SlideShare a Scribd company logo
1 of 5
Download to read offline
ACEEE Int. J. on Network Security , Vol. 03, No. 02, April 2012



 Adaptive Handoff Initiation Scheme in Heterogeneous
                       Network
                         Azita Laily Yusof, Norsuzila Ya’acob, Mohd Tarmizi Ali, Norbaiti Sidik
                                           Faculty of Electrical Engineering,
                                             Universiti Teknologi MARA,
                                            Shah Alam, Selangor, Malaysia
         laily012001@yahoo.com, norsuzilayaacob@yahoo.com, mizi732002@yahoo.com, sidikmanzil@yahoo.com

Abstract—In wireless heterogeneous network, nodes are mobile            below a certain threshold value. However, in a heterogeneous
equipment and can move freely from one area to another. A               network environment, more criteria are needed to initiate the
group of users with a large range of mobility can access around        appropriate time to perform the handoff.
in the overall network cause high traffic. In these                        This paper presents a traffic driven handoff management
heterogeneous networks, resources are shared among all users
                                                                       scheme which adopts a hard handoff scheme to adaptively
and the amount of available resources is determined by traffic
load. The traffic load can seriously affect on quality of services     control the handoff time according to the load status of cells.
for users thus it requires efficient management in order to            Before accepting a new user, it requests the load information
improve service quality. If traffic load is concentrated in a          of the target cell in advance before handoff execution. Then,
cell, this cell becomes the hotspot cell. There is a need to have      the value of adaptive RSS is applied in the scheme to initiate
a proper traffic driven handoff management scheme, so that             the right handoff time. A dynamic simulator which is based
users will automatically move from congested cell to allow             entirely on MATLAB software is developed, using the
the network to dynamically self-balance. This research                 designed scheme.
proposed an approach which adopts a hard handoff scheme to
dynamically control the handoff time according to the load
                                                                                             II. PREVIOUS WORKS
status of cells. The result shows that the effect of hotspot
threshold is the most important in initiation the handoff                  There also have been many proposals to solve the hotspot
process. Therefore, by incorporating value of traffic load as          cell problem. Two methods for resource controlling and
adaptive factors, it shows how the handoff initiation criteria         allocating in a roaming based scenario were proposed in
might be set in accordance with the quality of services
                                                                       [2,3,4]. A number of channel borrowing algorithms which
requested by users.
                                                                       utilize available resources of lightly loaded cells and
Index Terms—heterogeneous, mobility, traffic load, hard                alternatives have been proposed [5]. In the research area of
handoff                                                                the load distribution scheme, power control and handoff
                                                                       based algorithms have been investigated [6,7]. In Adaptive
                        I. INTRODUCTION                                Cell Sizing (ACS) scheme [6], this algorithm controls the
                                                                       transmitting power of the base station based on CDMA
    Long Term Evolution (LTE) is one of the latest                     cellular system. Similarly, in soft handoff resizing algorithm
communication technology that is currently being tested and            [7], it reduces the size of soft handoff area in the hotspot cell
deployed. Third Generation Partnership Project (3GPP)                  by increasing the value of the threshold value but these
Release 8 defines the standards for LTE and Release 10                 algorithms can be only used in the particular system and it
pertains to defining the standards for LTE-Advanced. SAE               requires the negotiation between cells in order to support
is the core network architecture for establishing a LTE                seamless services for mobiles.
Network. The important factor of this network architecture is              A cell which has heavier traffic load than adjacent cells is
that it is heterogeneous. A heterogeneous network is                   referred to as hotspot cell which can be determined by
composed of several wireless technologies that constitute              resource affordability, the ratio between the amount of
together a network that connects users to the Internet [1].            available resources and the total amount of resources in a
Core network, sometimes called backbone network, combines              cell. Hotspot cell can be generated by sudden concentration
all access networks together. The technologies utilized in             of traffic load and this hotspot cell problem can cause poor
core and access networks may be different, resulting in                service quality [8]. [9] proposed an effective traffic
different characteristics. In these heterogeneous networks,            management scheme using adaptive handover time. Handoff
mobile users can move between different networks. In this              time is adaptively controlled according to the amount of traffic
kind of environment, handoff management is the essential               load of cells.
issue that supports the handoff of users between various
wireless technologies. Handoff decision, one of the handoff            III. ADAPTIVE HANDOFF TIME ALGORITHM APPROACH
management issues consists of finding the appropriate time
to perform the handoff and which cell to hand over in cellular       In this research, an adaptive handoff algorithm for dynamic
networks. Traditionally, the need for initiating the handoff     traffic load distribution in the hotspot cell is proposed. Traffic
arises when the RSS of the serving base station deteriorates
© 2012 ACEEE                                                   1
DOI: 01.IJNS.03.02.15
ACEEE Int. J. on Network Security , Vol. 03, No. 02, April 2012


arises when the RSS of the serving base station deteriorates
the acceptable service quality.
    Active communications between user and base station
occur in HOLD and ON state [9]. The HOLD state has full
downlink and thin uplink channel while ON state has both
full downlink and uplink traffic channel. In this measurement,
the load which will be added by the handoff calls also has
been considered and it is defined as HANDOFF. The handoff
call is assume in the ON state right after the handoff process
completed. So, the traffic load can be estimated by measuring
the number of users in the states, HOLD, ON and HANDOFF
which is described in Equation 1[9].
 Nt = Non + β x Nhold + Nhandoff                             (1)
where Nt is the number of traffic loads, Non is the number of
users in the ON state, Nhold is the number of users in the
HOLD state and Nhandoff is the number of handoff calls. In
Equation (1), β is an adaptive factor and the number of traffic
load varies from 0 to 1. The value of traffic load is approximated
to 0 when the current cell is regarded as the lightly loaded
cell and as the number of mobile nodes is increase, the traffic
load is approximated to 1. The current cell becomes to be the
status of hotspot. Figure 1 shows the handoff time algorithm.
The handoff time algorithm is based on the handoff scheme
proposed by [10]. As shown in Figure 1, when the receive
signal strength of the serving cell is less than threshold value,
it sends the load request status to the target cell and receive
load response status from the cell. The target cell calculates
the number of traffic load using Equation (1). If the number of                      Figure 1. The handoff time algorithm
available resources of the target cell is less than the hotspot
threshold, Hd, the current serving sends to hotspot alarm                               III. RESULT AND DISCUSSION
status to the target cell. After receiving the status, the proper            The simulations were performed in MATLAB. Various
threshold value should be carefully selected in order to initiate        initial typical parameters assumed in the simulation are
the handoff process. However, the previous work used fixed               described in Table 1 [9].
RSS to initiate the handoff process. An adaptive RSS
threshold is recommended to be used so that the mobile has                                     TABLE 1.
                                                                                      SIMULATION PARAMETERS [9]
enough time to initiate the handoff process. Therefore, the
threshold value for initiating handoff should be carefully
selected in order not to degrade the service quality of other
users. The algorithm has been modified by applying a
mathematical formulation that had been derived in the [11]
for controlling the handoff time and called as an adaptive
receive signal strength threshold. Receive signal strength
value avoids too early or too late initiation of the handoff
process. They are completed before the user moves out of
the coverage area of the serving network.




