SlideShare a Scribd company logo
1 of 8
Download to read offline
CSEIT183718 | Received : 03 Sep 2018 | Accepted : 18 Sep 2018 | September-October - 2018 [ 3 (7) : 115-122 ]
International Journal of Scientific Research in Computer Science, Engineering and Information Technology
© 2018 IJSRCSEIT | Volume 3 | Issue 7 | ISSN : 2456-3307
115
Performance Evaluation of VEnodeb Using Virtualized Radio
Resource Management
Afzal Ahmad1, Mohammad Asif2, Shaikh Rohan Ali3
1M.Tech (CSE), Head of Computer Department Jamia Polytechnic, Akkalkuwa, Maharashtra, India
2M.Tech (CSE) Pursuing, Lecturer Jamia Institute of Engineering & Mgmt. Studies, Akkalkuwa, Maharashtra India
3B.E. (Computer) Pursuing Jamia Institute of Engineering & Mgmt. Studies, Akkalkuwa, Maharashtra India
ABSTRACT
With the demand upsurge for high bandwidth services, continuous increase in the number of cellular
subscriptions, adoption of Internet of Things (IoT), and marked growth in Machine to Machine (M2M) tract,
there is great stress exerted on cellular network infrastructure. The present wire line and wireless networking
technologies are rigid in nature and heavily hardware dependent. The embrace of SDN in traditional cellular
networks has led to the implementation of vital network functions in the form of software that are deployed in
virtualized environments. This approach to move crucial and hardware intensive network functions to virtual
environments is collectively referred to as network function virtualization (NFV).we implement a virtualized
eNodeB component (Radio Resource Management) to add agility to the network setup and improve
performance, which we compare with a traditional resource manager. When combined with dynamic network
resource allocation techniques proposed in Elastic Hando. Agnostic approach can achieve a greater reduction in
capital and operational expenses through optimal use of network resources and client energy utilization to
better handle these agreements under peak network load.
Keywords : Internet of Things, Machine to Machine, Radio Resource Management, Network Function
Virtualization, Software Defined Networks, Radio Access Networks, MIMO, eNodeB
I. INTRODUCTION
In the last two decades, cellular networks have
revolutionized telecommunications and are
responsible for connecting more people and devices
than ever. The rapid advances in cellular network
technologies have solved most connectivity
challenges; have handled increase in the number of
subscribers and large amounts of data traffic.
At the end of the year 2017, the total number of
mobile subscriptions reached 7.8 billion by adding
almost 100 million new subscriptions in a span of
three months. With the number of subscribers
increasing and consumption of multimedia content,
in particular video, data traffic rose by as much as 65%
[1].The explosive growth in the number of cellular
devices results in significant greenhouse emissions
due to substantial electricity usage of which up to 90%
is consumed by the network infrastructure [2].
As the adoption of virtualization technologies in
addressing similar challenges in storage and
computing in the information technology industry
has had remarkable success, the research community
is exploring cloudification of internetbased services
with the goal of creating hardware independent,
flexible, and efficient design of network services. The
Volume 3, Issue 7, September-October-2018 | http:// ijsrcseit.com
Afzal Ahmad et al. Int J S Res CSE & IT. 2018 September-October-2018; 3(7) : 115-122
116
cellular networks through Software Defined
Networks (SDN), Network Function Virtualization
(NFV), and Cloudbased Radio Access Networks
(CRAN).
With the increase in the adoption of Internet of
things (IoT) and the addition of new users, the
struggle for network resource is increasing. Cellular
service providers have depended on procuring more
frequency bands and efficient communication
techniques such as multiple input, multiple outputs
(MIMO), etc. The alone effort can’t solve the
problem of increasing cellular network problem.
Apart from the challenges, financial resources are
invested for procuring new spectrum and operational
expenses involved in upgrading specialized hardware.
Figure 1.1. Energy utilization in current cellular network components
The telecom towers, which include the base station
alone may consume an estimated 2.5 billion liters of
fossil fuel annually, leading to an approximate
addition of 6.5 million metric tonnes of CO2
emissions.
II. LITURATURE SURVEY
The eNodeB which is the base station in the
cuttingedge Long Term Evolution (LTE) cellular
networking technology handles several key functions
