SUPPORT OF HANDOVER IN MOBILE ATM NETWORKS

Size: px
Start display at page:

Download "SUPPORT OF HANDOVER IN MOBILE ATM NETWORKS"

Transcription

1 SUPPORT OF HANDOVER IN MOBILE ATM NETWORKS Péter Fazekas Tel: (36) Fax: (36) Department of Telecommunications Pázmány Péter sétany 1/D Polytechnic University of Catalonia 1117 Budapest Hungary 1. Abstract In this paper I give an outline of the problems of the mobile ATM networks due to user mobility. I propose some possible solutions. I describe an optimized version one of these and also describe a modeling method to analyze these kind of mobile ATM networks. Keywords: mobil ATM, Virtual Connection Tree, location prediction, BCMP networks 2. INTRODUCTION To maintain high bit rate and good quality access to Internet in the future we need a fast and reliable backbone network that carries the Internet traffic in a MAN/WAN environment. The speed and reliability of the access network is also indispensable. ATM was developed to operate as a reliable multi bit-rate transmission technique, which provides specified Quality of Service (QoS) parameters to the users. Given that the number of internet users grows exponentially and their required bandwidth and the variety of internet applications grows even more rapidly it is reasonable to think about ATM as a convenient bearer of the internet traffic. So the concept of IP over ATM is becoming to be seen as the transmission technique of the future. As the capacity and speed of the laptopsized computers has increased dramatically in the past few years, the demand of accessing the internet with laptops via the radio channel while the user is moving also became significant. Thus, the mobility support of the Internet protocol was developed and next version of IP (IPv6) also contains mobility support. If we assume that the future network is an IP over ATM type, it is important to deal with the mobile extension of the ATM. Of course a lot of work has been done about this topic so far. The main problem of extending the connection-oriented ATM technique to mobile environment is that the users access point to the network may change during an ongoing connection (handover). Theoretically the network should re-establish the connection after each handover with all the procedure of the connection setup. As cellular networks move towards using small cells to increase frequency reusability and system capacity and to decrease used powers, the rate of handovers increases. This raised number of handover could cause overload of the network intelligence if all the handovers are followed by a connection setup procedure. Thus a lot of research is done in the field of avoiding the need of frequent re-establishment of connections. 3. SOLUTIONS OF THE FREQUENT HANDOVER PROBLEM To avoid the overload of the call processor and to provide seamless connectivity to mobile users in micro- and picocellular environment, several techniques were proposed. One of the possible solutions is to predict the users mobility patterns [1-3]. Location prediction is a dynamic strategy in which the system proactively estimates the mobile s location based on a user movement model. Location tracking capability depends on the accuracy of this mobility model and the efficiency of the prediction algorithm. If the system predicts the user s movement accurately, it is able to allocate resources for the user at the future access points. Thus, if the system is able to determine the mobile s future locations and access points as it moves inside the network while being connected it could improve the system efficiency and the connection quality significantly. One way for the system to know the future direction of the mobile is to have a mechanism in place that allows the mobile to indicate to the system its intended destination and the duration of the connection. The system uses this information to determine the future path of the mobile. To achieve this, it uses its knowledge about the terrain and locations of the base stations of the terrain. However, this might not be a conclusive solution,

2 because there could be multiple paths to a destination within a terrain. Moreover, it is not unreasonable to assume that the mobile may diverge from its stated path without warning, in order to adjust to its dynamically changing environment. Some of the location prediction algorithms based on the proposal, that the mobile s location may be determined based on its quasi deterministic mobility behavior represented as a set of movement patterns stored in a user profile. A more sophisticated method is when a user s moving behavior is modeled as repetitions of some elementary movement patterns. Based on this mobility patterns, a pattern recognition, pattern matching based mobile motion prediction (MMP) algorithm is used to estimate the future locations of the mobile. The drawback of this method is that it is sensitive to the random movements. Any movement that cannot be classified by the simple mobility patterns is a random movement. Another approach to pre-allocate system resources for communicating mobile users that change their access point in the network is to reserve resources in all the cells to which the mobile is able (or likely) to move in the near future. To achieve this, it is necessary again to predict the movement of the user. But in this case the prediction does not have to be as accurate. In location prediction algorithms the system tries to predict the path of the user and allocate resources at the base stations of which this path is consist of. In this other case the system estimates a larger set of possible cells in the neighborhood of the mobile s actual cell. This is the so-called shadow cluster concept [4]. The shadow cluster defines the area of influence of a mobile terminal (i.e. the set of base stations to which the mobile is likely to attach in the near future). Like a shadow, this set moves along with the mobile, incorporating new base stations while leaving old ones as they come under and out of the mobile s influence. Each base station in the shadow cluster anticipates the mobile s arrival and reserves resources for it. The accuracy of the mobile s path prediction determines the number of base stations that reserve resources and this determines the system efficiency. With a good prediction, only a few base stations compose the shadow cluster, thus in this case the efficiency of this pre-allocating of resources is high. With a perfectly accurate prediction, the shadow cluster consists of only one cell (the next one). As we have seen, the shadow cluster concept may strongly utilize the results of several location prediction algorithms and can be seen as a kind of extension of the location prediction idea. Another solution is the so-called umbrella cell. This approach deals with the handover problem at the physical and data-link layer; thus it is applicable for not only ATM but also any other types of networks. Yet it is worth knowing it because it might be a simple solution in ATM networks too. An umbrella cell is a cell, which is much larger then the other ones of the network. This cell may cover a geographical area, where users are likely to hand over frequently. Naturally this area is also covered by a number of original cells, but obviously the umbrella cells and the other cells use different physical channels. When a user s behavior shows that it isgoing to hand over frequently, its call is switched (handed over by the system) to the base station that serves the umbrella cell. Since the umbrella cell covers a large geographical area, the mobile will not initiate any more handovers until it stays in the coverage of the umbrella cell. The decision of switching a user s call to the umbrella cell might based on measurements of the user s velocity, or the number of handovers it has already completed or again the location prediction algorithms might be used to calculate the number of handovers the user is going to make according to the information of its velocity, direction, etc 4. VIRTUAL CONNECTION TREE The other way to avoid the degradation of the QoS parameters due to frequent handovers is to group a set of radio cells and provide, that handovers between these cells do not effect in new call setup and call admission control procedure. To obtain this, the so-called Virtual Connection Tree (VCT) concept was proposed in [5]. A Virtual Connection Tree is a collection of cellular base stations and wired network switching nodes and links. The leaves of the tree are the base stations; the branches are the links between the ATM switches. The VCT is connected to the fixed network with a root switch. The other switches also can be nodes of the fixed network, and can be connected physically with more links, not only with the links of the VCT. So the elements of the VCT (except the base stations) can also carry traffic of the other parts of the network, but all the