© 2012 ACEEE                                                         2
DOI: 01.IJNS.03.02.15
ACEEE Int. J. on Network Security , Vol. 03, No. 02, April 2012


A. Comparison Between Conventional Handoff Scheme, An
Adaptive Handoff Time Scheme and Proposed Traffic Driven
Handoff Management Scheme
    This section analyzes the effect of the Thresmin for the
proposed traffic driven handoff management scheme.
Thresmin is the most important parameter in initiating the
handoff process. It is responsible for the quality of
connection. If it is set very low, the neighbor’s eNodeB cannot
involve into the connection until the mobile goes far from
serving eNodeB where it is considered to be at the boundary
of the cell and the quality of service reaches a bad condition.
So, there is a need for an optimum value for this threshold to
get the optimum quality of service and optimum system
capacity. In the following graphs, the curves labeled as
“Thres_min=-86 dBm” indicate the proposed scheme and the
curve labeled as “Thres_min=-83 dBm” indicate an adaptive             Figure 3. Effect of the Thres min on the performance of handoff drop
handoff time scheme proposed by Kim et al. 2007. The labeled                                         call rate
“Thres_min=-90 dBm” indicate the conventional handoff                     The reason the conventional handoff scheme has a high
scheme.                                                               handoff drop call rate is that it just tries to reduce traffic load
                                                                      of the hotspot cell even though the neighboring cells are in
                                                                      the hotspot status and these handoffs may be dropped in
                                                                      the cells. As compared to an adaptive handoff time scheme,
                                                                      the scheme executes handoffs without considering the speed
                                                                      and type of handoff. On the other hand, the proposed scheme
                                                                      shows lowest handoff drop call rate compared to other
                                                                      schemes. The current serving cell delays all handoff
                                                                      executions if neighboring cells are in hotspot status, which
                                                                      can lead to a small dropping of handoff calls. The proposed
                                                                      scheme also adaptively controls the handoff initiation time
                                                                      based on the mobile’s speed and type of handoff. From these
                                                                      figures, the simulations show that the optimum value for this
                                                                      threshold is -86 dBm. Therefore, it can be concluded that the
                                                                      proposed scheme can reduce the traffic load of a hotspot cell
                                                                      like an adaptive handoff time scheme and can achieve more a
    Figure 2. Effect of the Thresmin on the handoff probability       balanced distribution of traffic load than the compared
    As shown in Figure 2, the simulation result indicates the         schemes.
handoff probability increases as the Thresmin increases. The          B. Effects of the Hd on the Performance of Handoff Drop Call
higher the Thresmin, the earlier the mobile device initiates          Rate
handoff. Therefore, the mobile device can finish handoff                  Figure 4 shows the effects of the Hd on the performance
before the RSS falls below the acceptable level. However, if          of the traffic driven handoff based management scheme. The
the handoff is initiated too early, the ping-pong effect may          handoff drop call rate increases as the Hd increases. If the Hd
occur causes the degradation of service performance. If the           is higher than the threshold which causing significant delay,
handoff is initiated too late, a UE may not have enough time          the proposed scheme will not initiate handoff and thus cause
for making handoff, which increases the dropping probability          high handoff drop call rate. The impact is that by increasing
if neighboring cells are in the hotspot status.                       the Hd, the network delay time will increase and this make the
    The following Figure 3 shows the effect of the Thresmin on        duration of handoff more longer. This implies that data
the performance of handoff drop call rate. As shown in Figure         communications will be delayed or even dropped when the
3, the conventional handoff scheme shows a highest handoff            mobile device moves across cell boundaries during heavy
drop call rate among the three schemes. The proposed scheme           traffic. Hence, the higher the handoff drop call rate.
shows similar results to an adaptive handoff time scheme
proposed by Kim et al. 2007 and a decrease of 17% at lower
capacity in the handoff drop call rate compared to the
conventional handoff scheme.




© 2012 ACEEE                                                      3
DOI: 01.IJNS.03.02.15
ACEEE Int. J. on Network Security , Vol. 03, No. 02, April 2012


                                                                           scenario is higher than random distribution scenario. This is
                                                                           true because the number of mobiles in the hotspot scenario
                                                                           cross the boundary area much greater than random
                                                                           distribution scenario. In reality, hotspot scenario causes a
                                                                           big consumption in the system resources, especially the
                                                                           system capacity, as most of the mobiles connected to the
                                                                           same eNodeB which has limited number of channels and this
                                                                           problem will appear as an increase in the handoff drop call
                                                                           rate.




Figure 4. Effect of the H d on the performance of handoff drop call
                                 ra te

C. Effects of the Hd on the Performance of Satisfaction Rate

    Figure 5 shows the effect of the Hd on the performance of
satisfaction rate. A user is said to be satisfied if his/her call is
neither blocked nor dropped during the total call holding
time. As shown in Figure 5, the satisfaction rate increases as             Figure 6 Effects of the random and hotspot traffic scenario on the
the Hd decreases. In cellular systems, QoS guarantee for users                           performance of handoff drop call rate
is the important factor to determine the system performance.
                                                                           D. Effects of the Different Movement on the Performance of
A side effect from this is that the Hd can be used to balance
                                                                           Handoff Drop Call Rate
traffic load between neighboring cells and thus enhance
network performance. Thus, it is important to consider traffic                 Figure 7 shows the effect of the different movement on
load as an important factor for initiating handoff since heavy             the increment of capacity. From the Figure 5.14, it shows that
traffic load causes significant degradation of network                     straight lines scenario causes more handoff drop call rate
performance.                                                               than random movement. This is because in straight lines all
                                                                           mobiles will leave the hotspot cell to the nearest cells. Thus,
                                                                           the minimum number of handoff drop call rate equals the
                                                                           number of mobile.




 Figure 5 Effect of the H d on the performance of the satisfaction
                                ra te

D. Effects of the Random and Hotspot Traffic Scenario on                    Figure 7 Effects of the different movement on the performance
                                                                                               of handoff drop call rate
the Performance of Handoff Drop Call Rate
    Figure 6 shows the relation between capacity and handoff                                        CONCLUSIONS
call drop rate for random and hotspot traffic scenario. From
the figure, it shows that handoff call drop rate for hotspot                  An adaptive value for RSS using speed and handoff
                                                                           signaling delay information was proposed to initiate the
© 2012 ACEEE                                                           4
DOI: 01.IJNS.03.02.15
ACEEE Int. J. on Network Security , Vol. 03, No. 02, April 2012