such as supporting flexible bandwidth allocation,
radiorelated functions, location management,
handover functionality, etc.
The contributions of this topic include:
Spectrum Sensing Data Collection: We capture,
curate and study spectrum utilization data in the 2.4
GHz ISM band for a period of 30 days. This dataset
with 5 million+ data points can be used for future
research work.
Analytical Model to Perform Call Admission Control:
We propose a model and use proven mathematical
approaches to study the state of the network based on
three parameters:
i. data rate the network can support,
ii. a carrier's cost to service a subscriber, and
iii. quality of service.
Implement Virtual RRM: We implement and
evaluate our proposed call admission process in a
virtualized eNodeB component called Radio Resource
Management (RRM) by applying SDN and NVF
technologies.
Performance Analysis: We study and compare total
network utilization, cost of service and quality of
service of our virtual eNodeB implementation against
a traditional base station.
Evolution of Wireless: The concept of wireless
cellular telephone system was first discussed in
Volume 3, Issue 7, September-October-2018 | http:// ijsrcseit.com
Afzal Ahmad et al. Int J S Res CSE & IT. 2018 September-October-2018; 3(7) : 115-122
117
1947 by Bell Labs' D.H.Ring and W.R.Young.In 1948,
these RCCs operated the first fully automated
radiotelephone service, which eliminated the need
for an operator in most cases. Bell system went on to
build its first mobile phone technology called Mobile
Telephone System (MTS).
Figure 2. Evolution of Cellular Networks
III. METHODOLOGY
4G Native IP networks: The 4G systems were
originally envisioned by the Defence Advanced
Research Projects Agency (DARPA). DARPA
selected the distributed architecture and endtoend
Internet Protocol (IP),In 4G systems, the
circuitswitched infrastructure is abandoned and only
a packetswitched network is provided, while 2.5G
and 3G systems require both packet switched and
circuitswitched network nodes, i.e. two
infrastructures in parallel. This implies that in 4G,
traditional voice calls are replaced by IP telephony
One of the key technologies for 4G and beyond is the
Open Wireless Architecture(OWA) which supports
multiple wireless air interfaces in an open
architecture platform, one of which is Software
Defined Radio (SDR) that promises radio
convergence.
SDR: SDR offers several compelling benefits to all the
stakeholders, some of which are listed below [3]:
Implement common platform architecture, allowing
for the introduction of new radio technologies as
radio “products" in the market. Promote software
reusability across radio “products", reducing
development costs dramatically.
Volume 3, Issue 7, September-October-2018 | http:// ijsrcseit.com
Afzal Ahmad et al. Int J S Res CSE & IT. 2018 September-October-2018; 3(7) : 115-122
118
Figure 3.1. 4G (LTE) cellular network architecture
One of the key technologies for 4G and beyond is the
Open Wireless Architecture(OWA) which supports
multiple wireless air interfaces in an open
architecture platform, one of which is Software
Defined Radio (SDR) that promises radio
convergence.
SDR: SDR offers several compelling benefits to all the
stakeholders, some of which are listed below [3]:
Implement common platform architecture, allowing
for the introduction of new radio technologies as
radio “products" in the market. Promote software
reusability across radio “products", reducing
development costs dramatically.
Network Function Virtualization: Network functions
virtualization (NFV) is an initiative to virtualized
network services traditionally run on proprietary,
dedicated hardware. With NFV, functions like
routing, load balancing and firewalls are packaged as
virtual machines (VMs) on commodity hardware.
NFV's mission to use commodity hardware is
important as it relinquishes network managers to no
longer purchase and manually configure dedicated
hardware devices in order to build a service chain
that links specific functions in order to achieve a
desired result. As NFV virtualizes network function
and eliminates functionspecific hardware, network
managers can add, move or change network
functions at the server level in a simplified
provisioning process.
Figure 3.2. A simplified NFV architecture.
CSEIT183718 | Received : 03 Sep 2018 | Accepted : 18 Sep 2018 | September-October - 2018 [ 3 (7) : 115-122 ]
International Journal of Scientific Research in Computer Science, Engineering and Information Technology
© 2018 IJSRCSEIT | Volume 3 | Issue 7 | ISSN : 2456-3307
115
Benefits of NFV: If a service provider's customer