3 traffic of the VCT (i.e. the communication of the mobiles admitted to the VCT) is switched through the root of the tree. The geographical area covered by the VCT is called neighboring mobile access region. When a mobile connection is admitted to a virtual connection tree, a collection of Virtual Circuit Numbers (VCN) is assigned to the call. Each VCN defines a path between the root of the connection tree and a distinct base station. There are two sets of the VCN, one in each direction (upstream and downstream). While the mobile user roams in the VCT, it can hand over its call to a base station without the need of rerouting the call, because the mobile simply informs the root switch about the handoff by continuing the transmission with the new VCN. The root has a table with entries of all the mobiles that are admitted to the VCT. The table contains the identifiers and the actually used VCNs (i.e. the locations) of the users. When the root receives a call it looks up the VCN of the called mobile from its table by the identifier of the called party (this information of the called party s identity must be contained in the incoming call) and forwards the call to the called mobile according to the last received VCN from that user. The call processor of the VCT is only involved when a handoff to or from the VCT occurs. In each node of the tree, the received ATM cells are relayed according to the VCN of the communicating user. So each switch of the tree contains a routing table with the entries of VCNs and input/output ports. So, when a new mobile initiates a call from the VCT, or a call arrives to a mobile at the VCT, the call setup procedure is divided into to parts. First, the fixed part of the connection is set up (between the root switch and another fixed terminal of the network or the root switch of another VCT). This fixed portion is maintained during the connection s lifetime or as long as the mobile stays within the connection tree. If the caller and the called party both dwell in the VCT, this part of the call setup evidently does not take place. As a second step, the variable part of the connection is established inside the VCT. This means that the routing tables of the switches are appropriately updated according to the new sets of VCNs. However all the connections between the root switch and the base stations are set up in terms of the updating of the routing tables, only two of them (one in both direction) is in use at a moment. The operation of the VCT is similar to the pointmultipoint connection but only one path of the tree is in use at any time. If a handover between base stations of the VCT occurs, the mobile simply continues its communication with the appropriate new VCN. If it is not communicating, but it is switched on, it must send a handover message to the root with the new VCN. Otherwise the root would not know its new location and would possibly route an incoming call to a wrong path. The root then updates its table of mobiles according to the new VCN. Whenever a mobile reaches the boundary of a connection tree, it seeks admission to a new connection tree. This procedure is the virtual connection tree handoff. At this point, the network call processor must again become involved. However, since the geographical area a VCT covers is large compared to the size of the radio cells which comprise the tree, the rate of connection tree handovers is assumed to be acceptably low and manageable by the call processor. To prevent the connection of a mobile situated at the boundary of two connection trees from oscillating between the two, connection trees would overlap in space (i.e. some base stations might belong to two trees). Thus it is unlikely that after a handover a connection will immediately seek to handover again to another tree. The virtual connection tree concept integrates the advantages of both the micro- and macrocellular approach. Since the connection tree might consist of micro- or picocells, the higher radio spectrum efficiency, frequency reusability and thus the higher capacity of microcellular networks is utilized by the connection tree. On the other hand, because from the handover point of view the connection tree behaves like a large cell, it exploits the advantages of the low handover rate in networks of cells with large radius. So the VCT approach maintains QoS by minimizing latency during handover initiation and completion, by minimizing cell loss and by reducing processing delay during handoff. The strength of the VCT is the admission control and rerouting algorithms, which are fairly simple to implement. There are some drawbacks of the VCT too. One of these comes from the single call admission control mechanism that take place when a mobile enters the VCT. Namely, though the state of the VCT and the QoS measures might be acceptable at the time a mobile admits to the tree, due to the arbitrary movements of the users within the tree overload of resources could occur at base stations or at switches. This overload might seriously degrade the QoS parameters (like cell loss

4 ratio, cell delay etc.). It is reasonable to assume, that the bottlenecks of these overload states are the base stations, since we consider that there are enough resources at the wired part of the connection tree, but the physical channel of the radio base stations is limited. Thus a new QoS parameter of the virtual connection tree, the base station overload probability might be introduced. More accurately, base station overload occurs, when the required capacity of the mobiles that are under the coverage area of a base station exceeds the maximum capacity that a base station could provide without violating other QoS parameters. Besides the possibility of system overload, the inefficient use of the network resources and the long setup processing time needed to assign VCNs on a large geographical area are also the drawbacks of the VCT. In addition, most of the VCNs are wasted, since in a large VCT the mobile is not likely to visit all the cells. To avoid these latter inefficiencies, one might combine the VCT approach with location prediction algorithms. With location prediction one can reduce the usage of unnecessary VCNs if only the VCNs of the predicted locations are assigned to a mobile's call. Each of these connections is maintained for time duration determined from the mobile's predicted velocity and predicted cell dwell time. There are some other possible drawbacks of the VCT concept, due to the centralized routing; i.e. that all the communications initiated from inside or outside the VCT is switched through the root switch. This is the case, even if both the caller and the called party are in the coverage area of the same base station. In a large VCT in the upstream direction there might be several hops between the initiator and the root and another number of hops from the root to the destination in the reverse direction. This wastes the capacity of the links and nodes of the VCT. Since as it was described above, the elements of the VCT might carry traffic of the other parts of the network, thus this additional load may degrade the quality of other connections at the whole network. Moreover, the centralized routing and handover management of the VCT may result in the degradation of cell loss ratio and cell delay due to handovers. When a mobile hands over to a new base station, the root updates its location table only if it receives an ATM cell with a new VCN that indicates the handover. In large VCNs the latency between a handover and the detection of the handover might be significant. During this time the root might forward ATM cells towards the old base station of the mobile, with wrong VCN. These cells become lost or significantly delayed at switches, which try to reroute these cells to the appropriate destination. However, by adding more intelligence to the nodes of the VCT, these drawbacks might be reduced. 5. OPTIMIZING A VCT We have seen that switching all connections through the root may cause unnecessary load at the network. Moreover the latency between the handover and the refreshment of the root s location table may increase cell loss ratio or cell delay. These problems might be avoided if those cells from which mobiles are likely to call each other (for instance cells that are covering different buildings of a company) are connected to switches that are not far from the root at the tree topology, or directly to the root itself. The same holds about cells between which handovers frequently occur. However in most cases it is difficult to carry out this solution. Namely, the convenient switches or the root may be geographically far away from the base stations that are planned to be connected to these switches. Moreover the number of base stations that might be connected to a switch is limited. The other solution is to add more functionality to some of the switches of the VCT, namely these changed nodes should act as roots if receiving a call to one of its ports that connect the lower parts of the VCT to that node (i.e. the call is coming from a switch or base station that is under the node in tree topology. This means, that each of these nodes should have a table of the identifiers of those mobiles that dwell under the node in the tree. To fill up and refresh these tables is possible when a mobile is admitted to the connection tree. While asking for admission the mobile must send registration messages towards the root. Then all the nodes between the base station to which the mobile is admitted to and the root switch receives these messages and fill up their own location tables. So each node creates entries in its table only about the mobiles that dwell under it in the tree. Besides these table of locations the switch need to have information of the VCT topology to perform the handover operation described later.