handoff process. This handoff initiation procedure is applied            [3] Johansson, K., Kristensson, M. and Schwarz, U. “Radio
in a traffic driven handoff management scheme to manage                  resource management for roaming based multi-operator WCDMA
overloaded traffic in the SAE heterogeneous network. The                 networks”, Proceedings of the IEEE Vehicular Technology
                                                                         Conference VTC, 2004, pp. 2062-2066.
handoff performance with respect to traffic load has been
                                                                         [4] Das, S., Sen, S. and Jayaram, R. “A dynamic load balancing
evaluated. The results show that in heavy traffic load, the Hd
                                                                         strategy for channel assignment using selective borrowing in cellular
should be taken into account to control the handoff time.                mobile environment”, Proceedings of the IEEE/ACM Conference
The effect of Thresmin also has been evaluated and it is                 on Mobile Computing and Networking (Mobicom96), 1996, pp.
observed that the value of Thresmin is the most important in             73–84.
initiation the handoff process. Therefore, by incorporating              [5] Das, S., Sen, S., Agrawal, P. and Jayaram R. “A distributed load
value of traffic load, user’s speed and type of handoff as               balancing algorithm for the hot cell problem in cellular mobile
adaptive factors, it shows how the handoff initiation criteria           networks”, Proceedings of the 6th IEEE International Symposium
might be set in accordance with the quality of services                  on High Performance Distributed Computing, 1997, pp. 254–63.
                                                                         [6] Chen, X.H. “Adaptive traffic load shedding and its capacity
requested by users. In this research, a dynamic simulator is
                                                                         gain in CDMA cellular systems”, Communications IEEE
presented, which incorporates the effects of the adaptive
                                                                         proceedings, 1995, 142(3): 186-192.
and conventional handoff management schemes. The handoff                 [7] Verdone, R. and Zanella, A. “Performance of received power
drop call rate has been evaluated in order to measure the                and traffic-driven handover algorithms in urban cellular networks”,
service quality. It was found that the proposed scheme could             IEEE Wireless Communication, 2002, pp. 60-71.
efficiently manage overloaded traffic in the system at lower             [8] Kim, D., Kim, N. and Yoon, H. “Adaptive Handoff Algorithms
capacity, thereby support better service quality.                        for Dynamic Traffic Load Distribution in 4G Mobile Networks”,
                                                                         Proceedings of the 7th International Conference on Advanced
                   ACKNOWLEDGEMENT                                       Communication Technology, 2005, pp. 1269-1274.
                                                                         [9] Kim, D., Sawhney, M. and Yoon, H. “An effective traffic
   The authors would like to express their cordial thanks to             management scheme using adaptive handover time in next-generation
Universiti Teknologi MARA for supporting this research.                  cellular networks”, International Journal of Network Management,
                                                                         2007, 17(2), pp. 139-154.
                          REFERENCES                                     [10] Mohanty, S. and Akyildiz, I.F. “Performance analysis of a
                                                                         novel architecture to integrate heterogeneous wireless systems”,
[1] Piamrat, K., Viho, C., Ksentini, A. and Bonnin, J-M. “Resource       Journal on Computer Networks, 2007, 51(4): 1095-1105.
management in mobile heterogeneous networks: state of the art and        [11] Mohanty, S. and Akyildiz, I.F. “A cross layer (layer 2+3)
challenges”, IRISA research reports.3G Americas, 2008.                   handoff management protocol for next generation wieless
[2] Johansson, K., Kristensson, M. and Schwarz, U. “Radio                systems”, IEEE Transactions on publication 5(10): 1347-1360.
resource management for roaming based multi-operator WCDMA
networks”, Proceedings of the IEEE Vehicular Technology
Conference VTC, 2004 pp. 2062-2066.




© 2012 ACEEE                                                         5
DOI: 01.IJNS.03.02.15

More Related Content

What's hot

rupali published paper
rupali published paperrupali published paper
rupali published paperRoopali Singh
 
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSNOptimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSNIJCNCJournal
 
IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANET
IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANETIMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANET
IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANETIJCNCJournal
 
Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...
Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...
Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...IJSRED
 
Downlink beamforming and admissin control for spectrum sharing cognitive radi...
Downlink beamforming and admissin control for spectrum sharing cognitive radi...Downlink beamforming and admissin control for spectrum sharing cognitive radi...
Downlink beamforming and admissin control for spectrum sharing cognitive radi...acijjournal
 
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...ijcsit
 
Design and implementation of new routing
Design and implementation of new routingDesign and implementation of new routing
Design and implementation of new routingIJCNCJournal
 
Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...
Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...
Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...IOSR Journals
 
Novel Position Estimation using Differential Timing Information for Asynchron...
Novel Position Estimation using Differential Timing Information for Asynchron...Novel Position Estimation using Differential Timing Information for Asynchron...
Novel Position Estimation using Differential Timing Information for Asynchron...IJCNCJournal
 
Link Stability Based On Qos Aware On - Demand Routing In Mobile Ad Hoc Networks
Link Stability Based On Qos Aware On - Demand Routing In  Mobile Ad Hoc NetworksLink Stability Based On Qos Aware On - Demand Routing In  Mobile Ad Hoc Networks
Link Stability Based On Qos Aware On - Demand Routing In Mobile Ad Hoc NetworksIOSR Journals
 
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETSAN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETSIJCNCJournal
 
QOS ROUTING AND PERFORMANCE EVALUATION FOR MOBILE AD HOC NETWORKS USING OLSR ...
QOS ROUTING AND PERFORMANCE EVALUATION FOR MOBILE AD HOC NETWORKS USING OLSR ...QOS ROUTING AND PERFORMANCE EVALUATION FOR MOBILE AD HOC NETWORKS USING OLSR ...
QOS ROUTING AND PERFORMANCE EVALUATION FOR MOBILE AD HOC NETWORKS USING OLSR ...ijasuc
 
A Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor Network
A Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor NetworkA Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor Network
A Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor NetworkIJCNCJournal
 

What's hot (14)

Kr2518691873
Kr2518691873Kr2518691873
Kr2518691873
 
rupali published paper
rupali published paperrupali published paper
rupali published paper
 
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSNOptimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSN
 
IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANET
IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANETIMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANET
IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANET
 
Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...
Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...
Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...
 
Downlink beamforming and admissin control for spectrum sharing cognitive radi...
Downlink beamforming and admissin control for spectrum sharing cognitive radi...Downlink beamforming and admissin control for spectrum sharing cognitive radi...
Downlink beamforming and admissin control for spectrum sharing cognitive radi...
 
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
 
Design and implementation of new routing
Design and implementation of new routingDesign and implementation of new routing
Design and implementation of new routing
 
Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...
Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...
Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...
 
Novel Position Estimation using Differential Timing Information for Asynchron...
Novel Position Estimation using Differential Timing Information for Asynchron...Novel Position Estimation using Differential Timing Information for Asynchron...
Novel Position Estimation using Differential Timing Information for Asynchron...
 
Link Stability Based On Qos Aware On - Demand Routing In Mobile Ad Hoc Networks
Link Stability Based On Qos Aware On - Demand Routing In  Mobile Ad Hoc NetworksLink Stability Based On Qos Aware On - Demand Routing In  Mobile Ad Hoc Networks
Link Stability Based On Qos Aware On - Demand Routing In Mobile Ad Hoc Networks
 
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETSAN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
 
QOS ROUTING AND PERFORMANCE EVALUATION FOR MOBILE AD HOC NETWORKS USING OLSR ...
QOS ROUTING AND PERFORMANCE EVALUATION FOR MOBILE AD HOC NETWORKS USING OLSR ...QOS ROUTING AND PERFORMANCE EVALUATION FOR MOBILE AD HOC NETWORKS USING OLSR ...
QOS ROUTING AND PERFORMANCE EVALUATION FOR MOBILE AD HOC NETWORKS USING OLSR ...
 
A Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor Network
A Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor NetworkA Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor Network
A Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor Network
 

Viewers also liked

An Information Maximization approach of ICA for Gender Classification
An Information Maximization approach of ICA for Gender ClassificationAn Information Maximization approach of ICA for Gender Classification
An Information Maximization approach of ICA for Gender ClassificationIDES Editor
 
An Iterative Improved k-means Clustering
An Iterative Improved k-means ClusteringAn Iterative Improved k-means Clustering
An Iterative Improved k-means ClusteringIDES Editor
 
User Controlled Privacy in Participatory Sensing
User Controlled Privacy in Participatory SensingUser Controlled Privacy in Participatory Sensing
User Controlled Privacy in Participatory SensingIDES Editor
 
GR-FB Block Cleaning Scheme in Flash Memory
GR-FB Block Cleaning Scheme in Flash MemoryGR-FB Block Cleaning Scheme in Flash Memory
GR-FB Block Cleaning Scheme in Flash MemoryIDES Editor
 
Assessment of Market Power in Deregulated Electricity Market with Congestion
Assessment of Market Power in Deregulated Electricity Market with CongestionAssessment of Market Power in Deregulated Electricity Market with Congestion
Assessment of Market Power in Deregulated Electricity Market with CongestionIDES Editor
 
Inverse Gamma Distribution based Delay and Slew Modeling for On- Chip VLSI RC...
Inverse Gamma Distribution based Delay and Slew Modeling for On- Chip VLSI RC...Inverse Gamma Distribution based Delay and Slew Modeling for On- Chip VLSI RC...
Inverse Gamma Distribution based Delay and Slew Modeling for On- Chip VLSI RC...IDES Editor
 
Energy Efficient Data Transmission through Relay Nodes in Wireless Sensor Net...
Energy Efficient Data Transmission through Relay Nodes in Wireless Sensor Net...Energy Efficient Data Transmission through Relay Nodes in Wireless Sensor Net...
Energy Efficient Data Transmission through Relay Nodes in Wireless Sensor Net...IDES Editor
 
Depth-Image-based Facial Analysis between Age Groups and Recognition of 3D Faces
Depth-Image-based Facial Analysis between Age Groups and Recognition of 3D FacesDepth-Image-based Facial Analysis between Age Groups and Recognition of 3D Faces
Depth-Image-based Facial Analysis between Age Groups and Recognition of 3D FacesIDES Editor
 
Neural Network Based Noise Identification in Digital Images
Neural Network Based Noise Identification in Digital ImagesNeural Network Based Noise Identification in Digital Images
Neural Network Based Noise Identification in Digital ImagesIDES Editor
 
FPGA Based Design of High Performance Decimator using DALUT Algorithm
FPGA Based Design of High Performance Decimator using DALUT AlgorithmFPGA Based Design of High Performance Decimator using DALUT Algorithm
FPGA Based Design of High Performance Decimator using DALUT AlgorithmIDES Editor
 
LabVIEW - Teaching Aid for Process Control
LabVIEW - Teaching Aid for Process ControlLabVIEW - Teaching Aid for Process Control
LabVIEW - Teaching Aid for Process ControlIDES Editor
 
An Adaptive Energy Efficient Reliable Routing Protocol for Wireless Sensor Ne...
An Adaptive Energy Efficient Reliable Routing Protocol for Wireless Sensor Ne...An Adaptive Energy Efficient Reliable Routing Protocol for Wireless Sensor Ne...
An Adaptive Energy Efficient Reliable Routing Protocol for Wireless Sensor Ne...IDES Editor
 
Genetic Algorithm based Optimal Placement of Distributed Generation Reducing ...
Genetic Algorithm based Optimal Placement of Distributed Generation Reducing ...Genetic Algorithm based Optimal Placement of Distributed Generation Reducing ...
Genetic Algorithm based Optimal Placement of Distributed Generation Reducing ...IDES Editor
 
Black Box for Machine Tools; Based on Open CNC Architecture Control Systems
Black Box for Machine Tools; Based on Open CNC Architecture Control SystemsBlack Box for Machine Tools; Based on Open CNC Architecture Control Systems
Black Box for Machine Tools; Based on Open CNC Architecture Control SystemsIDES Editor
 
Interleaving Technique in Multiphase Buck & Boost Converter
Interleaving Technique in Multiphase Buck & Boost ConverterInterleaving Technique in Multiphase Buck & Boost Converter
Interleaving Technique in Multiphase Buck & Boost ConverterIDES Editor
 
A 2-tier Data Hiding Technique Using Exploiting Modification Direction Method...
A 2-tier Data Hiding Technique Using Exploiting Modification Direction Method...A 2-tier Data Hiding Technique Using Exploiting Modification Direction Method...
A 2-tier Data Hiding Technique Using Exploiting Modification Direction Method...IDES Editor
 
FTTCP: Fault Tolerant Two-level Clustering Protocol for WSN
FTTCP: Fault Tolerant Two-level Clustering Protocol for WSNFTTCP: Fault Tolerant Two-level Clustering Protocol for WSN
FTTCP: Fault Tolerant Two-level Clustering Protocol for WSNIDES Editor
 
Performance Evaluation of Classifiers used for Identification of Encryption A...
Performance Evaluation of Classifiers used for Identification of Encryption A...Performance Evaluation of Classifiers used for Identification of Encryption A...
Performance Evaluation of Classifiers used for Identification of Encryption A...IDES Editor
 
Hybrid approaches in Network Optical Routing with QoS based on Genetic Algori...
Hybrid approaches in Network Optical Routing with QoS based on Genetic Algori...Hybrid approaches in Network Optical Routing with QoS based on Genetic Algori...
Hybrid approaches in Network Optical Routing with QoS based on Genetic Algori...IDES Editor
 
Adaptive weight factor estimation from user review 1
Adaptive weight factor estimation from user   review 1Adaptive weight factor estimation from user   review 1
Adaptive weight factor estimation from user review 1ambitlick
 

Viewers also liked (20)

An Information Maximization approach of ICA for Gender Classification
An Information Maximization approach of ICA for Gender ClassificationAn Information Maximization approach of ICA for Gender Classification
An Information Maximization approach of ICA for Gender Classification
 
An Iterative Improved k-means Clustering
An Iterative Improved k-means ClusteringAn Iterative Improved k-means Clustering
An Iterative Improved k-means Clustering
 
User Controlled Privacy in Participatory Sensing
User Controlled Privacy in Participatory SensingUser Controlled Privacy in Participatory Sensing
User Controlled Privacy in Participatory Sensing
 
GR-FB Block Cleaning Scheme in Flash Memory
GR-FB Block Cleaning Scheme in Flash MemoryGR-FB Block Cleaning Scheme in Flash Memory
GR-FB Block Cleaning Scheme in Flash Memory
 
Assessment of Market Power in Deregulated Electricity Market with Congestion
Assessment of Market Power in Deregulated Electricity Market with CongestionAssessment of Market Power in Deregulated Electricity Market with Congestion
Assessment of Market Power in Deregulated Electricity Market with Congestion
 
Inverse Gamma Distribution based Delay and Slew Modeling for On- Chip VLSI RC...
Inverse Gamma Distribution based Delay and Slew Modeling for On- Chip VLSI RC...Inverse Gamma Distribution based Delay and Slew Modeling for On- Chip VLSI RC...
Inverse Gamma Distribution based Delay and Slew Modeling for On- Chip VLSI RC...
 
Energy Efficient Data Transmission through Relay Nodes in Wireless Sensor Net...
Energy Efficient Data Transmission through Relay Nodes in Wireless Sensor Net...Energy Efficient Data Transmission through Relay Nodes in Wireless Sensor Net...
Energy Efficient Data Transmission through Relay Nodes in Wireless Sensor Net...
 
