum usage based on nearby
radios, location, time of day and other parameters.
This provides for a more efficient use of the spectrum
and enabling high priority communications to take
precedence if needed. Cognitive radio has two types
of users such as primary and secondary user.
ADVANTAGE:
Our proposed schemes can keep stations
always being best connected, more than previous
method, when it’s in outside also.
IV. ALGORITHM
In this paper, I have investigated the
integration and VHO issues in UMTS/WLAN
V. V. N. S. S. L. M. Anusha. K, Dr. M. Sailaja / International Journal of Engineering Research
and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.2049-2054
2052 | P a g e
overlay networks. And we present the theory
implementation model as bellow.
Step1: Initializing a mobile node it can access both
UMTS/WLAN.
Step 2: Initialize UMTS/WLAN networks
Step 3: Node will check the available networks.
Step 4: If { network available }{
If {only one network}{
Get communication from that.
} else {
For {each network }{
Checks which are the best network.....
{Bandwidth and packet delay}
Theory calculations.......
Bandwidth calculation for UMTS
𝐵𝑑 = (1 −
𝐴𝐴𝑠 𝑑
𝑠 𝑑
)
𝛿 𝑑 𝑠 𝑑
𝑇𝑓
𝐵𝑢 = (1 −
𝐴𝐴𝑠 𝑢
𝑠 𝑢
)
𝛿 𝑢 𝑠 𝑢
𝑇 𝑓
Delay calculation for UMTS
𝑡 = 𝑡 𝑠 + 𝑡 𝑞 + 𝑡 𝑚 + 𝑡𝑡
Bandwidth for WLAN
𝐵𝑊 = 𝐵𝑜 − 𝐿
𝑁𝐴𝑉
𝑇𝑛 +
1
2
𝑇𝑛,𝑐(𝑁 − 1)
Delay for WLAN
𝑡 = 𝑡 𝑞 + 𝑡 𝑎 =
𝑡 𝑎
2
1 − 𝑡 𝑎
+ 𝑡 𝑎
}
Step 5: Mobile node compares both networks
VHOM selects best
Step 6: If no AP or BS detected
Checks whether any other mobile station
available APor BS connection and have enough
bandwidth limit.
If mobile station detected with enough quality
and then switch to mobile station communication.
Step 7:
Else
No communication.
V. PERFORMANCE EVALUATION
For our analyzing purpose we are using the
tool NS2. By using NS2 we are calculating the
bandwidth and delay and showing the prototype
model of VHO with enhancement such as ad-hoc
property.
Fig 1:Nam output for VHO model
In this Nam window output we are
implementing model of WLAN and UMTS. In this
model there are the 15 nodes (UMTS and Wlan and
Mobile nodes) available. In this model, if mobile
node is out of the range of Wlan and umts mean it
can’t get communication.
Fig 2:Nam output for VHO with Ad-hoc type
In our enhanced prototype model, we
implemented VHO with ad-hoc property. So
whenever node not in the coverage of and AP or BS
then node can search for another mobile node which
is having enough extra bandwidth. If mobile station
having extra bandwidth then that node going to act as
a primary user and searching node is acting as
secondary user. If primary user is detected by the
secondary user mean secondary user can make
communication through the primary user.
Fig 3(a) :Xgraph output for VHO and VHO with
ad-hoc
We are analyzing performance through the
xgraph. From this graph we can see the packet
delivery function is high for VHO with ad-hoc
network compare than normal VHO operation. There
are the two xgraph shown in above diagram left(A) ,
Right(B).
“A” graph is for showing the quality of only VHO,
“B” graph for VHO with Ad-hoc property.From that
graph we can conclude “B” performance is higher
than “A”.
By the OFDMA technique, the bandwidth is
allocated in the form of databursts where an integer
number of slots are admitted. BSdetermines
thenumber of DL and UL slots that a station obtains
in one frame then broadcasts the resource allocation
results through DL-MAP and UL-MAP messages at
the beginning of each DL sub-frame. Therefore,
mobile station can easily obtain the utilization of
UMTS link by aggregating the number of allocated
slots stated in DL-MAP/UL-MAP messages.
V. V. N. S. S. L. M. Anusha. K, Dr. M. Sailaja / International Journal of Engineering Research
and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.2049-2054
2053 | P a g e
Fig 3(b):Bandwidth available UL
Fig 3(c): Bandwidth available DL
The AASd (AASu) occupation denotes the
utilization of the medium, which equals to AASd/sd
(AASu/su). Simulated result for available bandwidth
is shown in above graph.
fig 3(d):WLAN available bandwidth
In above figure, we showed our result for
WLAN bandwidth availability. If NAV increases
bandwidth will be reduce.
Fig3(e):x-graph for packet loss
The above graph shows that the packet loss
is same for VHO and VHO with Adhoc network.
Fig3(f):x-graph for packet overhead
In theabove graph there are two lines first
line indicates packet overhead in VHO second line
indicates packet overhead in VHO with ad-hoc
network. The overhead in VHO is high compared to
VHOwith Ad-hoc network.
VI. CONCLUSION
In this paper, we investigate several
important issues for the interworking of WLAN and
UMTSnetworks. We resolve a tightly coupled
interworking architecture as the platformof our
scheme. And we improved efficiency of the network
by including Ad-hoc property.
REFERENCES
[1] Cheng Wei Lee, Li Ming Chen, Meng
Chang Chen, and Yeali Sunny Sun-Oct 31,
2005 “A Framework of Handoffs in
Wireless Overlay Networks Based on
Mobile IPv6”.
[2] “Handoffs in Fourth Generation
Heterogeneous Networks”Nidal Nasser,
Ahmed Hasswa and HossamHassanein -
2006.
[3] “A Seamless and Proactive End-to-End
Mobility Solution for Roaming Across
Heterogeneous Wireless
Networks”ChuanxiongGuo, ZihuaGuo,
QianZhang andWenwu Zhu - 2004.
[4] “Handover Management Architectures in
Integrated Wlan/Cellular Networks” George
Lampropoulos, Nikos Passas,
LazarosMerakosAndAlexandros Kaloxylos-
2006.
[5] “Handover Management In Integrated Wlan
And Mobile WimaxNetworks”Allan Borges
Pontes, Diego Dos Passos Silva, José
Jailton, JR., Otavio Rodrigues, Jr., And
Kelvin Lopes Dias- 2008.
[6] “Movement-Aware Vertical Handoff of
WLAN and Mobile WiMAX for Seamless
Ubiquitous Access”Wonjun Lee, Eunkyo
Kim, Joongheon Kim, Inkyu.,Lee and
Choonhwa Lee - 2011.
[7] “QoS-Oriented Intersystem Handover
Between IEEE 802.11b and Overlay
V. V. N. S. S. L. M. Anusha. K, Dr. M. Sailaja / International Journal of Engineering Research
and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.2049-2054
2054 | P a g e
Networks”Alexandre V. Garmonov, SeokHo
Cheon, Do HyonYim, Ki Tae Han,Yun Sang
Park, Andrew Y. Savinkov, Stanislav A.
Filin, Sergey N. Moiseev, and Mikhail S.
Kondakov- 2008.
[8] “Bandwidth Estimation: Metrics,
Measurement Techniques, and Tools”--->
Ravi Prasad, ConstantinosDovrolis,
Margaret Murray and kcclaffy- 2003.
[9] “Bandwidth Recycling in IEEE 802.16
Networks” David Chuck and J. Morris
Chang- 2010.
[10] “Energy-Efficient Network Selection with
Mobility Pattern Awareness in an Integrated
WiMAX and WiFi Network” Wen-Hsin
Yang, You-Chiun Wang, Yu-Chee Tseng
and Bao-Shuh P. Lin- 2000.
Books
[11] Computer Networks(Fourth Edition) by
ANDREW S. TANENBAUM.
[12] Wireless Communication and Networks
(Second Edition ) by William Stallings.
Dr.M.Sailaja received thePh.D in
electronics and communication engineering from the
JNT University in 2009, persuade M.S. in U.S.A. She
has been working at different companies and since
1994 onwards in JNTU Kakinada.
V.V.N.S.S.L.M.Anusha.k,received
theB.Tech degree in Electronicsand
CommunicationEngineering in 2011
fromPondicherry University, andpursuingM.Tech
degree inJNTUKakinada.

