SlideShare a Scribd company logo
1 of 6
Download to read offline
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 6, Ver. IV (Nov – Dec. 2015), PP 55-60
www.iosrjournals.org
DOI: 10.9790/0661-17645560 www.iosrjournals.org 55 | Page
Bandwidth allocation mechanisms in the next mobile generation: A
practical Approach
Sara Salman SelimanAlsafi1
, Ashraf Gasim Elsid Abdalla2
, AminBabiker
A/Nabi Mustafa3
1,3-
Faculty of Engineering- Neelain University Khartoum –Sudan
2-
College of Engineering-Sudan University of Science and Technology
Abstract: This paper presents an algorithm for bandwidth management in integrated LTE network and WLAN.
The proposed algorithm also suitable for multimedia network (image, telephone and videophone).
A software tool is implemented to simulate the proposed algorithm it is basedon windows for random
distribution numbers such as Poisson distribution functionfor traffic generation and uniform distribution for
mobile location using MATLAB. The parameters taken in this proposed simulation model are: number of user,
type of traffic, user class and user bandwidth. The results of the simulation indicate that the new algorithm
increases the bandwidth availability in the lower data rate network and this reduces the congestion in the high
data network.
I. Introduction:
"Mobile wireless industry has started its technology creation, revolution and evolution since early
1970s.In the past few decades, mobile wireless technologieshave experience 4 or 5 generations of
technologyrevolution and evolution, namely from 1G to 4G.The cellular concept was introduced in the 1G tech-
neology which made the large scale mobile wirelesscommunication possible. Digital communication has
replaced the analogy technology in the 2G which improved the wireless communicationquality. Data
communication, in addition to thevoice communication, has been the main focus in the3G technologies and a
converged network for bothvoice and data communication is emerging. Withcontinued RD, there are many
killer applicationopportunities for the 4G as well as technological challenges."[1]
The 5G potential will require the design of a single wireless user terminal able to autonomously operate
in different heterogeneous access networks.A fully reconfigurable terminal changes its communication functions
depending on network and/or user demands. Moreover, this terminal will have to exploit various surrounding
information such as communication with navigation and localization systems and communications with weather
forecast and emergency systems in order to provide richer user services. However, the richness of the services
will necessitate higher bit rates, which will be the main driving factor towards broadband multimedia
development. [2]
Table (i):Comparison ofallGenerationsofmobileTechnology [3].
5G4G3G2G1GTechnology
Features
Soon(probaly202
0)
Now2004-20101990-20041970-1980Start/Deployment
high1Gbps2Mbp64 Kbps2KbpsData Bandwidth
WWWW(comin
g soon)
WiMAX LTE
Wi-Fi
CDMA 2000(
1XRTT,EVDO)
UMTS,EDGE
Digital Cellular
Technology
Analog cellular
technology
Technology
Dynamic
Information
access, Wearable
devices with AI
Capabilities
Dynamic
Information
access,
Wearable
devices
Integrated high quality
audio, video and data
Digital voice
SMS, Higher
capacity
packetized date
Mobile telephony
(voice)
Service
CDMACDMACDMATDMA-CDMAFDMAMultiplexing
Bandwidth allocation mechanisms in the next mobile generation: A practical Approach
DOI: 10.9790/0661-17645560 www.iosrjournals.org 56 | Page
All PacketAll PacketPacketCircuit, packetCircuitSwitching
InternetInternetPacket N/WPSTNPSTNCore network
II. Bandwidth requirement formultimedia:
The network bandwidth is divided among users sharing a cell. The amount of bandwidth per user is a
measure of the network capacity, because it depends on the distribution of the user population [4]. The total
bandwidth for 5th
Generation proposed as 1.056Gbit/s distance of up to 2kilometres with the use of an
8*8MIMO [5]. Table (ii) shows the service requirements in term of bandwidth
Table (ii): service requirements [6]
Data RateService
16kbit/sImage
8kbit/sTelephone
16kbit/sVideophone
III. Simulation Scenario:
The flow chart for the proposed algorithm:
IV. Mathematical model:
For the application of the proposed model we used MATLAB to configure like environment real
environment for users of mobile cellular systems. Using random generator function, we select a random location
for users of mobile terminals in the model. And to generate calls to the users arrival times randomly used.
We used Poisson distribution function because of the advantages it is simple, stable and independent in
all moments of time. Poisson distribution gives the number of arrivals in a constant length (t) distributed in the
mean value (λt) [7], the following relationship