Depth-Image-based Facial Analysis between Age Groups and Recognition of 3D Faces
Depth-Image-based Facial Analysis between Age Groups and Recognition of 3D FacesDepth-Image-based Facial Analysis between Age Groups and Recognition of 3D Faces
Depth-Image-based Facial Analysis between Age Groups and Recognition of 3D Faces
 
Neural Network Based Noise Identification in Digital Images
Neural Network Based Noise Identification in Digital ImagesNeural Network Based Noise Identification in Digital Images
Neural Network Based Noise Identification in Digital Images
 
FPGA Based Design of High Performance Decimator using DALUT Algorithm
FPGA Based Design of High Performance Decimator using DALUT AlgorithmFPGA Based Design of High Performance Decimator using DALUT Algorithm
FPGA Based Design of High Performance Decimator using DALUT Algorithm
 
LabVIEW - Teaching Aid for Process Control
LabVIEW - Teaching Aid for Process ControlLabVIEW - Teaching Aid for Process Control
LabVIEW - Teaching Aid for Process Control
 
An Adaptive Energy Efficient Reliable Routing Protocol for Wireless Sensor Ne...
An Adaptive Energy Efficient Reliable Routing Protocol for Wireless Sensor Ne...An Adaptive Energy Efficient Reliable Routing Protocol for Wireless Sensor Ne...
An Adaptive Energy Efficient Reliable Routing Protocol for Wireless Sensor Ne...
 
Genetic Algorithm based Optimal Placement of Distributed Generation Reducing ...
Genetic Algorithm based Optimal Placement of Distributed Generation Reducing ...Genetic Algorithm based Optimal Placement of Distributed Generation Reducing ...
Genetic Algorithm based Optimal Placement of Distributed Generation Reducing ...
 
Black Box for Machine Tools; Based on Open CNC Architecture Control Systems
Black Box for Machine Tools; Based on Open CNC Architecture Control SystemsBlack Box for Machine Tools; Based on Open CNC Architecture Control Systems
Black Box for Machine Tools; Based on Open CNC Architecture Control Systems
 
Interleaving Technique in Multiphase Buck & Boost Converter
Interleaving Technique in Multiphase Buck & Boost ConverterInterleaving Technique in Multiphase Buck & Boost Converter
Interleaving Technique in Multiphase Buck & Boost Converter
 
A 2-tier Data Hiding Technique Using Exploiting Modification Direction Method...
A 2-tier Data Hiding Technique Using Exploiting Modification Direction Method...A 2-tier Data Hiding Technique Using Exploiting Modification Direction Method...
A 2-tier Data Hiding Technique Using Exploiting Modification Direction Method...
 
FTTCP: Fault Tolerant Two-level Clustering Protocol for WSN
FTTCP: Fault Tolerant Two-level Clustering Protocol for WSNFTTCP: Fault Tolerant Two-level Clustering Protocol for WSN
FTTCP: Fault Tolerant Two-level Clustering Protocol for WSN
 
Performance Evaluation of Classifiers used for Identification of Encryption A...
Performance Evaluation of Classifiers used for Identification of Encryption A...Performance Evaluation of Classifiers used for Identification of Encryption A...
Performance Evaluation of Classifiers used for Identification of Encryption A...
 
Hybrid approaches in Network Optical Routing with QoS based on Genetic Algori...
Hybrid approaches in Network Optical Routing with QoS based on Genetic Algori...Hybrid approaches in Network Optical Routing with QoS based on Genetic Algori...
Hybrid approaches in Network Optical Routing with QoS based on Genetic Algori...
 
Adaptive weight factor estimation from user review 1
Adaptive weight factor estimation from user   review 1Adaptive weight factor estimation from user   review 1
Adaptive weight factor estimation from user review 1
 

Similar to Adaptive Handoff Initiation Scheme in Heterogeneous Network

Call Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
Call Admission Control (CAC) with Load Balancing Approach for the WLAN NetworksCall Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
Call Admission Control (CAC) with Load Balancing Approach for the WLAN NetworksIJARIIT
 
Asoka_Korale_Event_based_CYM_IET_2013_submitted linkedin
Asoka_Korale_Event_based_CYM_IET_2013_submitted linkedinAsoka_Korale_Event_based_CYM_IET_2013_submitted linkedin
Asoka_Korale_Event_based_CYM_IET_2013_submitted linkedinAsoka Korale
 
HANDOVER NECESSITY ESTIMATION FOR 4G HETEROGENEOUS NETWORKS
HANDOVER NECESSITY ESTIMATION FOR 4G HETEROGENEOUS NETWORKSHANDOVER NECESSITY ESTIMATION FOR 4G HETEROGENEOUS NETWORKS
HANDOVER NECESSITY ESTIMATION FOR 4G HETEROGENEOUS NETWORKSijistjournal
 
HANDOVER NECESSITY ESTIMATION FOR 4G HETEROGENEOUS NETWORKS
HANDOVER NECESSITY ESTIMATION FOR 4G HETEROGENEOUS NETWORKSHANDOVER NECESSITY ESTIMATION FOR 4G HETEROGENEOUS NETWORKS
HANDOVER NECESSITY ESTIMATION FOR 4G HETEROGENEOUS NETWORKSijistjournal
 
An efficient vertical handoff mechanism for future mobile network
An efficient vertical handoff mechanism for  future mobile networkAn efficient vertical handoff mechanism for  future mobile network
An efficient vertical handoff mechanism for future mobile networkBasil John
 
Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...
Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...
Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...M H
 
An Enhanced Algorithm for Load-based Handover Decision-making in 5G Wireless ...
An Enhanced Algorithm for Load-based Handover Decision-making in 5G Wireless ...An Enhanced Algorithm for Load-based Handover Decision-making in 5G Wireless ...
An Enhanced Algorithm for Load-based Handover Decision-making in 5G Wireless ...IRJET Journal
 
ADAPTIVE HANDOVER HYSTERESIS AND CALL ADMISSION CONTROL FOR MOBILE RELAY NODES
ADAPTIVE HANDOVER HYSTERESIS AND CALL ADMISSION CONTROL FOR MOBILE RELAY NODESADAPTIVE HANDOVER HYSTERESIS AND CALL ADMISSION CONTROL FOR MOBILE RELAY NODES
ADAPTIVE HANDOVER HYSTERESIS AND CALL ADMISSION CONTROL FOR MOBILE RELAY NODESIJCNCJournal
 
QoS controlled capacity offload optimization in heterogeneous networks
QoS controlled capacity offload optimization in heterogeneous networksQoS controlled capacity offload optimization in heterogeneous networks
QoS controlled capacity offload optimization in heterogeneous networksjournalBEEI
 
A Novel Handoff Necessity Estimation Approach Based on Travelling Distance
A Novel Handoff Necessity Estimation Approach Based on Travelling DistanceA Novel Handoff Necessity Estimation Approach Based on Travelling Distance
A Novel Handoff Necessity Estimation Approach Based on Travelling DistanceIJAAS Team
 
Network assisted mobile computing with optimal uplink query processing
Network assisted mobile computing with optimal uplink query processingNetwork assisted mobile computing with optimal uplink query processing
Network assisted mobile computing with optimal uplink query processingJPINFOTECH JAYAPRAKASH
 
Iaetsd use of mobile communication in data-intensive
Iaetsd use of mobile communication in data-intensiveIaetsd use of mobile communication in data-intensive
Iaetsd use of mobile communication in data-intensiveIaetsd Iaetsd
 
Random_Access_Mechanism_for_RAN_Overload.pdf
Random_Access_Mechanism_for_RAN_Overload.pdfRandom_Access_Mechanism_for_RAN_Overload.pdf
Random_Access_Mechanism_for_RAN_Overload.pdfsehat maruli
 
Fuzzy Based Vertical Handoff Decision Controller for Future Networks
Fuzzy Based Vertical Handoff Decision Controller for Future NetworksFuzzy Based Vertical Handoff Decision Controller for Future Networks
Fuzzy Based Vertical Handoff Decision Controller for Future NetworksIJAEMSJORNAL
 
Network assisted mobile computing with optimal uplink quary processing
Network assisted mobile computing with optimal uplink quary processingNetwork assisted mobile computing with optimal uplink quary processing
Network assisted mobile computing with optimal uplink quary processingShakas Technologies
 