Más contenido relacionado

La actualidad más candente

A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...pijans
 
Routing Algorithm for Heterogeneous Wireless Network in Vanet
Routing Algorithm for Heterogeneous Wireless Network in VanetRouting Algorithm for Heterogeneous Wireless Network in Vanet
Routing Algorithm for Heterogeneous Wireless Network in VanetIOSR Journals
 
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKSOPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKSijasuc
 
A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid W...
A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid W...A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid W...
A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid W...1crore projects
 
A vertical handover decision approaches in next generation wireless networks ...
A vertical handover decision approaches in next generation wireless networks ...A vertical handover decision approaches in next generation wireless networks ...
A vertical handover decision approaches in next generation wireless networks ...ijmnct
 
Multimedia Streaming in Wireless Ad Hoc Networks According to Fuzzy Cross-lay...
Multimedia Streaming in Wireless Ad Hoc Networks According to Fuzzy Cross-lay...Multimedia Streaming in Wireless Ad Hoc Networks According to Fuzzy Cross-lay...
Multimedia Streaming in Wireless Ad Hoc Networks According to Fuzzy Cross-lay...Editor IJCATR
 
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networks
Comparative Review for Routing Protocols in Mobile Ad-Hoc NetworksComparative Review for Routing Protocols in Mobile Ad-Hoc Networks
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networksijasuc
 
Teletraffic Analysis of Overflowed Traffic with Voice only in Multilayer 3G W...
Teletraffic Analysis of Overflowed Traffic with Voice only in Multilayer 3G W...Teletraffic Analysis of Overflowed Traffic with Voice only in Multilayer 3G W...
Teletraffic Analysis of Overflowed Traffic with Voice only in Multilayer 3G W...IRJET Journal
 
Energy Efficient Enhancement of TDEEC Wireless Sensors Network Protocol Based...
Energy Efficient Enhancement of TDEEC Wireless Sensors Network Protocol Based...Energy Efficient Enhancement of TDEEC Wireless Sensors Network Protocol Based...
Energy Efficient Enhancement of TDEEC Wireless Sensors Network Protocol Based...chokrio
 
Reliable and Efficient Routing in WLAN
Reliable and Efficient Routing in WLANReliable and Efficient Routing in WLAN
Reliable and Efficient Routing in WLANijtsrd
 
A RELATIVE STUDY ON CELLULAR, WSN AND MANETS
A RELATIVE STUDY ON CELLULAR, WSN AND MANETSA RELATIVE STUDY ON CELLULAR, WSN AND MANETS
A RELATIVE STUDY ON CELLULAR, WSN AND MANETSIAEME Publication
 
Link Stability and Energy Aware routing Protocol for Mobile Adhoc Network
Link Stability and Energy Aware routing Protocol for Mobile Adhoc NetworkLink Stability and Energy Aware routing Protocol for Mobile Adhoc Network
Link Stability and Energy Aware routing Protocol for Mobile Adhoc NetworkIOSR Journals
 