5 When a mobile initiates a call from the connection tree, each node to which this call arrives should check if the called party is in its location table. If it is, the node redirects the call according to the called party s VCN. If the node does not have an entry of the called party, it forwards the call towards the next node that is above it in the tree. At last the call might arrive to the root which might switch it out of the VCT if the called party is outside the VCT. But if a switch receives a call that is coming from the upper parts of the connection tree, it switches the call according to its rooting table (so in this case the switch operates as in the original VCT concept). Similar operation is needed at the time of handover. Before the handover happens, the mobile should send a message which contains the VCN that corresponds to the next base station to which the mobile is immediately going to admit to. The switch that receives this handover message checks if the new base station is under it in the tree or not (this could be achieved with the knowledge of the tree topology and the assignment of base stations and VCNs). If the next base station of the mobile is under it, the node updates its table of mobiles and its routing table according to the new VCN. Thus when ATM cells bearing the VCN of the mobile arrives to the switch, it forwards them towards the new base station. If the new base station is not under the switch, it forwards the handover message to the switch which is above it in the tree (it results from the tree topology that each switch has only one neighbor that is above it) and deletes the entry of the mobile from its table of mobiles. So the handover message goes as high in the tree as it is necessary (i.e. until a node that recognizes that the new base station to which the mobile hands over is under it). This highest point might be the root switch. If the mobile hands over from the VCT the root deletes its entry of the mobile. If the VCT has these changed switches with a farseeing planning the extra load due to intra VCT connections and the degradation of QoS due to handovers might be significantly reduced. Namely if base stations of cells that are covering areas between which users are likely to communicate or to handover should be connected to the same switch that performs this modified, root-like operation. The price of this reduction of extra load and amelioration of QoS measures is the increased switching delay due to the looking ups and refreshments the nodes should fulfill. But since these nodes should store information only of the mobiles that dwell under it in the tree. Thus these tables do not need to be large. By the development of the speed of switching elements and the reduction of the price of such elements there is a possibility to apply these kind of advanced nodes at the VCT. 6. MODELING TOOL FOR ANALYZING VCTS In [5-6] simple analytical models were proposed to calculate the previously described base station overload probability in a VCT. These models were homogenous. These models assumed the handover probabilities between cells to be uniformly distributed (even between nonneighboring cells) and the call initiation probabilities from cells were also uniformly distributed. The sojourn time of users in cells and the call holding times were assumed to be exponentially distributed. A new model is proposed in [7]. This model can handle the following new properties: the handoff probability is not equal between each cell pairs and it is zero between not neighboring cells the residential time spent by a user within a cell depends on the type of the user and the cell as well and is arbitrary distributed the call holding time and the required capacity depend on the type of the user, the call holding time is exponentially distributed the new calls generated within the VCT are not equally distributed i.e. the call rate in different cells is different the incoming stream of handoff-calls to a VCT and the total stream of new calls within the VCT are approximated as two independent Poisson processes, the arrival rate depends on the total number of users in the VCT We can model the VCT with these assumptions as a network of queues. A queuing network consists of a set of queues. The network could be either closed or open, i.e. there are customers entering and leaving the network, or the number of customers in the network is constant. When a customer gets served, it may enter another queue (or the same queue again), or, in case of open networks leave the network with certain probabilities. To understand our modeling concept, it is worth describing shortly one type of queuing networks, described the so-called BCMP theorem [8]. According to the BCMP theorem, a set of

6 server per user (in other terms infinite server, however there is no physical realization of infinite servers) queues with Coxian service times connected into a network of queues has a product form solution in equilibrium. The theorem allows the use of several customer classes and the service times may depend on the user class as well. Within subsets of customer classes class switching is also allowed (i.e. the customer enters a queue as of class i, but after getting served, enters the next queue as of class j). Moreover, the BCMP networks may consist of three other types of queues, but there is no need using them in this present work. The state space of such a queuing network is quite complex. We must track and consider the number of customers receiving the ith phase of the service time related to the jth class at the kth queue. This is a large number of possible state combinations, even in the case when we want to calculate the probability of having n i customers at queue i, i runs from 1 to N, where N is the number of queues at the network. However, we may reduce this state space due to the so-called insensitivity property of the BCMP networks [8]. According to this property, the steady-state probabilities of the network do not depend on the service time distribution, but only the mean service time. This simplifies the numerical calculations of a network. 7. MODELING A VCT AS A BCMP NETWORK No we have the tool to analyze a VCT. The goal is to obtain the overload probability of the VCT, with respect of different assumptions. Because we do not exploit any property of the VCT, only that it is a set of cells, we can extend this model to any cell group, where we are interested in the base station overload probabilities. We can model different user types, according to their motion characteristics, call-holding times and required capacities. These types are the customer classes from the queuing point of view. Each cell is modeled as a server per customer queue, with several user classes. A new user can enter a cell in tree cases: as a new call initiated at that cell, as a handover call from outside the VCT, or as a handover call from another cell of the VCT. In the queuing network the first two cases correspond to a new customer arrival, the third is a hop from a queue to another. Similarly, a customer can leave the network by terminating its call, or by handing out of the VCT. Given the handover probabilities between cells, these are one component of the transition probabilities of the queuing network. To obtain the correct value of the transition probabilities, we need information about the call holding time and the sojourn time of the users at cells. The service time of a queue is the time that a communicating user spends in the corresponding cell. What is then the distribution of this time? As a user can leave a queue by terminating its call or by handing out of the cell, the service time is the minimum of the two time variables: call holding time and time spent in a cell between two handovers. To keep the model proper, we must assume that each call holding time is exponentially distributed. With this assumption when a mobile hands over to a new cell its service time is the same as if it had initiated its call in that cell, due to the memoryless property of the exponential distribution With the knowledge of the distribution of the time a user spends within a cell, we can determine the proper transition probabilities of the queuing network: when a handover occurs, this probability is the handover probability to the next cell (here next cell could be outside the VCT), multiplied by the probability, that the call has not terminated yet (i.e. the probability that an exponential random variable is bigger than the other with the distribution of F(t)). Now knowing the attributes of the user types (call holding time, time spent within a cell depending on the cell as well, required capacity), the probability of handovers between cells, the arrival rate of users (new calls or handover calls from outside the VCT) and the maximum capacity of the base stations we can calculate the overload probability of the VCT and the single base stations as well. 8. CONCLUSIONS In this paper I gave an outline of the problems due to handovers in the future s cellular networks and some possible solutions of this problem. I described in details the operation of the so-called Virtual Connection Tree. I described the drawbacks of the original VCT concept and proposed a possible optimization to improve the performance of the VCT. I also showed a modeling method to calculate some properties of a VCT.

7 REFERENCES [1] T. Liu, Bahl P., Chlamtac I, Mobility Modeling, Location Tracking and Trajectory Prediction in Wireless ATM Networks, IEEE Journal on Sel. Areas in Comm.,vol 16., Aug [2] S. Tabbane, An Alternative Strategy for Location Tracking, IEEE Journal on Sel. Areas in Comm., vol 13., June 1995 [3] G.Y Liu, G.Q. Maguire, A Predictive Moobility Management Algorithm for Wireless Mobile Computation and Communication, Proc. IEEE Int. Conf. Universal Personal Commun., 1995 [4] D.A. Levine, I.F. Akyildiz, M. Naghshineh, The Shadow Cluster Concept for Resource Allocation and Call Admission in ATM Based Wireless Networks, IEEE Trans. on Networking, vol 6., Feb [5] A. Acampora, M. Naghshineh, An architecture and methodology for Mobile-Executed Handoff in Cellular ATM Networks, IEEE Journal on Sel. Areas in Comm.,October 1994 [6] T.C. Wong, J.W. Mark, Connection Admission Control in a Cellular Wireless ATM Access Network, Proc. of the IEEE Globecom 98 [7] P. Fazekas, Modeling a Virtual Connection Tree Based Mobile ATM Network, accepted paper to IEEE VCT 99 Fall Conference, Amsterdam, Sep [8] E. Gelenbe, I. Mitrani, Analysis and Synthesis of Computer Systems, Academic Press, London, 1980

Design and Analysis of QoS Supported Frequent Handover Schemes in Microcellular ATM Networks

Design and Analysis of QoS Supported Frequent Handover Schemes in Microcellular ATM Networks 942 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 50, NO. 4, JULY 2001 Design and Analysis of QoS Supported Frequent Handover Schemes in Microcellular ATM Networks Kuochen Wang and Lon-Sheng Lee Abstract

More information

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 ISSN

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 ISSN 7 Location Management Strategies in Mobile Networks Vivek Kumar Department of Computer Science & Engineering Graphic Era University, Dehradun, INDIA vivekror7@gmail.com Narayan Chaturvedi Department of

More information

A Handover Optimisation Scheme in Cellular Networks

A Handover Optimisation Scheme in Cellular Networks A Handover Optimisation Scheme in Cellular Networks A.Gueroui and S.Boumerdassi Laboratoire PRiSM, Université de Versailles 45, Avenue des Etats-Unis 78035 Versailles France Laboratoire CEDRIC, CNAM 292,