A vertical handover decision approaches in next generation wireless networks ...
A vertical handover decision approaches in next generation wireless networks ...A vertical handover decision approaches in next generation wireless networks ...
A vertical handover decision approaches in next generation wireless networks ...ijmnct
 
Traffic-aware adaptive server load balancing for softwaredefined networks
Traffic-aware adaptive server load balancing for softwaredefined networks Traffic-aware adaptive server load balancing for softwaredefined networks
Traffic-aware adaptive server load balancing for softwaredefined networks IJECEIAES
 
Dual-resource TCPAQM for Processing-constrained Networks
Dual-resource TCPAQM for Processing-constrained NetworksDual-resource TCPAQM for Processing-constrained Networks
Dual-resource TCPAQM for Processing-constrained Networksambitlick
 
Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...
Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...
Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...Waqas Tariq
 

Similar to Adaptive Handoff Initiation Scheme in Heterogeneous Network (20)

Call Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
Call Admission Control (CAC) with Load Balancing Approach for the WLAN NetworksCall Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
Call Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
 
Asoka_Korale_Event_based_CYM_IET_2013_submitted linkedin
Asoka_Korale_Event_based_CYM_IET_2013_submitted linkedinAsoka_Korale_Event_based_CYM_IET_2013_submitted linkedin
Asoka_Korale_Event_based_CYM_IET_2013_submitted linkedin
 
HANDOVER NECESSITY ESTIMATION FOR 4G HETEROGENEOUS NETWORKS
HANDOVER NECESSITY ESTIMATION FOR 4G HETEROGENEOUS NETWORKSHANDOVER NECESSITY ESTIMATION FOR 4G HETEROGENEOUS NETWORKS
HANDOVER NECESSITY ESTIMATION FOR 4G HETEROGENEOUS NETWORKS
 
HANDOVER NECESSITY ESTIMATION FOR 4G HETEROGENEOUS NETWORKS
HANDOVER NECESSITY ESTIMATION FOR 4G HETEROGENEOUS NETWORKSHANDOVER NECESSITY ESTIMATION FOR 4G HETEROGENEOUS NETWORKS
HANDOVER NECESSITY ESTIMATION FOR 4G HETEROGENEOUS NETWORKS
 
An efficient vertical handoff mechanism for future mobile network
An efficient vertical handoff mechanism for  future mobile networkAn efficient vertical handoff mechanism for  future mobile network
An efficient vertical handoff mechanism for future mobile network
 
Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...
Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...
Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...
 
An Enhanced Algorithm for Load-based Handover Decision-making in 5G Wireless ...
An Enhanced Algorithm for Load-based Handover Decision-making in 5G Wireless ...An Enhanced Algorithm for Load-based Handover Decision-making in 5G Wireless ...
An Enhanced Algorithm for Load-based Handover Decision-making in 5G Wireless ...
 
ADAPTIVE HANDOVER HYSTERESIS AND CALL ADMISSION CONTROL FOR MOBILE RELAY NODES
ADAPTIVE HANDOVER HYSTERESIS AND CALL ADMISSION CONTROL FOR MOBILE RELAY NODESADAPTIVE HANDOVER HYSTERESIS AND CALL ADMISSION CONTROL FOR MOBILE RELAY NODES
ADAPTIVE HANDOVER HYSTERESIS AND CALL ADMISSION CONTROL FOR MOBILE RELAY NODES
 
QoS controlled capacity offload optimization in heterogeneous networks
QoS controlled capacity offload optimization in heterogeneous networksQoS controlled capacity offload optimization in heterogeneous networks
QoS controlled capacity offload optimization in heterogeneous networks
 
A Novel Handoff Necessity Estimation Approach Based on Travelling Distance
A Novel Handoff Necessity Estimation Approach Based on Travelling DistanceA Novel Handoff Necessity Estimation Approach Based on Travelling Distance
A Novel Handoff Necessity Estimation Approach Based on Travelling Distance
 
Network assisted mobile computing with optimal uplink query processing
Network assisted mobile computing with optimal uplink query processingNetwork assisted mobile computing with optimal uplink query processing
Network assisted mobile computing with optimal uplink query processing
 
Iaetsd use of mobile communication in data-intensive
Iaetsd use of mobile communication in data-intensiveIaetsd use of mobile communication in data-intensive
Iaetsd use of mobile communication in data-intensive
 
Random_Access_Mechanism_for_RAN_Overload.pdf
Random_Access_Mechanism_for_RAN_Overload.pdfRandom_Access_Mechanism_for_RAN_Overload.pdf
Random_Access_Mechanism_for_RAN_Overload.pdf
 
Fuzzy Based Vertical Handoff Decision Controller for Future Networks
Fuzzy Based Vertical Handoff Decision Controller for Future NetworksFuzzy Based Vertical Handoff Decision Controller for Future Networks
Fuzzy Based Vertical Handoff Decision Controller for Future Networks
 
M1802037781
M1802037781M1802037781
M1802037781
 
Network assisted mobile computing with optimal uplink quary processing
Network assisted mobile computing with optimal uplink quary processingNetwork assisted mobile computing with optimal uplink quary processing
Network assisted mobile computing with optimal uplink quary processing
 
A vertical handover decision approaches in next generation wireless networks ...
A vertical handover decision approaches in next generation wireless networks ...A vertical handover decision approaches in next generation wireless networks ...
A vertical handover decision approaches in next generation wireless networks ...
 
Traffic-aware adaptive server load balancing for softwaredefined networks
Traffic-aware adaptive server load balancing for softwaredefined networks Traffic-aware adaptive server load balancing for softwaredefined networks
Traffic-aware adaptive server load balancing for softwaredefined networks
 
Dual-resource TCPAQM for Processing-constrained Networks
Dual-resource TCPAQM for Processing-constrained NetworksDual-resource TCPAQM for Processing-constrained Networks
Dual-resource TCPAQM for Processing-constrained Networks
 
Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...
Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...
Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...
 

More from IDES Editor

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A ReviewIDES Editor
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...IDES Editor
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...IDES Editor
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...IDES Editor
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCIDES Editor
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...IDES Editor
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingIDES Editor
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...IDES Editor
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsIDES Editor
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...IDES Editor
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...IDES Editor
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkIDES Editor
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetIDES Editor
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’sIDES Editor
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...IDES Editor
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance AnalysisIDES Editor
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesIDES Editor
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...IDES Editor
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...IDES Editor
 

More from IDES Editor (20)

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A Review
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFC
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive Thresholds
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability Framework
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’s
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance Analysis
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
 

Recently uploaded

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 

Recently uploaded (20)