P x,t =(( λt)x
/x!)e−λt(1)
Bandwidth allocation mechanisms in the next mobile generation: A practical Approach
DOI: 10.9790/0661-17645560 www.iosrjournals.org 57 | Page
After making that environment through consideration of the physical model we can use the data to find less can
receive user when the maximum distance it can travel without having to transfer it to the base station.
Simulation:
Figure 4.1 shows that simulation windows and it represented the random distribution of nodes inside the
building as defined previously, the X axis represent window length and Y axis represented width equal 50 meter
both of them.
Fig:4.1: simulation model window
The second result shown and this random generated depend on the user class (real time and no real time).the X
in figure 4.2 represented the users or nodes needed data rate axis is the number of node which equal 60 user and
Y axis represented data rate that each user needed .
Fig: 4.2: node application data rate
The third result as shown in figure 4.3 it represented the type of traffic or user class (real time and non-
realtime) random generated 1 for real time user and 0 for non-real time user. The X axis is user class 1 or 0, and
Y axis represented number or user in each class. Also figure 4.4 show the percentage of each type of users in
pipe diagram.
0 10 20 30 40 50 60
250
300
350
400
450
500
550
node applcation data rate
Nodes index
datarateinkbps
Bandwidth allocation mechanisms in the next mobile generation: A practical Approach
DOI: 10.9790/0661-17645560 www.iosrjournals.org 58 | Page
Fig: 4.3: Traffic classification for users
Fig: 4.4:type of user in pipe diagram
Figure 4.5 represented the maximum data user nodes. The X axis is the nodes index which equal 60
users and Y axis represented bandwidth in kbps.
Fig: 4.5:maximum data user nodes
The result as shown in figure 4.6 it represented the assign resource WLAN user bandwidth. The X axis
is nodes index and Y axis represented bandwidth in kbps and figure 4.7shows the WLAN available bandwidth
after new algorithm.
0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1
0
5
10
15
20
25
30
35
40
type of user
type of traffic
numberofuser
53%
type of user
47%
real time user
non real time user
0 10 20 30 40 50 60
0
0.5
1
1.5
2
2.5
3
3.5
x 10
5
Node index
BandwidthMbps
Maximum data user/nodes
real time user
non real time user
Bandwidth allocation mechanisms in the next mobile generation: A practical Approach
DOI: 10.9790/0661-17645560 www.iosrjournals.org 59 | Page
Fig: 4.6:assign resource WLAN user bandwidth
Fig:4.7 :WLAN available bandwidth after new algorithm
Figure 4.8 represented the assign resource LTE user bandwidth and figure 4.9shows available
bandwidth after new algorithm. The X axis is the nodes index which equal 60 users and Y axis represented
bandwidth in kbps.
Fig: 4.8: assign resource LTE user bandwidth
0 10 20 30 40 50 60
0
1
2
3
4
5
6
7
8
x 10
4
Assign resources WLAN user bandwidth
Nodes index
BandwidthinKbps
0 10 20 30 40 50 60
4
4.5
5
5.5
6
6.5
7
7.5
x 10
4
WLAN Available Bandwidth after new Algrosithm
Nodes index
BandwidthinKbps
0 10 20 30 40 50 60
-2000
-1500
-1000
-500
0
500
1000
Assign resources LTE user bandwidth
Nodes index
BandwidthinKbps
Bandwidth allocation mechanisms in the next mobile generation: A practical Approach
DOI: 10.9790/0661-17645560 www.iosrjournals.org 60 | Page
Fig:4.9: LTEavailable bandwidth after new algorithm
IV. Conclusion:
The effective bandwidth management algorithm enhances the bandwidth optimization and utilization.
In this study the proposed algorithm for bandwidth management,in integrated LTE and WLAN networks,
improved the bandwidth availability in the WLAN and it reduces the congestion in the LTE band. This will
grantee the required quality of services however it will introduce a high signaling load due to the frequent
handover between the two networks.
References:
[1]. http://www.isindexing.com/isi/papers/1396420201.pdf)
[2]. Dr. Anwar M. Mousa"Prospective of Fifth Generation MobileCommunication" University of Palestine,Gaza- Palestine.
[3]. “5G Mobile Technologies”
[4]. http://www.doc.ic.ac.uk/~nd/surprise_95/journal/vol1/mjf/article1.html
[5]. Metis project presentation (general overview 25/3/2013) Disclaimer .some of the icons used in the METIS project presentation are
owned by Eriksson. They will be later removed and replaced by METIS specific icons.
[6]. Data communication and computer network PHI learning retrieved 10 July 2011.
[7]. V. B. Iverson, “Tele traffic engineering and network planning,” Technical University of Denmark, Technical University of
Denmark Building 343, May 2010. [Online]. Available:http://www.fotonik.dtu.dk .
0 10 20 30 40 50 60
-1500
-1000
-500
0
500
1000
1500
LTE Available Bandwidth after new Algrosithm
Nodes index
BandwidthinKbps