More information

Adaptive Dynamic Channel Allocation Scheme for Spotbeam Handover in LEO Satellite Networks*

Adaptive Dynamic Channel Allocation Scheme for Spotbeam Handover in LEO Satellite Networks* Adaptive Dynamic Channel Allocation Scheme for Spotbeam Handover in LEO Satellite Networks* Sungrae Cho Broadband and Wireless Networking Laboratory School of Electrical and Computer Engineering Georgia

More information

Stochastic Control of Path Optimization for Inter-Switch Handoffs in Wireless ATM Networks

Stochastic Control of Path Optimization for Inter-Switch Handoffs in Wireless ATM Networks 336 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 9, NO. 3, JUNE 2001 Stochastic Control of Path Optimization for Inter-Switch Handoffs in Wireless ATM Networks Vincent W. S. Wong, Member, IEEE, Mark E. Lewis,

More information

Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications

Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications Jongho Bang Sirin Tekinay Nirwan Ansari New Jersey Center for Wireless Telecommunications Department of Electrical

More information

A Minimum Cost Handover Algorithm for Mobile Satellite Networks

A Minimum Cost Handover Algorithm for Mobile Satellite Networks Chinese Journal of Aeronautics 21(2008) 269-274 Chinese Journal of Aeronautics www.elsevier.com/locate/cja A Minimum Cost Handover Algorithm for Mobile Satellite Networks Zhang Tao*, Zhang Jun School of

More information

User Based Call Admission Control Policies for Cellular Mobile Systems: A Survey

User Based Call Admission Control Policies for Cellular Mobile Systems: A Survey User Based Call Admission Control Policies for Cellular Mobile Systems: A Survey Hamid Beigy and M. R. Meybodi Computer Engineering Department Amirkabir University of Technology Tehran, Iran {beigy, meybodi}@ce.aut.ac.ir

More information

UTILISING SIGNAL MEASUREMENT IN BANDWIDTH RESERVATION SCHEME FOR QOS PROVISIONING IN MULTIMEDIA WIRELESS NETWORKS

UTILISING SIGNAL MEASUREMENT IN BANDWIDTH RESERVATION SCHEME FOR QOS PROVISIONING IN MULTIMEDIA WIRELESS NETWORKS Malaysian Journal of Computer Science, Vol. 16 No. 2, December 23, pp. 58-72 UTILISING SIGNAL MEASUREMENT IN BANDWIDTH RESERVATION SCHEME FOR QOS PROVISIONING IN MULTIMEDIA WIRELESS NETWORKS Prihandoko

More information

An Efficient Resource Allocation Protocol for Multimedia Wireless Networks

An Efficient Resource Allocation Protocol for Multimedia Wireless Networks International Journal of Advanced Trends in Computer Science and Engineering, Vol.2, No.1, Pages : 178-182 (213) Special Issue of ICACSE 213 - Held on 7-8 January, 213 in Lords Institute of Engineering

More information

Analyzing the performance of WiMAX zone handover in the presence of relay node Qualnet6.1

Analyzing the performance of WiMAX zone handover in the presence of relay node Qualnet6.1 IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 9, Issue 3, Ver. IV (May - Jun. 2014), PP 49-53 Analyzing the performance of WiMAX zone

More information

WiMax-based Handovers in Next Generation Networks

WiMax-based Handovers in Next Generation Networks WiMax-based Handovers in Next Generation Networks Nadine Akkari Department of Computer Science Faculty of Computing and Information Technology King Abdulaziz University, Saudi Arabia nakkari@kau.edu.sa

More information

A Bandwidth Degradation Technique to Reduce Call Dropping Probability in Mobile Network Systems

A Bandwidth Degradation Technique to Reduce Call Dropping Probability in Mobile Network Systems TELKOMNIKA Indonesian Journal of Electrical Engineering Vol. 16, No. 2, November 215, pp. 33 ~ 37 DOI: 1.11591/telkomnika.v16i2.8426 33 A Bandwidth Degradation Technique to Reduce Call Dropping Probability

More information

Keywords Handoff, QoS provisioning, Expected Visitor List, Decomposition of Handoff Messaging, Base Station, Handoff Initiation, Handoff Decision.

Keywords Handoff, QoS provisioning, Expected Visitor List, Decomposition of Handoff Messaging, Base Station, Handoff Initiation, Handoff Decision. Volume 4, Issue 7, July 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Study on Handoff

More information

TAKEOVER: A New Vertical Handover Concept for Next-Generation Heterogeneous Networks

TAKEOVER: A New Vertical Handover Concept for Next-Generation Heterogeneous Networks TAKEOVER: A New Vertical Handover Concept for Next-Generation Heterogeneous Networks Hyun-Ho Choi and Dong-Ho Cho Department of Electrical Engineering and Computer Science Korea Advanced Institute of Science

More information

An Adaptive Bandwidth Reservation Scheme for Multimedia Mobile Cellular Networks

An Adaptive Bandwidth Reservation Scheme for Multimedia Mobile Cellular Networks An Adaptive Bandwidth Reservation Scheme for Multimedia Mobile Cellular Networks Hong Bong Kim Telecommunication Networks Group, Technical University of Berlin Sekr FT5 Einsteinufer 25 1587 Berlin Germany

More information

Neuro-fuzzy admission control in mobile communications systems

Neuro-fuzzy admission control in mobile communications systems University of Wollongong Thesis Collections University of Wollongong Thesis Collection University of Wollongong Year 2005 Neuro-fuzzy admission control in mobile communications systems Raad Raad University

More information

MODIFIED VERTICAL HANDOFF DECISION ALGORITHM FOR IMPROVING QOS METRICS IN HETEROGENEOUS NETWORKS

MODIFIED VERTICAL HANDOFF DECISION ALGORITHM FOR IMPROVING QOS METRICS IN HETEROGENEOUS NETWORKS MODIFIED VERTICAL HANDOFF DECISION ALGORITHM FOR IMPROVING QOS METRICS IN HETEROGENEOUS NETWORKS 1 V.VINOTH, 2 M.LAKSHMI 1 Research Scholar, Faculty of Computing, Department of IT, Sathyabama University,

More information

ANALYSIS OF LINK EFFICIENCY AND HANDOFF WITH MOBILITY MANAGEMENT IN COGNITIVE RADIO

ANALYSIS OF LINK EFFICIENCY AND HANDOFF WITH MOBILITY MANAGEMENT IN COGNITIVE RADIO ANALYSIS OF LINK EFFICIENCY AND HANDOFF WITH MOBILITY MANAGEMENT IN COGNITIVE RADIO Prof.Abdul Sayeed 1,Vinay Mengu 2,Sharikh Khan 3,Mohammed Moria 4 1,2,3,4 Department of Electronics & Telecommunication

More information

Rerouting Schemes for Wireless ATM Networks

Rerouting Schemes for Wireless ATM Networks Communications and Network, 204, 6, 28-227 Published Online November 204 in SciRes. http://www.scirp.org/journal/cn http://dx.doi.org/0.4236/cn.204.64024 Rerouting Schemes for Wireless ATM Networks Hasan

More information

Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks

Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks X. Yuan, R. Melhem and R. Gupta Department of Computer Science University of Pittsburgh Pittsburgh, PA 156 fxyuan,

More information

A New Call Admission Control scheme for Real-time traffic in Wireless Networks

A New Call Admission Control scheme for Real-time traffic in Wireless Networks A New Call Admission Control scheme for Real-time traffic in Wireless Networks Maneesh Tewari and H.S. Jamadagni Center for Electronics Design and Technology, Indian Institute of Science, Bangalore, 5612

More information

Lecture (08, 09) Routing in Switched Networks

Lecture (08, 09) Routing in Switched Networks Agenda Lecture (08, 09) Routing in Switched Networks Dr. Ahmed ElShafee Routing protocols Fixed Flooding Random Adaptive ARPANET Routing Strategies ١ Dr. Ahmed ElShafee, ACU Fall 2011, Networks I ٢ Dr.