NEW TECHNOLOGY FOR MACHINE TO MACHINE COMMUNICATION IN SOFTNET TOWARDS 5G
NEW TECHNOLOGY FOR MACHINE TO MACHINE COMMUNICATION IN SOFTNET TOWARDS 5GNEW TECHNOLOGY FOR MACHINE TO MACHINE COMMUNICATION IN SOFTNET TOWARDS 5G
NEW TECHNOLOGY FOR MACHINE TO MACHINE COMMUNICATION IN SOFTNET TOWARDS 5Gijwmn
 

La actualidad más candente (14)

A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
 
Routing Algorithm for Heterogeneous Wireless Network in Vanet
Routing Algorithm for Heterogeneous Wireless Network in VanetRouting Algorithm for Heterogeneous Wireless Network in Vanet
Routing Algorithm for Heterogeneous Wireless Network in Vanet
 
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKSOPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
 
A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid W...
A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid W...A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid W...
A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid W...
 
A vertical handover decision approaches in next generation wireless networks ...
A vertical handover decision approaches in next generation wireless networks ...A vertical handover decision approaches in next generation wireless networks ...
A vertical handover decision approaches in next generation wireless networks ...
 
R33092099
R33092099R33092099
R33092099
 
Multimedia Streaming in Wireless Ad Hoc Networks According to Fuzzy Cross-lay...
Multimedia Streaming in Wireless Ad Hoc Networks According to Fuzzy Cross-lay...Multimedia Streaming in Wireless Ad Hoc Networks According to Fuzzy Cross-lay...
Multimedia Streaming in Wireless Ad Hoc Networks According to Fuzzy Cross-lay...
 
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networks
Comparative Review for Routing Protocols in Mobile Ad-Hoc NetworksComparative Review for Routing Protocols in Mobile Ad-Hoc Networks
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networks
 
Teletraffic Analysis of Overflowed Traffic with Voice only in Multilayer 3G W...
Teletraffic Analysis of Overflowed Traffic with Voice only in Multilayer 3G W...Teletraffic Analysis of Overflowed Traffic with Voice only in Multilayer 3G W...
Teletraffic Analysis of Overflowed Traffic with Voice only in Multilayer 3G W...
 
Energy Efficient Enhancement of TDEEC Wireless Sensors Network Protocol Based...
Energy Efficient Enhancement of TDEEC Wireless Sensors Network Protocol Based...Energy Efficient Enhancement of TDEEC Wireless Sensors Network Protocol Based...
Energy Efficient Enhancement of TDEEC Wireless Sensors Network Protocol Based...
 
Reliable and Efficient Routing in WLAN
Reliable and Efficient Routing in WLANReliable and Efficient Routing in WLAN
Reliable and Efficient Routing in WLAN
 
A RELATIVE STUDY ON CELLULAR, WSN AND MANETS
A RELATIVE STUDY ON CELLULAR, WSN AND MANETSA RELATIVE STUDY ON CELLULAR, WSN AND MANETS
A RELATIVE STUDY ON CELLULAR, WSN AND MANETS
 
Link Stability and Energy Aware routing Protocol for Mobile Adhoc Network
Link Stability and Energy Aware routing Protocol for Mobile Adhoc NetworkLink Stability and Energy Aware routing Protocol for Mobile Adhoc Network
Link Stability and Energy Aware routing Protocol for Mobile Adhoc Network
 
NEW TECHNOLOGY FOR MACHINE TO MACHINE COMMUNICATION IN SOFTNET TOWARDS 5G
NEW TECHNOLOGY FOR MACHINE TO MACHINE COMMUNICATION IN SOFTNET TOWARDS 5GNEW TECHNOLOGY FOR MACHINE TO MACHINE COMMUNICATION IN SOFTNET TOWARDS 5G
NEW TECHNOLOGY FOR MACHINE TO MACHINE COMMUNICATION IN SOFTNET TOWARDS 5G
 

Destacado

Destacado (20)

Lv3421272135
Lv3421272135Lv3421272135
Lv3421272135
 
Ls3421152119
Ls3421152119Ls3421152119
Ls3421152119
 
Lg3420362048
Lg3420362048Lg3420362048
Lg3420362048
 
Lb3419962001
Lb3419962001Lb3419962001
Lb3419962001
 
Lm342080283
Lm342080283Lm342080283
Lm342080283
 
Cu32604607
Cu32604607Cu32604607
Cu32604607
 
Asad Rauf CV
Asad Rauf CVAsad Rauf CV
Asad Rauf CV
 
Steve_Gardner_Resume_v3
Steve_Gardner_Resume_v3Steve_Gardner_Resume_v3
Steve_Gardner_Resume_v3
 
PROCESO REALIZACIÓN INFOCOMERCIAL AA3
PROCESO REALIZACIÓN INFOCOMERCIAL AA3PROCESO REALIZACIÓN INFOCOMERCIAL AA3
PROCESO REALIZACIÓN INFOCOMERCIAL AA3
 
Nico y El gato Torpe
Nico y El gato Torpe Nico y El gato Torpe
Nico y El gato Torpe
 
Aprender a aprender con tics (version corregida y aumentada)
Aprender a aprender con tics (version corregida y aumentada)Aprender a aprender con tics (version corregida y aumentada)
Aprender a aprender con tics (version corregida y aumentada)
 
Emma luupe nuevo aaa
Emma luupe nuevo aaaEmma luupe nuevo aaa
Emma luupe nuevo aaa
 
Blog
BlogBlog
Blog
 
Rolly andrade, marketing
Rolly andrade, marketingRolly andrade, marketing
Rolly andrade, marketing
 