More Related Content

What's hot

Integrated approach for efficient power consumption and resource allocation i...
Integrated approach for efficient power consumption and resource allocation i...Integrated approach for efficient power consumption and resource allocation i...
Integrated approach for efficient power consumption and resource allocation i...
IJECEIAES
 
Performance Analysis of Energy Optimized LTE-V2X Networks for Delay Sensitive...
Performance Analysis of Energy Optimized LTE-V2X Networks for Delay Sensitive...Performance Analysis of Energy Optimized LTE-V2X Networks for Delay Sensitive...
Performance Analysis of Energy Optimized LTE-V2X Networks for Delay Sensitive...
IJCNCJournal
 
An Efficient Wireless Backhaul Utilizing MIMO Transmission and IPT Forwarding
An Efficient Wireless Backhaul Utilizing MIMO Transmission and IPT ForwardingAn Efficient Wireless Backhaul Utilizing MIMO Transmission and IPT Forwarding
An Efficient Wireless Backhaul Utilizing MIMO Transmission and IPT Forwarding
CSCJournals
 
Interference Management with Limited Channel State Information in Wireless Ne...
Interference Management with Limited Channel State Information in Wireless Ne...Interference Management with Limited Channel State Information in Wireless Ne...
Interference Management with Limited Channel State Information in Wireless Ne...
Mohamed Seif
 
Intelligent network selection using fuzzy logic for 4 g wireless networks
Intelligent network selection using fuzzy logic for 4 g wireless networksIntelligent network selection using fuzzy logic for 4 g wireless networks
Intelligent network selection using fuzzy logic for 4 g wireless networks
IAEME Publication
 

What's hot (17)

HYPERSPECTRAL IMAGERY CLASSIFICATION USING TECHNOLOGIES OF COMPUTATIONAL INTE...
HYPERSPECTRAL IMAGERY CLASSIFICATION USING TECHNOLOGIES OF COMPUTATIONAL INTE...HYPERSPECTRAL IMAGERY CLASSIFICATION USING TECHNOLOGIES OF COMPUTATIONAL INTE...
HYPERSPECTRAL IMAGERY CLASSIFICATION USING TECHNOLOGIES OF COMPUTATIONAL INTE...
 
CL-SA-OFDM: cross-layer and smart antenna based OFDM system performance enha...
CL-SA-OFDM: cross-layer and smart antenna based  OFDM system performance enha...CL-SA-OFDM: cross-layer and smart antenna based  OFDM system performance enha...
CL-SA-OFDM: cross-layer and smart antenna based OFDM system performance enha...
 
Integrated approach for efficient power consumption and resource allocation i...
Integrated approach for efficient power consumption and resource allocation i...Integrated approach for efficient power consumption and resource allocation i...
Integrated approach for efficient power consumption and resource allocation i...
 