More information

What Is Congestion? Effects of Congestion. Interaction of Queues. Chapter 12 Congestion in Data Networks. Effect of Congestion Control

What Is Congestion? Effects of Congestion. Interaction of Queues. Chapter 12 Congestion in Data Networks. Effect of Congestion Control Chapter 12 Congestion in Data Networks Effect of Congestion Control Ideal Performance Practical Performance Congestion Control Mechanisms Backpressure Choke Packet Implicit Congestion Signaling Explicit

More information

An Enhancement of Mobile IP by Home Agent Handover

An Enhancement of Mobile IP by Home Agent Handover An Enhancement of Mobile IP by Home Agent Handover Li-Sheng Yu and Chun-Chuan Yang Multimedia and Communications Laboratory Department of Computer Science and Information Engineering National Chi Nan University,

More information

Performance Analysis of Hierarchical Mobile IPv6 in IP-based Cellular Networks

Performance Analysis of Hierarchical Mobile IPv6 in IP-based Cellular Networks Performance Analysis of Hierarchical Mobile IPv6 in IP-based Cellular Networks Sangheon Pack and Yanghee Choi School of Computer Science & Engineering Seoul National University Seoul, Korea Abstract Next-generation

More information

Link Lifetime Prediction in Mobile Ad-Hoc Network Using Curve Fitting Method

Link Lifetime Prediction in Mobile Ad-Hoc Network Using Curve Fitting Method IJCSNS International Journal of Computer Science and Network Security, VOL.17 No.5, May 2017 265 Link Lifetime Prediction in Mobile Ad-Hoc Network Using Curve Fitting Method Mohammad Pashaei, Hossein Ghiasy

More information

Keywords - ALIVEHO, ARSST, False Handoff, HNE, RSS

Keywords - ALIVEHO, ARSST, False Handoff, HNE, RSS A Survey of Vertical Handoff Algorithms to Minimize Probability of False Handoff Pallavi Shital Yevale, Santosh S. Sambare (Department of Computer Engg., Pimpri Chinchwad College of Engg., Pune University,

More information

A Survey on Signaling Load in Mobility Management

A Survey on Signaling Load in Mobility Management ISSN: 2231-4946 Volume IV, Special Issue, December 2014 International Journal of Computer Applications in Engineering Sciences Special Issue on Advances in Computer and Communications www.caesjournals.org

More information

Hao Wang 1, Dave Laurenson 1, and Jane Hillston 2

Hao Wang 1, Dave Laurenson 1, and Jane Hillston 2 A General Performance Evaluation Framework for Network Selection Strategies in 3G-WLAN Interworking Networks Hao Wang 1, Dave Laurenson 1, and Jane Hillston 2 1 Institute for Digital Communications 2 Laboratory

More information

Optimized Paging Cache Mappings for efficient location management Hyun Jun Lee, Myoung Chul Jung, and Jai Yong Lee

Optimized Paging Cache Mappings for efficient location management Hyun Jun Lee, Myoung Chul Jung, and Jai Yong Lee Optimized Paging Cache Mappings for efficient location management Hyun Jun Lee, Myoung Chul Jung, and Jai Yong Lee Abstract Cellular IP maintains distributed cache for location management and routing purposes.

More information

IP Paging Considered Unnecessary:

IP Paging Considered Unnecessary: IP Paging Considered Unnecessary: Mobile IPv6 and IP Paging for Dormant Mode Location Update in Macrocellular and Hotspot Networks James Kempf DoCoMo USA Communications Labs 181 Metro Drive, Suite 3 San

More information

CHANNEL SHARING SCHEME FOR CELLULAR NETWORKS USING MDDCA PROTOCOL IN WLAN

CHANNEL SHARING SCHEME FOR CELLULAR NETWORKS USING MDDCA PROTOCOL IN WLAN International Journal on Information Sciences and Computing, Vol. 5, No.1, January 2011 65 Abstract CHANNEL SHARING SCHEME FOR CELLULAR NETWORKS USING MDDCA PROTOCOL IN WLAN Jesu Jayarin P. 1, Ravi T.

More information

SENSE AND CACHE A NOVEL CACHING SCHEME FOR MOBILE USERS IN A CELLULAR NETWORK

SENSE AND CACHE A NOVEL CACHING SCHEME FOR MOBILE USERS IN A CELLULAR NETWORK SENSE AND CACHE A NOVEL CACHING SCHEME FOR MOBILE USERS IN A CELLULAR NETWORK C.MALA 1, S.SELVAKUMAR 2 Department of Computer science and Engineering National Institute of technology, Tiruchirappalli,

More information

Performance Analysis Of Wi-Fi And Wi-Max Networks During Vertical Handover

Performance Analysis Of Wi-Fi And Wi-Max Networks During Vertical Handover Performance Analysis Of Wi-Fi And Wi-Max Networks During Vertical Handover Ashish Mishra Dept. of Computer Science,Pondicherry University Pondicherry Mrs. R.Sunitha Assistant Professor Dept. of Computer

More information

ADAPTIVE SLOT ALLOCATION AND BANDWIDTH SHARING FOR PRIORITIZED HANDOFF CALLS IN MOBILE NETWOKS

ADAPTIVE SLOT ALLOCATION AND BANDWIDTH SHARING FOR PRIORITIZED HANDOFF CALLS IN MOBILE NETWOKS ADAPTIVE SLOT ALLOCATION AND BANDWIDTH SHARING FOR PRIORITIZED HANDOFF CALLS IN MOBILE NETWOKS S.Malathy G.Sudhasadasivam K.Murugan S.Lokesh Research Scholar Professor, CSE Department Lecturer, IT Dept

More information

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5. Rahem Abri Content 1. Introduction 2. The Ad-hoc On-Demand Distance Vector Algorithm Path Discovery Reverse Path Setup Forward Path Setup Route Table Management Path Management Local Connectivity Management

More information

IPv6-based Beyond-3G Networking

IPv6-based Beyond-3G Networking IPv6-based Beyond-3G Networking Motorola Labs Abstract This paper highlights the technical issues in IPv6-based Beyond-3G networking as a means to enable a seamless mobile Internet beyond simply wireless

More information

Sasikanth Avancha a, Dipanjan Chakraborty a, Dhiral Gada a, Tapan Kamdar a, Anupam Joshi a

Sasikanth Avancha a, Dipanjan Chakraborty a, Dhiral Gada a, Tapan Kamdar a, Anupam Joshi a ! " #$%&'() * + ",.-/ 01&* &+ 2 "3 4 5 6 01%*7 89",+ :;+, < Sasikanth Avancha a, Dipanjan Chakraborty a, Dhiral Gada a, Tapan Kamdar a, Anupam Joshi a a University of Maryland Baltimore County ABSTRACT

More information

Protection Schemes for 4G Multihop wireless Networks

Protection Schemes for 4G Multihop wireless Networks Protection Schemes for 4G Multihop wireless Networks Sridevi, Assistant Professor, Department of Computer Science, Karnatak University, Dharwad Abstract:-This paper describes the relay node protection

More information

A Distributed Routing Algorithm for Supporting Connection-Oriented Service in Wireless Networks with Time-Varying Connectivity

A Distributed Routing Algorithm for Supporting Connection-Oriented Service in Wireless Networks with Time-Varying Connectivity A Distributed Routing Algorithm for Supporting Connection-Oriented Service in Wireless Networks with Time-Varying Connectivity Anastassios Michail Department of Electrical Engineering and Institute for