Computacionmovil2
Computacionmovil2Computacionmovil2
Computacionmovil2
 
Slideshare test
Slideshare testSlideshare test
Slideshare test
 
7ª SessãO 2
7ª SessãO   27ª SessãO   2
7ª SessãO 2
 
Leonardo da vinci
Leonardo da vinciLeonardo da vinci
Leonardo da vinci
 
Analisis de la PPO
Analisis de la PPOAnalisis de la PPO
Analisis de la PPO
 
Sistema de cómputo (2)
Sistema de cómputo (2)Sistema de cómputo (2)
Sistema de cómputo (2)
 

Similar a Lh3420492054

Comparative Review for Routing Protocols in Mobile Ad-Hoc Networks
Comparative Review for Routing Protocols in Mobile Ad-Hoc NetworksComparative Review for Routing Protocols in Mobile Ad-Hoc Networks
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networksjake henry
 
Fuzzy Based Vertical Handoff Decision Controller for Future Networks
Fuzzy Based Vertical Handoff Decision Controller for Future NetworksFuzzy Based Vertical Handoff Decision Controller for Future Networks
Fuzzy Based Vertical Handoff Decision Controller for Future NetworksIJAEMSJORNAL
 
HANDOVER NECESSITY ESTIMATION FOR 4G HETEROGENEOUS NETWORKS
HANDOVER NECESSITY ESTIMATION FOR 4G HETEROGENEOUS NETWORKSHANDOVER NECESSITY ESTIMATION FOR 4G HETEROGENEOUS NETWORKS
HANDOVER NECESSITY ESTIMATION FOR 4G HETEROGENEOUS NETWORKSijistjournal
 
HANDOVER NECESSITY ESTIMATION FOR 4G HETEROGENEOUS NETWORKS
HANDOVER NECESSITY ESTIMATION FOR 4G HETEROGENEOUS NETWORKSHANDOVER NECESSITY ESTIMATION FOR 4G HETEROGENEOUS NETWORKS
HANDOVER NECESSITY ESTIMATION FOR 4G HETEROGENEOUS NETWORKSijistjournal
 
Performance and handoff evaluation of heterogeneous wireless networks 2
Performance and handoff evaluation of heterogeneous wireless networks 2Performance and handoff evaluation of heterogeneous wireless networks 2
Performance and handoff evaluation of heterogeneous wireless networks 2IAEME Publication
 
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKSOPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKSijasuc
 
Optimum Neighbors for Resource-Constrained Mobile Ad Hoc Networks
Optimum Neighbors for Resource-Constrained Mobile Ad Hoc NetworksOptimum Neighbors for Resource-Constrained Mobile Ad Hoc Networks
Optimum Neighbors for Resource-Constrained Mobile Ad Hoc Networksijasuc
 
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKSOPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKSijasuc
 
Efficient and stable route selection by using cross layer concept for highly...
 Efficient and stable route selection by using cross layer concept for highly... Efficient and stable route selection by using cross layer concept for highly...
Efficient and stable route selection by using cross layer concept for highly...Roopali Singh
 
Clustering effects on wireless mobile ad hoc networks performances
Clustering effects on wireless mobile ad hoc networks performancesClustering effects on wireless mobile ad hoc networks performances
Clustering effects on wireless mobile ad hoc networks performancesijcsit
 
Intelligent network selection using fuzzy logic for 4 g wireless networks
Intelligent network selection using fuzzy logic for 4 g wireless networksIntelligent network selection using fuzzy logic for 4 g wireless networks
Intelligent network selection using fuzzy logic for 4 g wireless networksIAEME Publication
 
LIFETIME IMPROVEMENT USING MOBILE AGENT IN WIRELESS SENSOR NETWORK
LIFETIME IMPROVEMENT USING MOBILE AGENT IN WIRELESS SENSOR NETWORKLIFETIME IMPROVEMENT USING MOBILE AGENT IN WIRELESS SENSOR NETWORK
LIFETIME IMPROVEMENT USING MOBILE AGENT IN WIRELESS SENSOR NETWORKJournal For Research
 
MULTI-HOP BANDWIDTH MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKS
MULTI-HOP BANDWIDTH MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKSMULTI-HOP BANDWIDTH MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKS
MULTI-HOP BANDWIDTH MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKSIJMIT JOURNAL
 
A Vertical Handover Algorithm in Integrated Macrocell Femtocell Networks
A Vertical Handover Algorithm in Integrated Macrocell Femtocell Networks A Vertical Handover Algorithm in Integrated Macrocell Femtocell Networks
A Vertical Handover Algorithm in Integrated Macrocell Femtocell Networks IJECEIAES
 
Vertical handover in umts and wlan networks
Vertical handover in umts and wlan networksVertical handover in umts and wlan networks
Vertical handover in umts and wlan networksIAEME Publication
 
Call Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
Call Admission Control (CAC) with Load Balancing Approach for the WLAN NetworksCall Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
Call Admission Control (CAC) with Load Balancing Approach for the WLAN NetworksIJARIIT
 
Mobility management in heterogeneous wireless networks
Mobility management in heterogeneous wireless networksMobility management in heterogeneous wireless networks
Mobility management in heterogeneous wireless networkseSAT Publishing House
 

Similar a Lh3420492054 (20)

Comparative Review for Routing Protocols in Mobile Ad-Hoc Networks
Comparative Review for Routing Protocols in Mobile Ad-Hoc NetworksComparative Review for Routing Protocols in Mobile Ad-Hoc Networks
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networks
 
Fuzzy Based Vertical Handoff Decision Controller for Future Networks
Fuzzy Based Vertical Handoff Decision Controller for Future NetworksFuzzy Based Vertical Handoff Decision Controller for Future Networks
Fuzzy Based Vertical Handoff Decision Controller for Future Networks
 