Performance Analysis of Energy Optimized LTE-V2X Networks for Delay Sensitive...
Performance Analysis of Energy Optimized LTE-V2X Networks for Delay Sensitive...Performance Analysis of Energy Optimized LTE-V2X Networks for Delay Sensitive...
Performance Analysis of Energy Optimized LTE-V2X Networks for Delay Sensitive...
 
An Efficient Wireless Backhaul Utilizing MIMO Transmission and IPT Forwarding
An Efficient Wireless Backhaul Utilizing MIMO Transmission and IPT ForwardingAn Efficient Wireless Backhaul Utilizing MIMO Transmission and IPT Forwarding
An Efficient Wireless Backhaul Utilizing MIMO Transmission and IPT Forwarding
 
Intelligent Approach for Seamless Mobility in Multi Network Environment
Intelligent Approach for Seamless Mobility in Multi Network EnvironmentIntelligent Approach for Seamless Mobility in Multi Network Environment
Intelligent Approach for Seamless Mobility in Multi Network Environment
 
Routing Algorithm for Heterogeneous Wireless Network in Vanet
Routing Algorithm for Heterogeneous Wireless Network in VanetRouting Algorithm for Heterogeneous Wireless Network in Vanet
Routing Algorithm for Heterogeneous Wireless Network in Vanet
 
H1075460
H1075460H1075460
H1075460
 
Resource Allocation in Heterogeneous Networks
Resource Allocation in Heterogeneous NetworksResource Allocation in Heterogeneous Networks
Resource Allocation in Heterogeneous Networks
 
Techniques for Improving BER and SNR in MIMO Antenna for Optimum Performance
Techniques for Improving BER and SNR in MIMO Antenna for Optimum PerformanceTechniques for Improving BER and SNR in MIMO Antenna for Optimum Performance
Techniques for Improving BER and SNR in MIMO Antenna for Optimum Performance
 
1 ijaems nov-2015-1-a comparative performance analysis of 4x4 mimo-ofdm syste...
1 ijaems nov-2015-1-a comparative performance analysis of 4x4 mimo-ofdm syste...1 ijaems nov-2015-1-a comparative performance analysis of 4x4 mimo-ofdm syste...
1 ijaems nov-2015-1-a comparative performance analysis of 4x4 mimo-ofdm syste...
 
Bit Error Rate Analysis in WiMAX Communication at Vehicular Speeds using mod...
Bit Error Rate Analysis in WiMAX Communication at Vehicular  Speeds using mod...Bit Error Rate Analysis in WiMAX Communication at Vehicular  Speeds using mod...
Bit Error Rate Analysis in WiMAX Communication at Vehicular Speeds using mod...
 
Interoperator Dynamic Spectrum Sharing (Analysis, Costs and Implications)
Interoperator Dynamic Spectrum Sharing (Analysis, Costs and Implications)Interoperator Dynamic Spectrum Sharing (Analysis, Costs and Implications)
Interoperator Dynamic Spectrum Sharing (Analysis, Costs and Implications)
 
Interference Management with Limited Channel State Information in Wireless Ne...
Interference Management with Limited Channel State Information in Wireless Ne...Interference Management with Limited Channel State Information in Wireless Ne...
Interference Management with Limited Channel State Information in Wireless Ne...
 
The shadowing propagation model
The shadowing propagation modelThe shadowing propagation model
The shadowing propagation model
 
Analysis of Handoff techniques used for hybrid networks: cellular/WLAN
Analysis of Handoff techniques used for hybrid networks: cellular/WLAN  Analysis of Handoff techniques used for hybrid networks: cellular/WLAN
Analysis of Handoff techniques used for hybrid networks: cellular/WLAN
 
Intelligent network selection using fuzzy logic for 4 g wireless networks
Intelligent network selection using fuzzy logic for 4 g wireless networksIntelligent network selection using fuzzy logic for 4 g wireless networks
Intelligent network selection using fuzzy logic for 4 g wireless networks
 

Viewers also liked

Viewers also liked (20)