More information

Buffered Fixed Routing: A Routing Protocol for Real-Time Transport in Grid Networks

Buffered Fixed Routing: A Routing Protocol for Real-Time Transport in Grid Networks JOURNAL OF LIGHTWAVE TECHNOLOGY, VOL. 18, NO. 6, JUNE 2000 757 Buffered Fixed Routing: A Routing Protocol for Real-Time Transport in Grid Networks Jinhan Song and Saewoong Bahk Abstract In this paper we

More information

Decreasing Call Blocking Rate by Using Optimization Technique

Decreasing Call Blocking Rate by Using Optimization Technique International Journal of Scientific and Research Publications, Volume 4, Issue 6, June 2014 1 Decreasing Call Blocking Rate by Using Optimization Technique Vinay Prakash Sriwastava *, Jalneesh Singh *,

More information

Mobility Prediction for Seamless Mobility in Wireless Networks Robin Chellappa Doss 1, Andrew Jennings 2, Nirmala Shenoy 3

Mobility Prediction for Seamless Mobility in Wireless Networks Robin Chellappa Doss 1, Andrew Jennings 2, Nirmala Shenoy 3 Mobility Prediction for Seamless Mobility in Wireless Networks Robin Chellappa Doss 1, Andrew Jennings 2, Nirmala Shenoy 3 1 School of Information Technology, Deakin University, Melbourne, Australia 2

More information

VIRTUAL CONNECTION TREE FOR 3G WIRELESS COMMUNICATION SYSTEMS

VIRTUAL CONNECTION TREE FOR 3G WIRELESS COMMUNICATION SYSTEMS VIRTUAL CONNECTION TREE FOR 3G WIRELESS COMMUNICATION SYSTEMS Rajinder Kumar Department of Computer Science and Engineering Punjab Engineering College,Chandigarh raajinderkumar@gmail.com Abstract This

More information

Different Resource Sharing Policies under a General Channel Management Strategy for Multi-Class Traffic in LEO-MSS

Different Resource Sharing Policies under a General Channel Management Strategy for Multi-Class Traffic in LEO-MSS www.iji.org 126 Different Resource Sharing Policies under a General Channel Management Strategy for Multi-Class Traffic in LEO-MSS Amr S. Matar, Gamal Abd-Elfadeel, Ibrahim I. Ibrahim and Hesham M. Z.

More information

DEFINITION OF SUITABLE SIMULATION SCENARIOS FOR DYNAMIC INVESTIGATIONS IN CELLULAR NETWORKS WITH STEAM

DEFINITION OF SUITABLE SIMULATION SCENARIOS FOR DYNAMIC INVESTIGATIONS IN CELLULAR NETWORKS WITH STEAM DEFINITION OF SUITABLE SIMULATION SCENARIOS FOR DYNAMIC INVESTIGATIONS IN CELLULAR NETWORKS WITH STEAM Holger Pampel Enrico Jugl Lucent Technologies Network Systems GmbH Thurn-und-Taxis Strasse 10 90411

More information

Vertical and Horizontal Handover in Heterogeneous Wireless Networks using OPNET

Vertical and Horizontal Handover in Heterogeneous Wireless Networks using OPNET Vertical and Horizontal Handover in Heterogeneous Wireless Networks using OPNET Abhishek Dhiman M.E, E.C.E Department, Thapar University, Patiala Karamjit Singh Sandha Asst. Professor, E.C.E Department

More information

Pre-Authenticated Fast Handoff in a Public Wireless LAN Based on IEEE 802.1x Model 1

Pre-Authenticated Fast Handoff in a Public Wireless LAN Based on IEEE 802.1x Model 1 Pre-Authenticated Fast Handoff in a Public Wireless LAN Based on IEEE 802.1x Model 1 Sangheon Pack and Yanghee Choi School of Computer Science & Engineering, Seoul National University, Seoul, Korea Telephone:

More information

RESERVATION OF CHANNELS FOR HANDOFF USERS IN VISITOR LOCATION BASED ON PREDICTION

RESERVATION OF CHANNELS FOR HANDOFF USERS IN VISITOR LOCATION BASED ON PREDICTION RESERVATION OF CHANNELS FOR HANDOFF USERS IN VISITOR LOCATION BASED ON PREDICTION 1 M.AMSAVENI 2 S.MALATHY 1 Assistant Professor, Department of ECE, RVS College of Engineering And Technology, Coimbatore,

More information

Performance Behavior of Unmanned Vehicle Aided Mobile Backbone Based Wireless Ad Hoc Networks

Performance Behavior of Unmanned Vehicle Aided Mobile Backbone Based Wireless Ad Hoc Networks Performance Behavior of Unmanned Vehicle Aided Mobile Backbone Based Wireless Ad Hoc Networks Izhak Rubin and Runhe Zhang Abstract We introduce Unmanned Vehicles (UVs) to aid the operation of the mobile

More information

Episode 4. Flow and Congestion Control. Baochun Li Department of Electrical and Computer Engineering University of Toronto

Episode 4. Flow and Congestion Control. Baochun Li Department of Electrical and Computer Engineering University of Toronto Episode 4. Flow and Congestion Control Baochun Li Department of Electrical and Computer Engineering University of Toronto Recall the previous episode Detailed design principles in: The link layer The network

More information

Avoidance of Bottleneck in PCS Network

Avoidance of Bottleneck in PCS Network Avoidance of Bottleneck in PCS Network Sidhi Pandey 1, Alka 2, Pratima Singh 3 1, 2, 3 (Computer Science & Engineering, Institute of Technology & Management, India) Abstract: This paper contains the concept

More information

A Centralized Approaches for Location Management in Personal Communication Services Networks

A Centralized Approaches for Location Management in Personal Communication Services Networks A Centralized Approaches for Location Management in Personal Communication Services Networks Fahamida Firoze M. Tech. (CSE) Scholar, Deptt. Of CSE, Al Falah School of Engineering & Technology, Dhauj, Faridabad,

More information

Active Adaptation in QoS Architecture Model

Active Adaptation in QoS Architecture Model Active Adaptation in QoS Architecture Model Drago agar and Snjeana Rimac -Drlje Faculty of Electrical Engineering University of Osijek Kneza Trpimira 2b, HR-31000 Osijek, CROATIA Abstract - A new complex

More information

Distributed STDMA in Ad Hoc Networks

Distributed STDMA in Ad Hoc Networks Distributed STDMA in Ad Hoc Networks Jimmi Grönkvist Swedish Defence Research Agency SE-581 11 Linköping, Sweden email: jimgro@foi.se Abstract Spatial reuse TDMA is a collision-free access scheme for ad

More information

Information Technology Mobile Computing Module: GSM Handovers

Information Technology Mobile Computing Module: GSM Handovers Information Technology Mobile Computing Module: GSM Handovers Learning Objectives What is handover? Why handover are required? Types of handovers(hard and Soft) Types of Handovers in GSM(Intra cell, Inter

More information

Spectrum Management in Cognitive Radio Networks

Spectrum Management in Cognitive Radio Networks Spectrum Management in Cognitive Radio Networks Jul 14,2010 Instructor: professor m.j omidi 1/60 BY : MOZHDEH MOLA & ZAHRA ALAVIKIA Contents Overview: Cognitive Radio Spectrum Sensing Spectrum Decision

More information

An Efficient DECT-Mobile IP Interworking for Mobile Computing

An Efficient DECT-Mobile IP Interworking for Mobile Computing An Efficient DECT-Mobile IP Interworking for Mobile Computing Anthony Lo *, Winston Seah * and Edwin Schreuder + * Centre for Wireless Communications 1, National University of Singapore, 20 Science Park