requests a new function, for example, NFV enables
the service provider to more easily add that service
in the form of a virtual machine without upgrading
or buying new hardware. In addition, NFV can
reduce power consumption and increase physical
space, since NFV eliminates most traditional
hardware appliances reducing both CAPEX and
OPEX.
NFV Challenges: NFV deployment has seen
relatively slow progress due to a lack of standards in
NFV management, automation and orchestration
(MANO). MANO provides the framework for
provisioning VNFs and managing NFV
infrastructure. It also helps components within NFV
infrastructure communicate with existing
operational and billing support systems (OSS/BSS).
CRAN: CRAN (CloudRAN), sometimes referred to
as CentralizedRAN, is a proposed architecture for
future cellular networks.
CRAN is a centralized, cloud computingbased
architecture for radio access networks that supports
2G, 3G, 4G and future wireless communication
standards.
Realtime virtualization ensures the resources in the
pool can be allocated dynamically to the base station
software stacks, say4G/3G/2G function modules
from different vendors according to network load.
Figure 4.1. Hack RF One| a low cost, open source
software defined radio
However, to satisfy the stringent timing
requirements of wireless communications systems,
the realtime performance for CRAN is in the order
of 10s of microseconds, which is two orders of
magnitude higher than the millisecond level
“realtime" performance usually seen in a
cloudcomputing environment.
Research on SDN, NFV and CRAN: The distributed
nature of control plane in current cellular networks
is not optimal for coherently managing spectrum,
radio resources, call hand_, and other essential
network functions in a way to manage future
network demands. SDNbased approaches present
opportunities in making the process of deploying
and managing cellular networks that are
traditionally not turnkey. These features include
seamless mobility through efficient handover
procedures [4], [5], load balancing [6], [7], creation
of on demand virtual access points (VAPs) [6], [8],
downlink scheduling (e.g., an Open Flow switch can
do a rate shaping or time division) [8], dynamic
spectrum usage [8], enhanced inter cell interference
coordination [8], [5], shared wireless infrastructures
[9],seamless subscriber mobility and cellular
networks [5], QoS and access control policies made
feasible and easier [9], [10], and easy deployment of
new applications [6],[7], [9]. Some of the recent
initiatives in the area of network virtualization,
include XBone and Tempes focusing on networking
technology; UCLP, VNET, AGAVE and VIOLIN
focusing on layers of virtualization; VNRMS,
NetScript, Genesis and FEDERICA.
IV. SIMULATIONS AND RESULTES
we discuss the hardware setup, simulation process,
and evaluate the simulation results.
The dataset for our research was compiled using a
Hack RF One, a lowcost, open source SDR spectrum
analyzer who’s beta testing phase was funded by
Volume 3, Issue 7, September-October-2018 | http:// ijsrcseit.com
Afzal Ahmad et al. Int J S Res CSE & IT. 2018 September-October-2018; 3(7) : 115-122
119
DARPA. The device can be used as a USB peripheral
or programmed for standalone operation, and it is
capable of scanning frequencies ranging from 1 MHz
to up to 6 GHz.
Figure 4.2. Gqrx Application free software
application that interfaces with Hack RF One
SDR receiver powered by the GNU Radio SDR
framework and the Qt graphical toolkit. It is free
software and supports many of the SDR hardware
available, including Hack RF and USRP devices.
The proposed model while improves network
utilization and reduces energy consumption is
susceptible to violate SLAs when subjected to sudden
spikes in network access requests. During times of
sudden rise in user load, the model takes a reactive
approach to solving the congestion problem.
Figure 4.3. Network Utilization vs. Proposed RRM
We evaluate our network model for two broad test
scenarios: network utilization and revenue
generation. In addition, we also test for how the
proposed approach fares against SLA violations. The
RRM by design tries to provide access and service to
PS subscribers. However, when there is an
unanticipated rise in demand due to a large number
of subscribers’s requesting network access, the
operator is compelled to drop some users violating
SLAs. When the various SLAs and their
corresponding QoS parameters are assigned weights,
the goal of the RRM is to minimize the overall
violation weight.
V. FUTURE SCOPE
The work presented in this thesis can be extended