K1302036973
K1302036973K1302036973
K1302036973
 
A012140107
A012140107A012140107
A012140107
 
L1803016468
L1803016468L1803016468
L1803016468
 
E017523439
E017523439E017523439
E017523439
 
D011122934
D011122934D011122934
D011122934
 
H018124360
H018124360H018124360
H018124360
 
I017114347
I017114347I017114347
I017114347
 
Effectiveness of Strain Counterstrain Technique on Quadratus Lumborum Trigger...
Effectiveness of Strain Counterstrain Technique on Quadratus Lumborum Trigger...Effectiveness of Strain Counterstrain Technique on Quadratus Lumborum Trigger...
Effectiveness of Strain Counterstrain Technique on Quadratus Lumborum Trigger...
 
K1802036171
K1802036171K1802036171
K1802036171
 
G017334248
G017334248G017334248
G017334248
 
I1802035153
I1802035153I1802035153
I1802035153
 
J012626269
J012626269J012626269
J012626269
 
N010417991
N010417991N010417991
N010417991
 
H011124050
H011124050H011124050
H011124050
 
C012541523
C012541523C012541523
C012541523
 
O130306104110
O130306104110O130306104110
O130306104110
 
Simulation of Signals with Field Signal Simulator
Simulation of Signals with Field Signal SimulatorSimulation of Signals with Field Signal Simulator
Simulation of Signals with Field Signal Simulator
 
B1303050813
B1303050813B1303050813
B1303050813
 
L017637173
L017637173L017637173
L017637173
 
A010340112
A010340112A010340112
A010340112
 

Similar to H017645560

Call Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
Call Admission Control (CAC) with Load Balancing Approach for the WLAN NetworksCall Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
Call Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
IJARIIT
 
8 of the Must-Read Network & Data Communication Articles Published this weeke...
8 of the Must-Read Network & Data Communication Articles Published this weeke...8 of the Must-Read Network & Data Communication Articles Published this weeke...
8 of the Must-Read Network & Data Communication Articles Published this weeke...
IJCNCJournal
 
Limitations Of Modulation In Isi
Limitations Of Modulation In IsiLimitations Of Modulation In Isi
Limitations Of Modulation In Isi
Jenny Mancini
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
What Is Routing Overhead Of The Network
What Is Routing Overhead Of The NetworkWhat Is Routing Overhead Of The Network
What Is Routing Overhead Of The Network
Patricia Viljoen
 
An analysis of a large scale wireless image distribution system deployment
An analysis of a large scale wireless image distribution system deploymentAn analysis of a large scale wireless image distribution system deployment
An analysis of a large scale wireless image distribution system deployment
Conference Papers
 
An analysis of a large scale wireless image distribution system deployment
An analysis of a large scale wireless image distribution system deploymentAn analysis of a large scale wireless image distribution system deployment
An analysis of a large scale wireless image distribution system deployment
Conference Papers
 
International Journal of Computer Networks & Communications (IJCNC)
International Journal of Computer Networks & Communications (IJCNC)International Journal of Computer Networks & Communications (IJCNC)
International Journal of Computer Networks & Communications (IJCNC)
IJCNCJournal
 

Similar to H017645560 (20)

Call Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
Call Admission Control (CAC) with Load Balancing Approach for the WLAN NetworksCall Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
Call Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
8 of the Must-Read Network & Data Communication Articles Published this weeke...
8 of the Must-Read Network & Data Communication Articles Published this weeke...8 of the Must-Read Network & Data Communication Articles Published this weeke...
8 of the Must-Read Network & Data Communication Articles Published this weeke...
 