HANDOVER NECESSITY ESTIMATION FOR 4G HETEROGENEOUS NETWORKS
HANDOVER NECESSITY ESTIMATION FOR 4G HETEROGENEOUS NETWORKSHANDOVER NECESSITY ESTIMATION FOR 4G HETEROGENEOUS NETWORKS
HANDOVER NECESSITY ESTIMATION FOR 4G HETEROGENEOUS NETWORKS
 
HANDOVER NECESSITY ESTIMATION FOR 4G HETEROGENEOUS NETWORKS
HANDOVER NECESSITY ESTIMATION FOR 4G HETEROGENEOUS NETWORKSHANDOVER NECESSITY ESTIMATION FOR 4G HETEROGENEOUS NETWORKS
HANDOVER NECESSITY ESTIMATION FOR 4G HETEROGENEOUS NETWORKS
 
Performance and handoff evaluation of heterogeneous wireless networks 2
Performance and handoff evaluation of heterogeneous wireless networks 2Performance and handoff evaluation of heterogeneous wireless networks 2
Performance and handoff evaluation of heterogeneous wireless networks 2
 
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKSOPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
 
Optimum Neighbors for Resource-Constrained Mobile Ad Hoc Networks
Optimum Neighbors for Resource-Constrained Mobile Ad Hoc NetworksOptimum Neighbors for Resource-Constrained Mobile Ad Hoc Networks
Optimum Neighbors for Resource-Constrained Mobile Ad Hoc Networks
 
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKSOPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
 
Efficient and stable route selection by using cross layer concept for highly...
 Efficient and stable route selection by using cross layer concept for highly... Efficient and stable route selection by using cross layer concept for highly...
Efficient and stable route selection by using cross layer concept for highly...
 
Clustering effects on wireless mobile ad hoc networks performances
Clustering effects on wireless mobile ad hoc networks performancesClustering effects on wireless mobile ad hoc networks performances
Clustering effects on wireless mobile ad hoc networks performances
 
Intelligent network selection using fuzzy logic for 4 g wireless networks
Intelligent network selection using fuzzy logic for 4 g wireless networksIntelligent network selection using fuzzy logic for 4 g wireless networks
Intelligent network selection using fuzzy logic for 4 g wireless networks
 
C0941017
C0941017C0941017
C0941017
 
LIFETIME IMPROVEMENT USING MOBILE AGENT IN WIRELESS SENSOR NETWORK
LIFETIME IMPROVEMENT USING MOBILE AGENT IN WIRELESS SENSOR NETWORKLIFETIME IMPROVEMENT USING MOBILE AGENT IN WIRELESS SENSOR NETWORK
LIFETIME IMPROVEMENT USING MOBILE AGENT IN WIRELESS SENSOR NETWORK
 
Abstract
AbstractAbstract
Abstract
 
MULTI-HOP BANDWIDTH MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKS
MULTI-HOP BANDWIDTH MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKSMULTI-HOP BANDWIDTH MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKS
MULTI-HOP BANDWIDTH MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKS
 
A Vertical Handover Algorithm in Integrated Macrocell Femtocell Networks
A Vertical Handover Algorithm in Integrated Macrocell Femtocell Networks A Vertical Handover Algorithm in Integrated Macrocell Femtocell Networks
A Vertical Handover Algorithm in Integrated Macrocell Femtocell Networks
 
Vertical handover in umts and wlan networks
Vertical handover in umts and wlan networksVertical handover in umts and wlan networks
Vertical handover in umts and wlan networks
 
Call Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
Call Admission Control (CAC) with Load Balancing Approach for the WLAN NetworksCall Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
Call Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
 
Et24912915
Et24912915Et24912915
Et24912915
 
Mobility management in heterogeneous wireless networks
Mobility management in heterogeneous wireless networksMobility management in heterogeneous wireless networks
Mobility management in heterogeneous wireless networks
 