More information

Performance Analysis of MANET Routing Protocols OLSR and AODV

Performance Analysis of MANET Routing Protocols OLSR and AODV VOL. 2, NO. 3, SEPTEMBER 211 Performance Analysis of MANET Routing Protocols OLSR and AODV Jiri Hosek Faculty of Electrical Engineering and Communication, Brno University of Technology Email: hosek@feec.vutbr.cz

More information

ABSTRACT /99/$ IEEE

ABSTRACT /99/$ IEEE Dynamic Reservation Based on Mobility in Wireless ATM Networks Young Chon Kim, Dong Eun Lee, Bong Ju Lee, Chonbuk National University, Korea Young Sun Kim, Electronic Telecommunication Research Institute,

More information

Performance Evaluation of UMTS-WLAN interworking Anita Nanda 1, S.P.Panigrahi 2, R.R.Mohanty 2, N.Panda 2, M.Singh 2, S.M.Rout 2

Performance Evaluation of UMTS-WLAN interworking Anita Nanda 1, S.P.Panigrahi 2, R.R.Mohanty 2, N.Panda 2, M.Singh 2, S.M.Rout 2 Performance Evaluation of UMTS-WLAN interworking Anita Nanda 1, S.P.Panigrahi 2, R.R.Mohanty 2, N.Panda 2, M.Singh 2, S.M.Rout 2 1 Comp. Sc., MITS, Rayagada, 2 Electrical Engg., KIST Jatani, Bhubaneswar,

More information

PERSONAL communications service (PCS) provides

PERSONAL communications service (PCS) provides 646 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 5, NO. 5, OCTOBER 1997 Dynamic Hierarchical Database Architecture for Location Management in PCS Networks Joseph S. M. Ho, Member, IEEE, and Ian F. Akyildiz,

More information

November 1998 doc.: IEEE /378 IEEE P Wireless LANs Extension of Bluetooth and Direct Sequence Interference Model.

November 1998 doc.: IEEE /378 IEEE P Wireless LANs Extension of Bluetooth and Direct Sequence Interference Model. IEEE P802.11 Wireless LANs Extension of Bluetooth and 802.11 Direct Sequence Interference Model Date: November 11, 1998 Author: Jim Zyren Harris Semiconductor Melbourne, FL, USA Phone: (407)729-4177 Fax:

More information

Integration of Dynamic Tariff Scheme in Congestion Control

Integration of Dynamic Tariff Scheme in Congestion Control Integration of Dynamic Tariff Scheme in Congestion Control Ameya Patil Student Shree L. R. Tiwari College of Engineering Mira road, India Aditya Badve Student Atharva College of Engineering Mumbai, India

More information

CSCD 433/533 Advanced Networks Spring Lecture 22 Quality of Service

CSCD 433/533 Advanced Networks Spring Lecture 22 Quality of Service CSCD 433/533 Advanced Networks Spring 2016 Lecture 22 Quality of Service 1 Topics Quality of Service (QOS) Defined Properties Integrated Service Differentiated Service 2 Introduction Problem Overview Have

More information

Mobility Management Protocols for Wireless Networks. By Sanaa Taha

Mobility Management Protocols for Wireless Networks. By Sanaa Taha Mobility Management Protocols for Wireless Networks By outline Mobility Management Mobility Management Models Host-based Mobility Management Protocols Network- based Mobility Management Protocols Which

More information

ISSN 2319-8885 Vol.03,Issue.35 November-2014, Pages:6974-6978 www.ijsetr.com A Caching Scheme in Location Based Application SANDI WINN AYE 1, ZAR ZAR WINT 2 1 Dept of Information and Communication Technology,

More information

A Review on various Location Management and Update Mechanisms in Mobile Communication

A Review on various Location Management and Update Mechanisms in Mobile Communication International Journal of Innovation and Scientific Research ISSN 2351-8014 Vol. 2 No. 2 Jun. 2014, pp. 268-274 2014 Innovative Space of Scientific Research Journals http://www.ijisr.issr-journals.org/

More information

Dynamic Behavior of Bandwidth Control Management in Mobile Ad-Hoc Network

Dynamic Behavior of Bandwidth Control Management in Mobile Ad-Hoc Network Dynamic Behavior of Bandwidth Control Management in Mobile Ad-Hoc Network Kumar Manoj Member, IAENG, S. C. Sharma & S.P. Singh Abstract Quality of Service (QoS) support in Mobile Ad-hoc NETworks (MANETs)

More information

Handover between Macrocell and Femtocell for UMTS based Networks

Handover between Macrocell and Femtocell for UMTS based Networks Handover between Macrocell and Femtocell for UMTS based Networks Mostafa Zaman Chowdhury, Won Ryu, Eunjun Rhee, and Yeong Min Jang Kookmin University, Korea Electronic and Telecommunications Research Institute

More information

Quality of Service. Traffic Descriptor Traffic Profiles. Figure 24.1 Traffic descriptors. Figure Three traffic profiles

Quality of Service. Traffic Descriptor Traffic Profiles. Figure 24.1 Traffic descriptors. Figure Three traffic profiles 24-1 DATA TRAFFIC Chapter 24 Congestion Control and Quality of Service The main focus of control and quality of service is data traffic. In control we try to avoid traffic. In quality of service, we try

More information

Investigation on OLSR Routing Protocol Efficiency

Investigation on OLSR Routing Protocol Efficiency Investigation on OLSR Routing Protocol Efficiency JIRI HOSEK 1, KAROL MOLNAR 2 Department of Telecommunications Faculty of Electrical Engineering and Communication, Brno University of Technology Purkynova

More information

Design of a Weighted Fair Queueing Cell Scheduler for ATM Networks

Design of a Weighted Fair Queueing Cell Scheduler for ATM Networks Design of a Weighted Fair Queueing Cell Scheduler for ATM Networks Yuhua Chen Jonathan S. Turner Department of Electrical Engineering Department of Computer Science Washington University Washington University

More information

FAST INTER-AP HANDOFF USING PREDICTIVE AUTHENTICATION SCHEME IN A PUBLIC WIRELESS LAN

FAST INTER-AP HANDOFF USING PREDICTIVE AUTHENTICATION SCHEME IN A PUBLIC WIRELESS LAN FAST INTER-AP HANDOFF USING PREDICTIVE AUTHENTICATION SCHEME IN A PUBLIC WIRELESS LAN SANGHEON PACK AND YANGHEE CHOI School of Computer Science and Engineering, Seoul National University, Seoul, Korea

More information

Mobile SCTP for IP Mobility Support in All-IP Networks

Mobile SCTP for IP Mobility Support in All-IP Networks Mobile SCTP for IP Mobility Support in All-IP Networks Seok Joo Koh sjkoh@cs.knu.ac.kr Abstract The Stream Control Transmission Protocol (SCTP) is a new transport protocol that is featured multi-streaming

More information

A Call Admission Protocol for Wireless Cellular Multimedia Networks

A Call Admission Protocol for Wireless Cellular Multimedia Networks A Call Admission Protocol for Wireless Cellular Multimedia Networks Mokhtar A. Aboleaze Dept. of Computer Science and Engineering York University Toronto, ON. Canada aboelaze@cs.yorku.ca Fadi A. Aloul

More information

CSMA based Medium Access Control for Wireless Sensor Network

CSMA based Medium Access Control for Wireless Sensor Network CSMA based Medium Access Control for Wireless Sensor Network H. Hoang, Halmstad University Abstract Wireless sensor networks bring many challenges on implementation of Medium Access Control protocols because

More information

Modelling and quantitative analysis of LTRACK A novel mobility management algorithm