TINA showcase: Introduction
TINA showcase: IntroductionTINA showcase: Introduction
TINA showcase: Introduction
 
Traffic Offloading Solutions: Femto, WiFi and Integrated Femto-WiFi
Traffic Offloading Solutions: Femto, WiFi and Integrated Femto-WiFiTraffic Offloading Solutions: Femto, WiFi and Integrated Femto-WiFi
Traffic Offloading Solutions: Femto, WiFi and Integrated Femto-WiFi
 
50120130406009 2
50120130406009 250120130406009 2
50120130406009 2
 
Teletraffic Analysis of Overflowed Traffic with Voice only in Multilayer 3G W...
Teletraffic Analysis of Overflowed Traffic with Voice only in Multilayer 3G W...Teletraffic Analysis of Overflowed Traffic with Voice only in Multilayer 3G W...
Teletraffic Analysis of Overflowed Traffic with Voice only in Multilayer 3G W...
 
Limitations Of Modulation In Isi
Limitations Of Modulation In IsiLimitations Of Modulation In Isi
Limitations Of Modulation In Isi
 
40120140506009 2
40120140506009 240120140506009 2
40120140506009 2
 
Performance Analysis of WiMAX Based Vehicular Ad hoc Networks with Realistic ...
Performance Analysis of WiMAX Based Vehicular Ad hoc Networks with Realistic ...Performance Analysis of WiMAX Based Vehicular Ad hoc Networks with Realistic ...
Performance Analysis of WiMAX Based Vehicular Ad hoc Networks with Realistic ...
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
User Preference based Network Selection in Wireless Networks
User Preference based Network Selection in Wireless NetworksUser Preference based Network Selection in Wireless Networks
User Preference based Network Selection in Wireless Networks
 
What Is Routing Overhead Of The Network
What Is Routing Overhead Of The NetworkWhat Is Routing Overhead Of The Network
What Is Routing Overhead Of The Network
 
7.chapter
7.chapter7.chapter
7.chapter
 
Performance Analysis of MIMO System on Different Modulation Scheme over Ricia...
Performance Analysis of MIMO System on Different Modulation Scheme over Ricia...Performance Analysis of MIMO System on Different Modulation Scheme over Ricia...
Performance Analysis of MIMO System on Different Modulation Scheme over Ricia...
 
An analysis of a large scale wireless image distribution system deployment
An analysis of a large scale wireless image distribution system deploymentAn analysis of a large scale wireless image distribution system deployment
An analysis of a large scale wireless image distribution system deployment
 
An analysis of a large scale wireless image distribution system deployment
An analysis of a large scale wireless image distribution system deploymentAn analysis of a large scale wireless image distribution system deployment
An analysis of a large scale wireless image distribution system deployment
 
International Journal of Computer Networks & Communications (IJCNC)
International Journal of Computer Networks & Communications (IJCNC)International Journal of Computer Networks & Communications (IJCNC)
International Journal of Computer Networks & Communications (IJCNC)
 
Efficiency and effectiveness video on demand over worldwide interoperability ...
Efficiency and effectiveness video on demand over worldwide interoperability ...Efficiency and effectiveness video on demand over worldwide interoperability ...
Efficiency and effectiveness video on demand over worldwide interoperability ...
 
Analysis of back propagation and radial basis function neural networks for ha...
Analysis of back propagation and radial basis function neural networks for ha...Analysis of back propagation and radial basis function neural networks for ha...
Analysis of back propagation and radial basis function neural networks for ha...
 

More from IOSR Journals

More from IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 
C011121114
C011121114C011121114
C011121114
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 