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 

Adaptive Handoff Initiation Scheme in Heterogeneous Network

  • 1. ACEEE Int. J. on Network Security , Vol. 03, No. 02, April 2012 Adaptive Handoff Initiation Scheme in Heterogeneous Network Azita Laily Yusof, Norsuzila Ya’acob, Mohd Tarmizi Ali, Norbaiti Sidik Faculty of Electrical Engineering, Universiti Teknologi MARA, Shah Alam, Selangor, Malaysia laily012001@yahoo.com, norsuzilayaacob@yahoo.com, mizi732002@yahoo.com, sidikmanzil@yahoo.com Abstract—In wireless heterogeneous network, nodes are mobile below a certain threshold value. However, in a heterogeneous equipment and can move freely from one area to another. A network environment, more criteria are needed to initiate the group of users with a large range of mobility can access around appropriate time to perform the handoff. in the overall network cause high traffic. In these This paper presents a traffic driven handoff management heterogeneous networks, resources are shared among all users scheme which adopts a hard handoff scheme to adaptively and the amount of available resources is determined by traffic load. The traffic load can seriously affect on quality of services control the handoff time according to the load status of cells. for users thus it requires efficient management in order to Before accepting a new user, it requests the load information improve service quality. If traffic load is concentrated in a of the target cell in advance before handoff execution. Then, cell, this cell becomes the hotspot cell. There is a need to have the value of adaptive RSS is applied in the scheme to initiate a proper traffic driven handoff management scheme, so that the right handoff time. A dynamic simulator which is based users will automatically move from congested cell to allow entirely on MATLAB software is developed, using the the network to dynamically self-balance. This research designed scheme. proposed an approach which adopts a hard handoff scheme to dynamically control the handoff time according to the load II. PREVIOUS WORKS status of cells. The result shows that the effect of hotspot threshold is the most important in initiation the handoff There also have been many proposals to solve the hotspot process. Therefore, by incorporating value of traffic load as cell problem. Two methods for resource controlling and adaptive factors, it shows how the handoff initiation criteria allocating in a roaming based scenario were proposed in might be set in accordance with the quality of services [2,3,4]. A number of channel borrowing algorithms which requested by users. utilize available resources of lightly loaded cells and Index Terms—heterogeneous, mobility, traffic load, hard alternatives have been proposed [5]. In the research area of handoff the load distribution scheme, power control and handoff based algorithms have been investigated [6,7]. In Adaptive I. INTRODUCTION Cell Sizing (ACS) scheme [6], this algorithm controls the transmitting power of the base station based on CDMA Long Term Evolution (LTE) is one of the latest cellular system. Similarly, in soft handoff resizing algorithm communication technology that is currently being tested and [7], it reduces the size of soft handoff area in the hotspot cell deployed. Third Generation Partnership Project (3GPP) by increasing the value of the threshold value but these Release 8 defines the standards for LTE and Release 10 algorithms can be only used in the particular system and it pertains to defining the standards for LTE-Advanced. SAE requires the negotiation between cells in order to support is the core network architecture for establishing a LTE seamless services for mobiles. Network. The important factor of this network architecture is A cell which has heavier traffic load than adjacent cells is that it is heterogeneous. A heterogeneous network is referred to as hotspot cell which can be determined by composed of several wireless technologies that constitute resource affordability, the ratio between the amount of together a network that connects users to the Internet [1]. available resources and the total amount of resources in a Core network, sometimes called backbone network, combines cell. Hotspot cell can be generated by sudden concentration all access networks together. The technologies utilized in of traffic load and this hotspot cell problem can cause poor core and access networks may be different, resulting in service quality [8]. [9] proposed an effective traffic different characteristics. In these heterogeneous networks, management scheme using adaptive handover time. Handoff mobile users can move between different networks. In this time is adaptively controlled according to the amount of traffic kind of environment, handoff management is the essential load of cells. issue that supports the handoff of users between various wireless technologies. Handoff decision, one of the handoff III. ADAPTIVE HANDOFF TIME ALGORITHM APPROACH management issues consists of finding the appropriate time to perform the handoff and which cell to hand over in cellular In this research, an adaptive handoff algorithm for dynamic networks. Traditionally, the need for initiating the handoff traffic load distribution in the hotspot cell is proposed. Traffic arises when the RSS of the serving base station deteriorates © 2012 ACEEE 1 DOI: 01.IJNS.03.02.15
  • 2. ACEEE Int. J. on Network Security , Vol. 03, No. 02, April 2012 arises when the RSS of the serving base station deteriorates the acceptable service quality. Active communications between user and base station occur in HOLD and ON state [9]. The HOLD state has full downlink and thin uplink channel while ON state has both full downlink and uplink traffic channel. In this measurement, the load which will be added by the handoff calls also has been considered and it is defined as HANDOFF. The handoff call is assume in the ON state right after the handoff process completed. So, the traffic load can be estimated by measuring the number of users in the states, HOLD, ON and HANDOFF which is described in Equation 1[9]. Nt = Non + β x Nhold + Nhandoff (1) where Nt is the number of traffic loads, Non is the number of users in the ON state, Nhold is the number of users in the HOLD state and Nhandoff is the number of handoff calls. In Equation (1), β is an adaptive factor and the number of traffic load varies from 0 to 1. The value of traffic load is approximated to 0 when the current cell is regarded as the lightly loaded cell and as the number of mobile nodes is increase, the traffic load is approximated to 1. The current cell becomes to be the status of hotspot. Figure 1 shows the handoff time algorithm. The handoff time algorithm is based on the handoff scheme proposed by [10]. As shown in Figure 1, when the receive signal strength of the serving cell is less than threshold value, it sends the load request status to the target cell and receive load response status from the cell. The target cell calculates the number of traffic load using Equation (1). If the number of Figure 1. The handoff time algorithm available resources of the target cell is less than the hotspot threshold, Hd, the current serving sends to hotspot alarm III. RESULT AND DISCUSSION status to the target cell. After receiving the status, the proper The simulations were performed in MATLAB. Various threshold value should be carefully selected in order to initiate initial typical parameters assumed in the simulation are the handoff process. However, the previous work used fixed described in Table 1 [9]. RSS to initiate the handoff process. An adaptive RSS threshold is recommended to be used so that the mobile has TABLE 1. SIMULATION PARAMETERS [9] enough time to initiate the handoff process. Therefore, the threshold value for initiating handoff should be carefully selected in order not to degrade the service quality of other users. The algorithm has been modified by applying a mathematical formulation that had been derived in the [11] for controlling the handoff time and called as an adaptive receive signal strength threshold. Receive signal strength value avoids too early or too late initiation of the handoff process. They are completed before the user moves out of the coverage area of the serving network. © 2012 ACEEE 2 DOI: 01.IJNS.03.02.15