and several variations of network resource allocation
problem can be investigated in the future. Some of
the topics are proposed below.
Volume 3, Issue 7, September-October-2018 | http:// ijsrcseit.com
Afzal Ahmad et al. Int J S Res CSE & IT. 2018 September-October-2018; 3(7) : 115-122
121
One possible area for research and extension is using
machine learning techniques to perform predictive
analysis on the network traffic patterns. This enables
RRM to actively monitor traffic patterns and
proactively allocate network resources anticipating
demand in order to mitigate the occurrence of SLA
violations. Finally, virtual RRM can be combined
with cognitive cellular networks providing
opportunistic network access to the users where they
are not limited to be serviced by a single carrier. This
could be a great value add in the design of next-
generation mobile networks.
VI. CONCLUSION
In here, we model and implement a virtual eNodeB
component- Radio Resource Management (RRM) and
analyze the efficiency that can be achieved in the
Call Admission Control function of the RRM. We
define various service level agreement choices for the
implementation and develop a model to allocate
network resources based on three key factors:
available data rate, carrier cost component, and
service quality.
We evaluate the network efficiency that can be
achieved using our model and that our setup can
potentially yield up to 33% reduction in energy
consumption due to the elastic nature of the proposed
NFV-based eNodeB. Our model leads to an increase
in network utilization of as much as 60% compared
to 40% when using a traditional RRM. We study the
behaviour of the proposed setup under a dynamic
pricing model which may generate as much as 27%
increase in carrier revenue when compared to fixed
access pricing. Finally, we put forth a weighted
violation penalty metric to evaluate the model's QoS
performance. While our model may help increase
carrier profits improves it is prone to violate user
agreements during periods of sudden spike in
network traffic. This can be attributed to the reactive
nature of the elasticity of RRM.
VII. REFERENCES
[1]. Ericsson, Ericsson Mobility Report," tech. rep.,
Ericsson, November 2016.
[2]. Center for Energy-efficient
Telecommunications, The Power of Wireless
Cloud,"tech. rep., Bell Labs and University of
Melbourne, April 2012.
[3]. W. I. Forum, What is software defined radio,"
wirelessinnovation.org, 2001.
[4]. P. Dely, A. Kassler, and N. Bayer, "Openflow
for wireless mesh networks," in 2011
Proceedings of 20th International Conference
on Computer Communications and Networks
(ICCCN), pp. 1{6, July 2011}.
[5]. L. E. Li, Z. M. Mao, and J. Rexford, "Toward
software-defined cellular networks," in
Proceedings of the 2012 European Workshop
on Software Defined Networking,
[6]. EWSDN '12, (Washington, DC, USA), pp. 7{12,
IEEE Computer Society, 2012}. J. Schulz-
Zander, L. Suresh, N. Sarrar, A. Feldmann, T.
H•uhn, and R. Merz,
[7]. "Programmatic orchestration of wifi networks,"
in Proceedings of the 2014 USENIX Conference
on USENIX Annual Technical Conference,
USENIX ATC'14, (Berkeley, CA, USA), pp.
347{358, USENIX Association, 2014.
[8]. J. Schulz-Zander, L. Suresh, N. Sarrar, A.
Feldmann, T. Huhn, and R.
Merz,"Programmatic orchestration of wifi
networks," in Proceedings of the 2014,USENIX
Conference on USENIX Annual Technical
Conference, USENIX ATC'14, (Berkeley, CA,
USA), pp. 347{358, USENIX Association, 2014.
[9]. Gudipati, D. Perry, L. E. Li, and S. Katti,
"SoftRAN: Software defined radio access
network," in Proceedings of the Second ACM
SIGCOMM Workshop on Hot Topics in
Software Defined Networking, HotSDN '13,
(New York, NY, USA),pp. 25{30, ACM, 2013.
Volume 3, Issue 7, September-October-2018 | http:// ijsrcseit.com
Afzal Ahmad et al. Int J S Res CSE & IT. 2018 September-October-2018; 3(7) : 115-122
122
[10]. J. Vestin, P. Dely, A. Kassler, N. Bayer, H.
Einsiedler, and C. Peylo, "Cloudmac:Towards
software defined wlans," SIGMOBILE Mob.
Comput. Commun. Rev.,vol. 16, pp. 42{45, Feb.
2013}.
[11]. K.-K. Yap, R. Sherwood, M. Kobayashi, T.-Y.
Huang, M. Chan, N. Handigol, N. McKeown,
and G. Parulkar, "Blueprint for introducing
innovation into wireless mobile networks," in
Proceedings of the Second ACM SIGCOMM
Workshop on Virtualized Infrastructure
Systems and Architectures, VISA '10, (New
York,NY, USA), pp. 25{32, ACM, 2010.
[12]. X. Jin, L. E. Li, L. Vanbever, and J. Rexford,
"SoftCell: Scalable and flexiblecellular core
network architecture," in Proceedings of the
Ninth ACM Conferenceon Emerging
Networking Experiments and Technologies,
CoNEXT '13, (NewYork, NY, USA), pp.
163{174, ACM, 2013