H017645560

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 6, Ver. IV (Nov – Dec. 2015), PP 55-60 www.iosrjournals.org DOI: 10.9790/0661-17645560 www.iosrjournals.org 55 | Page Bandwidth allocation mechanisms in the next mobile generation: A practical Approach Sara Salman SelimanAlsafi1 , Ashraf Gasim Elsid Abdalla2 , AminBabiker A/Nabi Mustafa3 1,3- Faculty of Engineering- Neelain University Khartoum –Sudan 2- College of Engineering-Sudan University of Science and Technology Abstract: This paper presents an algorithm for bandwidth management in integrated LTE network and WLAN. The proposed algorithm also suitable for multimedia network (image, telephone and videophone). A software tool is implemented to simulate the proposed algorithm it is basedon windows for random distribution numbers such as Poisson distribution functionfor traffic generation and uniform distribution for mobile location using MATLAB. The parameters taken in this proposed simulation model are: number of user, type of traffic, user class and user bandwidth. The results of the simulation indicate that the new algorithm increases the bandwidth availability in the lower data rate network and this reduces the congestion in the high data network. I. Introduction: "Mobile wireless industry has started its technology creation, revolution and evolution since early 1970s.In the past few decades, mobile wireless technologieshave experience 4 or 5 generations of technologyrevolution and evolution, namely from 1G to 4G.The cellular concept was introduced in the 1G tech- neology which made the large scale mobile wirelesscommunication possible. Digital communication has replaced the analogy technology in the 2G which improved the wireless communicationquality. Data communication, in addition to thevoice communication, has been the main focus in the3G technologies and a converged network for bothvoice and data communication is emerging. Withcontinued RD, there are many killer applicationopportunities for the 4G as well as technological challenges."[1] The 5G potential will require the design of a single wireless user terminal able to autonomously operate in different heterogeneous access networks.A fully reconfigurable terminal changes its communication functions depending on network and/or user demands. Moreover, this terminal will have to exploit various surrounding information such as communication with navigation and localization systems and communications with weather forecast and emergency systems in order to provide richer user services. However, the richness of the services will necessitate higher bit rates, which will be the main driving factor towards broadband multimedia development. [2] Table (i):Comparison ofallGenerationsofmobileTechnology [3]. 5G4G3G2G1GTechnology Features Soon(probaly202 0) Now2004-20101990-20041970-1980Start/Deployment high1Gbps2Mbp64 Kbps2KbpsData Bandwidth WWWW(comin g soon) WiMAX LTE Wi-Fi CDMA 2000( 1XRTT,EVDO) UMTS,EDGE Digital Cellular Technology Analog cellular technology Technology Dynamic Information access, Wearable devices with AI Capabilities Dynamic Information access, Wearable devices Integrated high quality audio, video and data Digital voice SMS, Higher capacity packetized date Mobile telephony (voice) Service CDMACDMACDMATDMA-CDMAFDMAMultiplexing
  • 2. Bandwidth allocation mechanisms in the next mobile generation: A practical Approach DOI: 10.9790/0661-17645560 www.iosrjournals.org 56 | Page All PacketAll PacketPacketCircuit, packetCircuitSwitching InternetInternetPacket N/WPSTNPSTNCore network II. Bandwidth requirement formultimedia: The network bandwidth is divided among users sharing a cell. The amount of bandwidth per user is a measure of the network capacity, because it depends on the distribution of the user population [4]. The total bandwidth for 5th Generation proposed as 1.056Gbit/s distance of up to 2kilometres with the use of an 8*8MIMO [5]. Table (ii) shows the service requirements in term of bandwidth Table (ii): service requirements [6] Data RateService 16kbit/sImage 8kbit/sTelephone 16kbit/sVideophone III. Simulation Scenario: The flow chart for the proposed algorithm: IV. Mathematical model: For the application of the proposed model we used MATLAB to configure like environment real environment for users of mobile cellular systems. Using random generator function, we select a random location for users of mobile terminals in the model. And to generate calls to the users arrival times randomly used. We used Poisson distribution function because of the advantages it is simple, stable and independent in all moments of time. Poisson distribution gives the number of arrivals in a constant length (t) distributed in the mean value (λt) [7], the following relationship P x,t =(( λt)x /x!)e−λt(1)