Modelling and quantitative analysis of LTRACK A novel mobility management algorithm Mobile Information Systems (006) 1 50 1 IOS Press Modelling and quantitative analysis of LTRACK A novel mobility management algorithm Benedek Kovács, M. Szalay and S. Imre Department of Telecommunications,

More information

Spatial and Temporal Aware, Trajectory Mobility Profile Based Location Management for Mobile Computing

Spatial and Temporal Aware, Trajectory Mobility Profile Based Location Management for Mobile Computing Spatial and Temporal Aware, Trajectory Mobility Profile Based Location Management for Mobile Computing Jianting Zhang Le Gruenwald The University of Oklahoma, School of Computer Science, Norman, OK, 73019

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information

The Design and Performance Analysis of QoS-Aware Edge-Router for High-Speed IP Optical Networks

The Design and Performance Analysis of QoS-Aware Edge-Router for High-Speed IP Optical Networks The Design and Performance Analysis of QoS-Aware Edge-Router for High-Speed IP Optical Networks E. Kozlovski, M. Düser, R. I. Killey, and P. Bayvel Department of and Electrical Engineering, University

More information

Vertical Handover in Vehicular Ad-hoc Networks A Survey

Vertical Handover in Vehicular Ad-hoc Networks A Survey Vertical Handover in Vehicular Ad-hoc Networks A Survey U. Kumaran Department of computer Applications Noorul Islam Center for Higher Education, Kumaracoil,Tamilnadu, India. Abstract- Vehicular Ad-hoc

More information

Assignment #1. Csci4211 Spring Due on Feb. 13th, Notes: There are five questions in this assignment. Each question has 10 points.

Assignment #1. Csci4211 Spring Due on Feb. 13th, Notes: There are five questions in this assignment. Each question has 10 points. Assignment #1 Csci4211 Spring 2017 Due on Feb. 13th, 2017 Notes: There are five questions in this assignment. Each question has 10 points. 1. (10 pt.) Describe the special properties of the following transmission

More information

Prioritized Shufflenet Routing in TOAD based 2X2 OTDM Router.

Prioritized Shufflenet Routing in TOAD based 2X2 OTDM Router. Prioritized Shufflenet Routing in TOAD based 2X2 OTDM Router. Tekiner Firat, Ghassemlooy Zabih, Thompson Mark, Alkhayatt Samir Optical Communications Research Group, School of Engineering, Sheffield Hallam

More information

WIRELESS/MOBILE networking is one of the strongest

WIRELESS/MOBILE networking is one of the strongest IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 53, NO. 3, MAY 2004 835 An Integrated Adaptive Bandwidth-Management Framework for QoS-Sensitive Multimedia Cellular Networks Sungwook Kim and Pramod K. Varshney,

More information

Mobile Node Speed Detection Mechanism in Hierarchical Mobile Internet Protocol (IPv6)

Mobile Node Speed Detection Mechanism in Hierarchical Mobile Internet Protocol (IPv6) Journal of Computer Science 7 (9): 1432-1438, 2011 ISSN 1549-3636 2011 Science Publications Mobile Node Speed Detection Mechanism in Hierarchical Mobile Internet Protocol (IPv6) Zulkeflee Kusin and Mohamad

More information

QoS and Radio Resource Management in 3G and Beyond Systems. Oriol Sallent Kideok Cho

QoS and Radio Resource Management in 3G and Beyond Systems. Oriol Sallent Kideok Cho QoS and Radio Resource Management in 3G and Beyond Systems Oriol Sallent Kideok Cho (kdcho@mmlab.snu.ac.kr) 2006. 10. 23 -2/30- Contents Radio Resource Management RRM in Beyond 3G Common RRM in a flexible

More information

A New Hashing and Caching Approach for Reducing Call Delivery Cost and Location Server s Load in Wireless Mobile Networks

A New Hashing and Caching Approach for Reducing Call Delivery Cost and Location Server s Load in Wireless Mobile Networks Proceedings of 2009 12 th International Conference on Computer and Information Technology (ICCIT 2009) 21-23 December, 2009, Dhaka, Bangladesh A New Hashing and Caching Approach for Reducing Call Delivery

More information

Quality of Service Mechanism for MANET using Linux Semra Gulder, Mathieu Déziel

Quality of Service Mechanism for MANET using Linux Semra Gulder, Mathieu Déziel Quality of Service Mechanism for MANET using Linux Semra Gulder, Mathieu Déziel Semra.gulder@crc.ca, mathieu.deziel@crc.ca Abstract: This paper describes a QoS mechanism suitable for Mobile Ad Hoc Networks

More information

Introduction to Mobile Ad hoc Networks (MANETs)

Introduction to Mobile Ad hoc Networks (MANETs) Introduction to Mobile Ad hoc Networks (MANETs) 1 Overview of Ad hoc Network Communication between various devices makes it possible to provide unique and innovative services. Although this inter-device

More information

2013 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media,

2013 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, 2013 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising

More information

Optical networking technology

Optical networking technology 1 Optical networking technology Technological advances in semiconductor products have essentially been the primary driver for the growth of networking that led to improvements and simplification in the

More information

A Survey of IP micro-mobility protocols

A Survey of IP micro-mobility protocols A Survey of IP micro-mobility protocols Pierre Reinbold Olivier Bonaventure Infonet group, University of Namur, Belgium. http://www.infonet.fundp.ac.be. E-mail: preinbold,obonaventure@info.fundp.ac.be

More information

Congestion Control in Communication Networks

Congestion Control in Communication Networks Congestion Control in Communication Networks Introduction Congestion occurs when number of packets transmitted approaches network capacity Objective of congestion control: keep number of packets below

More information

Diminishing Signaling Traffic for Authentication in Mobile Communication System

Diminishing Signaling Traffic for Authentication in Mobile Communication System Diminishing Signaling Traffic for Authentication in Mobile Communication System Chi-Chun Lo and Kuen-Liang Sue Institute of Information Management National Chiao Tung University Hsinchu, Taiwan cclo@cc.nctu.edu.tw,

More information

Evaluating the Performance of Mobile Agent-Based Message Communication among Mobile Hosts in Large Ad Hoc Wireless Network

Evaluating the Performance of Mobile Agent-Based Message Communication among Mobile Hosts in Large Ad Hoc Wireless Network Evaluating the Performance of Mobile Agent-Based Communication among Mobile Hosts in Large Ad Hoc Wireless Network S. Bandyopadhyay Krishna Paul PricewaterhouseCoopers Limited Techna Digital Systems Sector

More information

Chapter 5 (Week 9) The Network Layer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP BLM431 Computer Networks Dr.

Chapter 5 (Week 9) The Network Layer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP BLM431 Computer Networks Dr. Chapter 5 (Week 9) The Network Layer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP. 343-396 1 5.1. NETWORK LAYER DESIGN ISSUES 5.2. ROUTING ALGORITHMS 5.3. CONGESTION CONTROL ALGORITHMS 5.4.

More information

Improving Channel Scanning Procedures for WLAN Handoffs 1

Improving Channel Scanning Procedures for WLAN Handoffs 1 Improving Channel Scanning Procedures for WLAN Handoffs 1 Shiao-Li Tsao and Ya-Lien Cheng Department of Computer Science, National Chiao Tung University sltsao@cs.nctu.edu.tw Abstract. WLAN has been widely

More information

Chapter 5 Ad Hoc Wireless Network. Jang Ping Sheu

Chapter 5 Ad Hoc Wireless Network. Jang Ping Sheu Chapter 5 Ad Hoc Wireless Network Jang Ping Sheu Introduction Ad Hoc Network is a multi-hop relaying network ALOHAnet developed in 1970 Ethernet developed in 1980 In 1994, Bluetooth proposed by Ericsson

More information