Último

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 

Último (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 

Lh3420492054

  • 1. V. V. N. S. S. L. M. Anusha. K, Dr. M. Sailaja / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.2049-2054 2049 | P a g e Efficient and Adaptable Technology Based VHOM Scheme in UMTS/WLANOverlay Networks V.V.N.S.S.L.M.Anusha.K*, Dr.M.Sailaja** *(M.Tech, Dept.of ECE, University College of Engineering-JNTUK, Kakinada, India **(Professor Dept.of ECE, University College of Engineering-JNTUK, Kakinada, India ABSTRACT The integration of UMTS and WLAN has been seen as a promising approach toward 4G. I am going to analyze different important issues for the interworking of UMTS and WLAN networks. SoI proposed a tightly coupled interworking structure and my proposed schemes can keep stations always being best connected due to ad-hoc nature that means An adhoc network is a collection of wireless mobile nodes dynamically forming a temporary network without the use of any existing networkinfrastructure or centralized administration but in this paperi have considered the device which has free channel it can share to requester otherwise not. Keywords-UMTS, WLAN, mobility, 4G, Ad-hoc Network (as cognitive). I. INTRODUCTION Mobility is the very important feature of a wireless cellular communication system. Normally, continuous service is achieved by supporting handoff (or handover) from one cell to another. Smaller cells because an active mobile station (MS) to cross several cells during a process of conversation. This working call should be transferred from one cell to another one in order to achieve call continuation during boundary crossings. The handover process is transferring an active call from one cell to another. Handover initiation is the process of deciding when to request a handoff. Handoff decision is based on the RSS from the current BS and neighboring BSs. In my project i amassuming distance indirectly proportional to distance. Handover can be classified using the network type involved into horizontal and vertical cases as an MT (mobile terminal) moves within or between different wireless overlay networks[1]. Horizontal handoff[2] or intra-system handoff is a handoff that occurs between the APs or BSs of the same network technology. In other words, a horizontal handoff occurs between the homogeneous cells of a wireless access system. Vertical handoff or inter-system handoff is a handoff that occurs between the different points of attachment belonging to different network technologies. Handoffs can also be classified using the number of connections involved as soft or hard. A handoff is hard if the MT (mobile terminal) can be associated with only one point of attachment at a time. In other words, an MT may set up a new connection at the target point of attachment after the old connection has been torn down. A make before break handoff occurs if the MT can communicate with more than one point of attachment during handoff. In this case, mobile terminal connection may be created at the target point of attachment before the old point of attachment connection is released. For example, Mobile terminal equipped with multiple network interfaces can simultaneously connect to multiple points of attachment in different networks during soft handoff. Mobile ad-hoc networks are dynamic networks in which nodes are free to move. A main performance constraint comes from path loss and multipath attenuation. Many Mobile ad-hoc network routing protocols exploit multi-hop paths to route packets. Probability of successful packet transmission on a path is dependent on the reliability of the wireless channel on each hop. In this paper, i assume that all nodes know their positions and velocities, and each and every node can measure the distance from AP and BS. And we are assuming bandwidth by no of users. In my project, whenever number of user increases then bandwidth will reduce. We are setting maximum 4 users mean Qos[7] is good otherwise it will reduce. A.UMTS Network The Universal Mobile Telecommunications System (UMTS) may be a third generation mobile cellular system for networks supported the GSM normal. Developed and maintained by the 3GPP (3rd Generation Partnership Project). UMTS supports most theoretical knowledge transfer rates of forty two Mbit/s once HSPA+ is enforced within the network. Users in deployed networks will expect a transfer rate of up to 384 kbit/s. UMTS phones will use a Universal Subscriber Identity Module, USIM (based on GSM's SIM) and conjointly work (including UMTS services) with GSM SIM cards. This is often a world normal of identification, and permits a network to spot and attest the (U) SIM within the phone. Roaming agreements between networks leave calls to a client to be redirected to them whereas roaming and confirm the services (and prices) out there to the user.
  • 2. V. V. N. S. S. L. M. Anusha. K, Dr. M. Sailaja / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.2049-2054 2050 | P a g e B. WLAN Network WLANs are specified by are specified by IEEE 802.11 standards, where the fundamental access method is distributed coordination function (DCF) known as carrier sense multiple access with collision avoidance (CSMA/CA). Network allocation vector (NAV) is the main scheme used to avoid collision by setting a busy duration on hearing frame transmissions from other stations. Hence, the utilization of the WLAN channel is well reflected by NAV. The available bandwidth has been derived from NAV.This network enables you to access the Internet in localized hotspots via a wireless local areanetwork (WLAN) access card and a PDA or laptop. COMPARISON BETWEEN UMTS AND WLAN RELATED WORK [1]In this paper, author presents an overview of issues related to horizontal and vertical handoffs and also discussed the architecture of integrated WLAN and WAANnetworks based on Mobile IPv6. Pros and cons: The Overlay Network is considered to improve the different characteristics of wireless access network technologies to satisfy the anytime, anywhere, and any service needs of mobile users but author used the wide area access network in which Setting up a network can be an expensive and complicated and also the bigger the network the more expensive it is and the Security is a real issue. [2]In this paper, author presents efficient handoff schemes to enhance quality of service and provide flawless mobility and it presents different and novel aspects of handoff and discusses handoff related issues of fourth generation systems. Pros and cons: The classification of handoffs, handoffs in 4G heterogeneous networks, handoff process and vertical handoff decision functions are clearly explained. [3]In this paper, author presents a novel end-to-end mobility management system for seamless and proactive roaming across