  • 3. Bandwidth allocation mechanisms in the next mobile generation: A practical Approach DOI: 10.9790/0661-17645560 www.iosrjournals.org 57 | Page After making that environment through consideration of the physical model we can use the data to find less can receive user when the maximum distance it can travel without having to transfer it to the base station. Simulation: Figure 4.1 shows that simulation windows and it represented the random distribution of nodes inside the building as defined previously, the X axis represent window length and Y axis represented width equal 50 meter both of them. Fig:4.1: simulation model window The second result shown and this random generated depend on the user class (real time and no real time).the X in figure 4.2 represented the users or nodes needed data rate axis is the number of node which equal 60 user and Y axis represented data rate that each user needed . Fig: 4.2: node application data rate The third result as shown in figure 4.3 it represented the type of traffic or user class (real time and non- realtime) random generated 1 for real time user and 0 for non-real time user. The X axis is user class 1 or 0, and Y axis represented number or user in each class. Also figure 4.4 show the percentage of each type of users in pipe diagram. 0 10 20 30 40 50 60 250 300 350 400 450 500 550 node applcation data rate Nodes index datarateinkbps
  • 4. Bandwidth allocation mechanisms in the next mobile generation: A practical Approach DOI: 10.9790/0661-17645560 www.iosrjournals.org 58 | Page Fig: 4.3: Traffic classification for users Fig: 4.4:type of user in pipe diagram Figure 4.5 represented the maximum data user nodes. The X axis is the nodes index which equal 60 users and Y axis represented bandwidth in kbps. Fig: 4.5:maximum data user nodes The result as shown in figure 4.6 it represented the assign resource WLAN user bandwidth. The X axis is nodes index and Y axis represented bandwidth in kbps and figure 4.7shows the WLAN available bandwidth after new algorithm. 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 0 5 10 15 20 25 30 35 40 type of user type of traffic numberofuser 53% type of user 47% real time user non real time user 0 10 20 30 40 50 60 0 0.5 1 1.5 2 2.5 3 3.5 x 10 5 Node index BandwidthMbps Maximum data user/nodes real time user non real time user
  • 5. Bandwidth allocation mechanisms in the next mobile generation: A practical Approach DOI: 10.9790/0661-17645560 www.iosrjournals.org 59 | Page Fig: 4.6:assign resource WLAN user bandwidth Fig:4.7 :WLAN available bandwidth after new algorithm Figure 4.8 represented the assign resource LTE user bandwidth and figure 4.9shows available bandwidth after new algorithm. The X axis is the nodes index which equal 60 users and Y axis represented bandwidth in kbps. Fig: 4.8: assign resource LTE user bandwidth 0 10 20 30 40 50 60 0 1 2 3 4 5 6 7 8 x 10 4 Assign resources WLAN user bandwidth Nodes index BandwidthinKbps 0 10 20 30 40 50 60 4 4.5 5 5.5 6 6.5 7 7.5 x 10 4 WLAN Available Bandwidth after new Algrosithm Nodes index BandwidthinKbps 0 10 20 30 40 50 60 -2000 -1500 -1000 -500 0 500 1000 Assign resources LTE user bandwidth Nodes index BandwidthinKbps
  • 6. Bandwidth allocation mechanisms in the next mobile generation: A practical Approach DOI: 10.9790/0661-17645560 www.iosrjournals.org 60 | Page Fig:4.9: LTEavailable bandwidth after new algorithm IV. Conclusion: The effective bandwidth management algorithm enhances the bandwidth optimization and utilization. In this study the proposed algorithm for bandwidth management,in integrated LTE and WLAN networks, improved the bandwidth availability in the WLAN and it reduces the congestion in the LTE band. This will grantee the required quality of services however it will introduce a high signaling load due to the frequent handover between the two networks. References: [1]. http://www.isindexing.com/isi/papers/1396420201.pdf) [2]. Dr. Anwar M. Mousa"Prospective of Fifth Generation MobileCommunication" University of Palestine,Gaza- Palestine. [3]. “5G Mobile Technologies” [4]. http://www.doc.ic.ac.uk/~nd/surprise_95/journal/vol1/mjf/article1.html [5]. Metis project presentation (general overview 25/3/2013) Disclaimer .some of the icons used in the METIS project presentation are owned by Eriksson. They will be later removed and replaced by METIS specific icons. [6]. Data communication and computer network PHI learning retrieved 10 July 2011. [7]. V. B. Iverson, “Tele traffic engineering and network planning,” Technical University of Denmark, Technical University of Denmark Building 343, May 2010. [Online]. Available:http://www.fotonik.dtu.dk . 0 10 20 30 40 50 60 -1500 -1000 -500 0 500 1000 1500 LTE Available Bandwidth after new Algrosithm Nodes index BandwidthinKbps