More Related Content

What's hot

5 g architecture
 5 g architecture 5 g architecture
5 g architectureShibinPS3
 
Mobility Management on 5G Vehicular Cloud Computing Systems
Mobility Management on 5G Vehicular Cloud Computing SystemsMobility Management on 5G Vehicular Cloud Computing Systems
Mobility Management on 5G Vehicular Cloud Computing SystemsUniversity of Piraeus
 
Security system with RFID control using E-KTP and internet of things
Security system with RFID control using E-KTP and internet of thingsSecurity system with RFID control using E-KTP and internet of things
Security system with RFID control using E-KTP and internet of thingsjournalBEEI
 
Power saving and optimal hybrid precoding in millimeter wave massive MIMO sys...
Power saving and optimal hybrid precoding in millimeter wave massive MIMO sys...Power saving and optimal hybrid precoding in millimeter wave massive MIMO sys...
Power saving and optimal hybrid precoding in millimeter wave massive MIMO sys...TELKOMNIKA JOURNAL
 
A Survey on new generation of wireless networks
A Survey on new generation of wireless networksA Survey on new generation of wireless networks
A Survey on new generation of wireless networksEditor IJMTER
 
Key performance requirement of future next wireless networks (6G)
Key performance requirement of future next wireless networks (6G)Key performance requirement of future next wireless networks (6G)
Key performance requirement of future next wireless networks (6G)journalBEEI
 
Data Offload Survival Guide - Part 3
Data Offload Survival Guide - Part 3Data Offload Survival Guide - Part 3
Data Offload Survival Guide - Part 3Justus @GreenPacket
 
Understanding operarinal 5 g
Understanding operarinal 5 gUnderstanding operarinal 5 g
Understanding operarinal 5 gVamsidhar Naidu
 
Architecture harmonization between cloud radio access network and fog network
Architecture harmonization between cloud radio access network and fog networkArchitecture harmonization between cloud radio access network and fog network
Architecture harmonization between cloud radio access network and fog networkredpel dot com
 
5G green communication
5G green communication5G green communication
5G green communicationAhmad El Tawil
 
ITU-T Study Group 15 Introduction
ITU-T Study Group 15 IntroductionITU-T Study Group 15 Introduction
ITU-T Study Group 15 IntroductionITU
 
Wimax Emulator to Enhance Media and Video Quality
Wimax Emulator to Enhance Media and Video QualityWimax Emulator to Enhance Media and Video Quality
Wimax Emulator to Enhance Media and Video Qualityijceronline
 
Experience in the implementation of wi fi community solution for rural in kiu...
Experience in the implementation of wi fi community solution for rural in kiu...Experience in the implementation of wi fi community solution for rural in kiu...
Experience in the implementation of wi fi community solution for rural in kiu...Conference Papers
 
MOBILE COMPUTING BY SIVASANKARI
MOBILE COMPUTING BY SIVASANKARIMOBILE COMPUTING BY SIVASANKARI
MOBILE COMPUTING BY SIVASANKARISivaSankari36
 