heterogeneous wireless networks and this system integrates a connection manager that intelligently detects the condition of the wireless networks and a virtual connectivity-based mobility management scheme that maintains connection’s continuity using the end-to-end principle. Pros and cons: A Heterogeneous wireless network is proposed which has advantages like capable of reacting to roaming events proactively and accurately and maintaining the connection’s continuity with small handoff delay but the technical details such as network bandwidth and delay estimation, as well as end-to-end mobility management were not fully addressed. [4]In this paper, author analyzes the most recent research efforts in the area of handover management in integrated WLAN/cellular networks, attempting to categorize and comment on the proposed solutions. The focus is placed mainly on the methods to integrate two different architectures and on the supported functionality of the integrated system. Pros and cons: A integrated WLAN/cellular network is proposed to handle interference problems and also to increase the bandwidth in limited geographical areas but in this paper author uses WLANs and GPRS/UMTS technology which has some drawbacks like speed, reliability and distance factor. [5]In this paper, author analyzes the most recent research efforts in the area of handover management in integrated WLAN and wireless metropolitan area networks (WMANs). This integrated network will bring a synergetic improvement to the services provided to mobile users. Pros and cons: An integrated WLAN and wireless metropolitan area network which considers the handover decision algorithm based on MIH framework but it does not consider the packet delay and bandwidth while handoff is occurring. [6]In this paper, author addresses a movement-aware vertical (MAV) handover algorithm between WLAN and Mobile WiMAX for seamless ubiquitous access. MAV handover algorithm is proposed in this paper to exploit movement pattern for avoiding unnecessary handovers in the integrated WLAN and Mobile WiMAX networks. Pros and cons: A novel MAV handover algorithm is proposed for interworking between WLAN and Mobile WiMAX to avoid Frequent handovers for a short time period of time and there is an higher
  • 3. V. V. N. S. S. L. M. Anusha. K, Dr. M. Sailaja / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.2049-2054 2051 | P a g e chance of packet loss, delay are affecting the overall throughput but he considers only about the velocity of mobile station but not about the other factors. [7]In this paper, author considers the quality-of- service oriented intersystem handover between the IEEE 802.11b network and the overlay network. He proposes the handover scheme and algorithm that guarantee to simultaneously meet the three key QoS values, that is, minimum data rate; the maximum data block delay and the maximum data error rate, for the number of uplink and down link multi service connections. Pros and cons: A handover scheme and algorithm is proposed that guarantee to simultaneously meet the three key QoS parameters as well as the maximum call-dropping probability and the maximum average number of ping-pong event constraints but When the number of fixed stations in the IEEE 802.11b cell is high, station collision probability is also high and the QoS requirements of the mobile stations arriving at the IEEE 802.11b cell cannot be satisfied at least for the real-time traffic. [8]In this paper, author defines specific bandwidth- related metrics, focus on the scope and relevance of each. Particularly, he differentiates between the bandwidth of a link and the bandwidth of a sequence of successive links. Pros and cons: A specific metrics, calculation techniques and tools are used to estimate available bandwidth and capacity of the links but didn’t consider about the other factors like packet delay and bit rate. [9]In this paper, author proposes a scheme, named Bandwidth Recycling, to recycle the unused bandwidth without changing the existing bandwidth reservation. The theme of the scheme is to allow other SSs to utilize the unused bandwidth when it is available Pros and cons: An algorithm is proposed which considers about the subscriber stations to utilize the unused bandwidth and it shows that it can further improve the overall throughput by 40 percent when the network is in the steady state but it is only for homogeneous network and a light overhead is present. [10]In this paper, author proposes a handover scheme with geographic mobility awareness, which considers the historical handover patterns of mobile devices. HGMA can conserve the energy of handover devices based on triggering of mobile devices from unnecessary handovers according to their received signal strength and moving speeds and it contains a handover[5] candidate selection method for mobile devices to intelligently select a subset of Wi-Fiaccess points or WiMAX relay stations to be scanned. Pros and cons: A method is proposed to reduce the energy consumption of a handover operation and also to improve QoS satisfaction ratio to handover devices but in this paper author discuss only about the energy consumption but not about the remaining factors in taking handoff decision. II. EXISTING TECHNIQUE In previous QoS based VHO methods for overlay networks, Quality of service[7]parameters are considered in handoff decisions. However, the handover procedures are normally started when the stations move across the border of WLANs. As a result, the fixed stations and the mobile stations within overlapped areas cannot benefit from VHOs. Authors proposed a tightly coupled interworking structure. Further, seamless and proactive[3] vertical handoff scheme is designed based on the architecture with aims to provide always the best quality of service for users. DISADVANTAGES Due to the newly developed UMTS, there have been some advantages, but still limited proposals made for VHOs in UMTS/WLAN overlay networks.Author proposed schemes can keep stations always being best connected. But when system is out of the range then no communication in that model. III. PROPOSED TECHNIQUE In my project I have implementing the ad- hoc technology in infrastructure system called as cognitive radio network. In proposed model, whenever system is out of range of all the base station and AP. Then it can make the communication though the primary user when PU is free. In this model we are considering requesting device as the secondary device and which one is helping to make communication that is primary user. Cognitive radiosare cognizant of their surroundings and bandwidth availability and are able to dynamically tune the spectrum usage based on nearby radios, location, time of day and other parameters. This provides for a more efficient use of the spectrum and enabling high priority communications to take precedence if needed. Cognitive radio has two types of users such as primary and secondary user. ADVANTAGE: Our proposed schemes can keep stations always being best connected, more than previous method, when it’s in outside also. IV. ALGORITHM In this paper, I have investigated the integration and VHO issues in UMTS/WLAN