  • 3. ACEEE Int. J. on Network Security , Vol. 03, No. 02, April 2012 A. Comparison Between Conventional Handoff Scheme, An Adaptive Handoff Time Scheme and Proposed Traffic Driven Handoff Management Scheme This section analyzes the effect of the Thresmin for the proposed traffic driven handoff management scheme. Thresmin is the most important parameter in initiating the handoff process. It is responsible for the quality of connection. If it is set very low, the neighbor’s eNodeB cannot involve into the connection until the mobile goes far from serving eNodeB where it is considered to be at the boundary of the cell and the quality of service reaches a bad condition. So, there is a need for an optimum value for this threshold to get the optimum quality of service and optimum system capacity. In the following graphs, the curves labeled as “Thres_min=-86 dBm” indicate the proposed scheme and the curve labeled as “Thres_min=-83 dBm” indicate an adaptive Figure 3. Effect of the Thres min on the performance of handoff drop handoff time scheme proposed by Kim et al. 2007. The labeled call rate “Thres_min=-90 dBm” indicate the conventional handoff The reason the conventional handoff scheme has a high scheme. handoff drop call rate is that it just tries to reduce traffic load of the hotspot cell even though the neighboring cells are in the hotspot status and these handoffs may be dropped in the cells. As compared to an adaptive handoff time scheme, the scheme executes handoffs without considering the speed and type of handoff. On the other hand, the proposed scheme shows lowest handoff drop call rate compared to other schemes. The current serving cell delays all handoff executions if neighboring cells are in hotspot status, which can lead to a small dropping of handoff calls. The proposed scheme also adaptively controls the handoff initiation time based on the mobile’s speed and type of handoff. From these figures, the simulations show that the optimum value for this threshold is -86 dBm. Therefore, it can be concluded that the proposed scheme can reduce the traffic load of a hotspot cell like an adaptive handoff time scheme and can achieve more a Figure 2. Effect of the Thresmin on the handoff probability balanced distribution of traffic load than the compared As shown in Figure 2, the simulation result indicates the schemes. handoff probability increases as the Thresmin increases. The B. Effects of the Hd on the Performance of Handoff Drop Call higher the Thresmin, the earlier the mobile device initiates Rate handoff. Therefore, the mobile device can finish handoff Figure 4 shows the effects of the Hd on the performance before the RSS falls below the acceptable level. However, if of the traffic driven handoff based management scheme. The the handoff is initiated too early, the ping-pong effect may handoff drop call rate increases as the Hd increases. If the Hd occur causes the degradation of service performance. If the is higher than the threshold which causing significant delay, handoff is initiated too late, a UE may not have enough time the proposed scheme will not initiate handoff and thus cause for making handoff, which increases the dropping probability high handoff drop call rate. The impact is that by increasing if neighboring cells are in the hotspot status. the Hd, the network delay time will increase and this make the The following Figure 3 shows the effect of the Thresmin on duration of handoff more longer. This implies that data the performance of handoff drop call rate. As shown in Figure communications will be delayed or even dropped when the 3, the conventional handoff scheme shows a highest handoff mobile device moves across cell boundaries during heavy drop call rate among the three schemes. The proposed scheme traffic. Hence, the higher the handoff drop call rate. shows similar results to an adaptive handoff time scheme proposed by Kim et al. 2007 and a decrease of 17% at lower capacity in the handoff drop call rate compared to the conventional handoff scheme. © 2012 ACEEE 3 DOI: 01.IJNS.03.02.15
  • 4. ACEEE Int. J. on Network Security , Vol. 03, No. 02, April 2012 scenario is higher than random distribution scenario. This is true because the number of mobiles in the hotspot scenario cross the boundary area much greater than random distribution scenario. In reality, hotspot scenario causes a big consumption in the system resources, especially the system capacity, as most of the mobiles connected to the same eNodeB which has limited number of channels and this problem will appear as an increase in the handoff drop call rate. Figure 4. Effect of the H d on the performance of handoff drop call ra te C. Effects of the Hd on the Performance of Satisfaction Rate Figure 5 shows the effect of the Hd on the performance of satisfaction rate. A user is said to be satisfied if his/her call is neither blocked nor dropped during the total call holding time. As shown in Figure 5, the satisfaction rate increases as Figure 6 Effects of the random and hotspot traffic scenario on the the Hd decreases. In cellular systems, QoS guarantee for users performance of handoff drop call rate is the important factor to determine the system performance. D. Effects of the Different Movement on the Performance of A side effect from this is that the Hd can be used to balance Handoff Drop Call Rate traffic load between neighboring cells and thus enhance network performance. Thus, it is important to consider traffic Figure 7 shows the effect of the different movement on load as an important factor for initiating handoff since heavy the increment of capacity. From the Figure 5.14, it shows that traffic load causes significant degradation of network straight lines scenario causes more handoff drop call rate performance. than random movement. This is because in straight lines all mobiles will leave the hotspot cell to the nearest cells. Thus, the minimum number of handoff drop call rate equals the number of mobile. Figure 5 Effect of the H d on the performance of the satisfaction ra te D. Effects of the Random and Hotspot Traffic Scenario on Figure 7 Effects of the different movement on the performance of handoff drop call rate the Performance of Handoff Drop Call Rate Figure 6 shows the relation between capacity and handoff CONCLUSIONS call drop rate for random and hotspot traffic scenario. From the figure, it shows that handoff call drop rate for hotspot An adaptive value for RSS using speed and handoff signaling delay information was proposed to initiate the © 2012 ACEEE 4 DOI: 01.IJNS.03.02.15
  • 5. ACEEE Int. J. on Network Security , Vol. 03, No. 02, April 2012 handoff process. This handoff initiation procedure is applied [3] Johansson, K., Kristensson, M. and Schwarz, U. “Radio in a traffic driven handoff management scheme to manage resource management for roaming based multi-operator WCDMA overloaded traffic in the SAE heterogeneous network. The networks”, Proceedings of the IEEE Vehicular Technology Conference VTC, 2004, pp. 2062-2066. handoff performance with respect to traffic load has been [4] Das, S., Sen, S. and Jayaram, R. “A dynamic load balancing evaluated. The results show that in heavy traffic load, the Hd strategy for channel assignment using selective borrowing in cellular should be taken into account to control the handoff time. mobile environment”, Proceedings of the IEEE/ACM Conference The effect of Thresmin also has been evaluated and it is on Mobile Computing and Networking (Mobicom96), 1996, pp. observed that the value of Thresmin is the most important in 73–84. initiation the handoff process. Therefore, by incorporating [5] Das, S., Sen, S., Agrawal, P. and Jayaram R. “A distributed load value of traffic load, user’s speed and type of handoff as balancing algorithm for the hot cell problem in cellular mobile adaptive factors, it shows how the handoff initiation criteria networks”, Proceedings of the 6th IEEE International Symposium might be set in accordance with the quality of services on High Performance Distributed Computing, 1997, pp. 254–63. [6] Chen, X.H. “Adaptive traffic load shedding and its capacity requested by users. In this research, a dynamic simulator is gain in CDMA cellular systems”, Communications IEEE presented, which incorporates the effects of the adaptive proceedings, 1995, 142(3): 186-192. and conventional handoff management schemes. The handoff [7] Verdone, R. and Zanella, A. “Performance of received power drop call rate has been evaluated in order to measure the and traffic-driven handover algorithms in urban cellular networks”, service quality. It was found that the proposed scheme could IEEE Wireless Communication, 2002, pp. 60-71. efficiently manage overloaded traffic in the system at lower [8] Kim, D., Kim, N. and Yoon, H. “Adaptive Handoff Algorithms capacity, thereby support better service quality. for Dynamic Traffic Load Distribution in 4G Mobile Networks”, Proceedings of the 7th International Conference on Advanced ACKNOWLEDGEMENT Communication Technology, 2005, pp. 1269-1274. [9] Kim, D., Sawhney, M. and Yoon, H. “An effective traffic The authors would like to express their cordial thanks to management scheme using adaptive handover time in next-generation Universiti Teknologi MARA for supporting this research. cellular networks”, International Journal of Network Management, 2007, 17(2), pp. 139-154. REFERENCES [10] Mohanty, S. and Akyildiz, I.F. “Performance analysis of a novel architecture to integrate heterogeneous wireless systems”, [1] Piamrat, K., Viho, C., Ksentini, A. and Bonnin, J-M. “Resource Journal on Computer Networks, 2007, 51(4): 1095-1105. management in mobile heterogeneous networks: state of the art and [11] Mohanty, S. and Akyildiz, I.F. “A cross layer (layer 2+3) challenges”, IRISA research reports.3G Americas, 2008. handoff management protocol for next generation wieless [2] Johansson, K., Kristensson, M. and Schwarz, U. “Radio systems”, IEEE Transactions on publication 5(10): 1347-1360. resource management for roaming based multi-operator WCDMA networks”, Proceedings of the IEEE Vehicular Technology Conference VTC, 2004 pp. 2062-2066. © 2012 ACEEE 5 DOI: 01.IJNS.03.02.15