The prediction of mobile data traffic based on the ARIMA model and disruptive...
The prediction of mobile data traffic based on the ARIMA model and disruptive...The prediction of mobile data traffic based on the ARIMA model and disruptive...
The prediction of mobile data traffic based on the ARIMA model and disruptive...TELKOMNIKA JOURNAL
 
Cooperative hierarchical based edge-computing approach for resources allocati...
Cooperative hierarchical based edge-computing approach for resources allocati...Cooperative hierarchical based edge-computing approach for resources allocati...
Cooperative hierarchical based edge-computing approach for resources allocati...IJECEIAES
 

What's hot (19)

5 g architecture
 5 g architecture 5 g architecture
5 g architecture
 
Mobility Management on 5G Vehicular Cloud Computing Systems
Mobility Management on 5G Vehicular Cloud Computing SystemsMobility Management on 5G Vehicular Cloud Computing Systems
Mobility Management on 5G Vehicular Cloud Computing Systems
 
Security system with RFID control using E-KTP and internet of things
Security system with RFID control using E-KTP and internet of thingsSecurity system with RFID control using E-KTP and internet of things
Security system with RFID control using E-KTP and internet of things
 
Master Thesis on LTE and 5G Technology
Master Thesis on LTE and 5G TechnologyMaster Thesis on LTE and 5G Technology
Master Thesis on LTE and 5G Technology
 
Power saving and optimal hybrid precoding in millimeter wave massive MIMO sys...
Power saving and optimal hybrid precoding in millimeter wave massive MIMO sys...Power saving and optimal hybrid precoding in millimeter wave massive MIMO sys...
Power saving and optimal hybrid precoding in millimeter wave massive MIMO sys...
 
A Survey on new generation of wireless networks
A Survey on new generation of wireless networksA Survey on new generation of wireless networks
A Survey on new generation of wireless networks
 
Key performance requirement of future next wireless networks (6G)
Key performance requirement of future next wireless networks (6G)Key performance requirement of future next wireless networks (6G)
Key performance requirement of future next wireless networks (6G)
 
Data Offload Survival Guide - Part 3
Data Offload Survival Guide - Part 3Data Offload Survival Guide - Part 3
Data Offload Survival Guide - Part 3
 
Understanding operarinal 5 g
Understanding operarinal 5 gUnderstanding operarinal 5 g
Understanding operarinal 5 g
 
Architecture harmonization between cloud radio access network and fog network
Architecture harmonization between cloud radio access network and fog networkArchitecture harmonization between cloud radio access network and fog network
Architecture harmonization between cloud radio access network and fog network
 
Thesis Body
Thesis BodyThesis Body
Thesis Body
 
VTT Components and software for mobile devices
VTT Components and software for mobile devicesVTT Components and software for mobile devices
VTT Components and software for mobile devices
 
5G green communication
5G green communication5G green communication
5G green communication
 
ITU-T Study Group 15 Introduction
ITU-T Study Group 15 IntroductionITU-T Study Group 15 Introduction
ITU-T Study Group 15 Introduction
 
Wimax Emulator to Enhance Media and Video Quality
Wimax Emulator to Enhance Media and Video QualityWimax Emulator to Enhance Media and Video Quality
Wimax Emulator to Enhance Media and Video Quality
 
Experience in the implementation of wi fi community solution for rural in kiu...
Experience in the implementation of wi fi community solution for rural in kiu...Experience in the implementation of wi fi community solution for rural in kiu...
Experience in the implementation of wi fi community solution for rural in kiu...
 
MOBILE COMPUTING BY SIVASANKARI
MOBILE COMPUTING BY SIVASANKARIMOBILE COMPUTING BY SIVASANKARI
MOBILE COMPUTING BY SIVASANKARI
 
The prediction of mobile data traffic based on the ARIMA model and disruptive...
The prediction of mobile data traffic based on the ARIMA model and disruptive...The prediction of mobile data traffic based on the ARIMA model and disruptive...
The prediction of mobile data traffic based on the ARIMA model and disruptive...
 
Cooperative hierarchical based edge-computing approach for resources allocati...
Cooperative hierarchical based edge-computing approach for resources allocati...Cooperative hierarchical based edge-computing approach for resources allocati...
Cooperative hierarchical based edge-computing approach for resources allocati...
 