  • 4. V. V. N. S. S. L. M. Anusha. K, Dr. M. Sailaja / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.2049-2054 2052 | P a g e overlay networks. And we present the theory implementation model as bellow. Step1: Initializing a mobile node it can access both UMTS/WLAN. Step 2: Initialize UMTS/WLAN networks Step 3: Node will check the available networks. Step 4: If { network available }{ If {only one network}{ Get communication from that. } else { For {each network }{ Checks which are the best network..... {Bandwidth and packet delay} Theory calculations....... Bandwidth calculation for UMTS 𝐵𝑑 = (1 − 𝐴𝐴𝑠 𝑑 𝑠 𝑑 ) 𝛿 𝑑 𝑠 𝑑 𝑇𝑓 𝐵𝑢 = (1 − 𝐴𝐴𝑠 𝑢 𝑠 𝑢 ) 𝛿 𝑢 𝑠 𝑢 𝑇 𝑓 Delay calculation for UMTS 𝑡 = 𝑡 𝑠 + 𝑡 𝑞 + 𝑡 𝑚 + 𝑡𝑡 Bandwidth for WLAN 𝐵𝑊 = 𝐵𝑜 − 𝐿 𝑁𝐴𝑉 𝑇𝑛 + 1 2 𝑇𝑛,𝑐(𝑁 − 1) Delay for WLAN 𝑡 = 𝑡 𝑞 + 𝑡 𝑎 = 𝑡 𝑎 2 1 − 𝑡 𝑎 + 𝑡 𝑎 } Step 5: Mobile node compares both networks VHOM selects best Step 6: If no AP or BS detected Checks whether any other mobile station available APor BS connection and have enough bandwidth limit. If mobile station detected with enough quality and then switch to mobile station communication. Step 7: Else No communication. V. PERFORMANCE EVALUATION For our analyzing purpose we are using the tool NS2. By using NS2 we are calculating the bandwidth and delay and showing the prototype model of VHO with enhancement such as ad-hoc property. Fig 1:Nam output for VHO model In this Nam window output we are implementing model of WLAN and UMTS. In this model there are the 15 nodes (UMTS and Wlan and Mobile nodes) available. In this model, if mobile node is out of the range of Wlan and umts mean it can’t get communication. Fig 2:Nam output for VHO with Ad-hoc type In our enhanced prototype model, we implemented VHO with ad-hoc property. So whenever node not in the coverage of and AP or BS then node can search for another mobile node which is having enough extra bandwidth. If mobile station having extra bandwidth then that node going to act as a primary user and searching node is acting as secondary user. If primary user is detected by the secondary user mean secondary user can make communication through the primary user. Fig 3(a) :Xgraph output for VHO and VHO with ad-hoc We are analyzing performance through the xgraph. From this graph we can see the packet delivery function is high for VHO with ad-hoc network compare than normal VHO operation. There are the two xgraph shown in above diagram left(A) , Right(B). “A” graph is for showing the quality of only VHO, “B” graph for VHO with Ad-hoc property.From that graph we can conclude “B” performance is higher than “A”. By the OFDMA technique, the bandwidth is allocated in the form of databursts where an integer number of slots are admitted. BSdetermines thenumber of DL and UL slots that a station obtains in one frame then broadcasts the resource allocation results through DL-MAP and UL-MAP messages at the beginning of each DL sub-frame. Therefore, mobile station can easily obtain the utilization of UMTS link by aggregating the number of allocated slots stated in DL-MAP/UL-MAP messages.
  • 5. V. V. N. S. S. L. M. Anusha. K, Dr. M. Sailaja / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.2049-2054 2053 | P a g e Fig 3(b):Bandwidth available UL Fig 3(c): Bandwidth available DL The AASd (AASu) occupation denotes the utilization of the medium, which equals to AASd/sd (AASu/su). Simulated result for available bandwidth is shown in above graph. fig 3(d):WLAN available bandwidth In above figure, we showed our result for WLAN bandwidth availability. If NAV increases bandwidth will be reduce. Fig3(e):x-graph for packet loss The above graph shows that the packet loss is same for VHO and VHO with Adhoc network. Fig3(f):x-graph for packet overhead In theabove graph there are two lines first line indicates packet overhead in VHO second line indicates packet overhead in VHO with ad-hoc network. The overhead in VHO is high compared to VHOwith Ad-hoc network. VI. CONCLUSION In this paper, we investigate several important issues for the interworking of WLAN and UMTSnetworks. We resolve a tightly coupled interworking architecture as the platformof our scheme. And we improved efficiency of the network by including Ad-hoc property. REFERENCES [1] Cheng Wei Lee, Li Ming Chen, Meng Chang Chen, and Yeali Sunny Sun-Oct 31, 2005 “A Framework of Handoffs in Wireless Overlay Networks Based on Mobile IPv6”. [2] “Handoffs in Fourth Generation Heterogeneous Networks”Nidal Nasser, Ahmed Hasswa and HossamHassanein - 2006. [3] “A Seamless and Proactive End-to-End Mobility Solution for Roaming Across Heterogeneous Wireless Networks”ChuanxiongGuo, ZihuaGuo, QianZhang andWenwu Zhu - 2004. [4] “Handover Management Architectures in Integrated Wlan/Cellular Networks” George Lampropoulos, Nikos Passas, LazarosMerakosAndAlexandros Kaloxylos- 2006. [5] “Handover Management In Integrated Wlan And Mobile WimaxNetworks”Allan Borges Pontes, Diego Dos Passos Silva, José Jailton, JR., Otavio Rodrigues, Jr., And Kelvin Lopes Dias- 2008. [6] “Movement-Aware Vertical Handoff of WLAN and Mobile WiMAX for Seamless Ubiquitous Access”Wonjun Lee, Eunkyo Kim, Joongheon Kim, Inkyu.,Lee and Choonhwa Lee - 2011. [7] “QoS-Oriented Intersystem Handover Between IEEE 802.11b and Overlay
  • 6. V. V. N. S. S. L. M. Anusha. K, Dr. M. Sailaja / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.2049-2054 2054 | P a g e Networks”Alexandre V. Garmonov, SeokHo Cheon, Do HyonYim, Ki Tae Han,Yun Sang Park, Andrew Y. Savinkov, Stanislav A. Filin, Sergey N. Moiseev, and Mikhail S. Kondakov- 2008. [8] “Bandwidth Estimation: Metrics, Measurement Techniques, and Tools”---> Ravi Prasad, ConstantinosDovrolis, Margaret Murray and kcclaffy- 2003. [9] “Bandwidth Recycling in IEEE 802.16 Networks” David Chuck and J. Morris Chang- 2010. [10] “Energy-Efficient Network Selection with Mobility Pattern Awareness in an Integrated WiMAX and WiFi Network” Wen-Hsin Yang, You-Chiun Wang, Yu-Chee Tseng and Bao-Shuh P. Lin- 2000. Books [11] Computer Networks(Fourth Edition) by ANDREW S. TANENBAUM. [12] Wireless Communication and Networks (Second Edition ) by William Stallings. Dr.M.Sailaja received thePh.D in electronics and communication engineering from the JNT University in 2009, persuade M.S. in U.S.A. She has been working at different companies and since 1994 onwards in JNTU Kakinada. V.V.N.S.S.L.M.Anusha.k,received theB.Tech degree in Electronicsand CommunicationEngineering in 2011 fromPondicherry University, andpursuingM.Tech degree inJNTUKakinada.