Similar to Performance Evaluation of VEnodeb Using Virtualized Radio Resource Management

Performance Analysis of Resource Allocation in 5G & Beyond 5G using AI
Performance Analysis of Resource Allocation in 5G & Beyond 5G using AIPerformance Analysis of Resource Allocation in 5G & Beyond 5G using AI
Performance Analysis of Resource Allocation in 5G & Beyond 5G using AIIRJET Journal
 
Nanotechnology in 5G Wireless Communication Network: An Approach
Nanotechnology in 5G Wireless Communication Network: An ApproachNanotechnology in 5G Wireless Communication Network: An Approach
Nanotechnology in 5G Wireless Communication Network: An ApproachIRJET Journal
 
Correlation between Terms of 5G Networks, IoT and D2D Communication
Correlation between Terms of 5G Networks, IoT and D2D CommunicationCorrelation between Terms of 5G Networks, IoT and D2D Communication
Correlation between Terms of 5G Networks, IoT and D2D Communicationijtsrd
 
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING MLSECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING MLIRJET Journal
 
5 g network white paper
5 g network white paper 5 g network white paper
5 g network white paper Ravi Sharma
 
Performance comparison of umts and lte on the basis of data rates
Performance comparison of umts and lte on the basis of data ratesPerformance comparison of umts and lte on the basis of data rates
Performance comparison of umts and lte on the basis of data ratesIAEME Publication
 
56_5G Wireless Communication Network Architecture and Its Key Enabling Techno...
56_5G Wireless Communication Network Architecture and Its Key Enabling Techno...56_5G Wireless Communication Network Architecture and Its Key Enabling Techno...
56_5G Wireless Communication Network Architecture and Its Key Enabling Techno...EdisonAndresZapataOc
 
Performance Evaluation of Interactive Video Streaming over WiMAX Network
Performance Evaluation of Interactive Video Streaming over WiMAX Network Performance Evaluation of Interactive Video Streaming over WiMAX Network
Performance Evaluation of Interactive Video Streaming over WiMAX Network IJECEIAES
 
Challenges and Emerging Technology in 5G
Challenges and Emerging Technology in 5GChallenges and Emerging Technology in 5G
Challenges and Emerging Technology in 5Gijtsrd
 
5G Telecom Infrastructure Market Participants Should Consider
5G Telecom Infrastructure Market Participants Should Consider5G Telecom Infrastructure Market Participants Should Consider
5G Telecom Infrastructure Market Participants Should Considershikhasony666
 
Efficient Vertical Handoff Management in LTE Cellular Networks
Efficient Vertical Handoff Management in LTE Cellular NetworksEfficient Vertical Handoff Management in LTE Cellular Networks
Efficient Vertical Handoff Management in LTE Cellular NetworksIRJET Journal
 
Review on a new generation wireless mobile network
Review on a new generation wireless mobile network  Review on a new generation wireless mobile network
Review on a new generation wireless mobile network eSAT Publishing House
 
An efficient transport protocol for delivery of multimedia content in wireles...
An efficient transport protocol for delivery of multimedia content in wireles...An efficient transport protocol for delivery of multimedia content in wireles...
An efficient transport protocol for delivery of multimedia content in wireles...Alexander Decker
 
An extensive review: Internet of things is speeding up the necessity for 5G
An extensive review: Internet of things is speeding up the necessity for 5GAn extensive review: Internet of things is speeding up the necessity for 5G
An extensive review: Internet of things is speeding up the necessity for 5GIJERA Editor
 
SPECIAL SECTION ON RECENT ADVANCES IN SOFTWARE DEFINED NETWORKING FOR 5G NETW...
SPECIAL SECTION ON RECENT ADVANCES IN SOFTWARE DEFINED NETWORKING FOR 5G NETW...SPECIAL SECTION ON RECENT ADVANCES IN SOFTWARE DEFINED NETWORKING FOR 5G NETW...
SPECIAL SECTION ON RECENT ADVANCES IN SOFTWARE DEFINED NETWORKING FOR 5G NETW...Rakesh Jha
 
6G Technology.pdf
6G Technology.pdf6G Technology.pdf
6G Technology.pdfApril Smith
 
Design and development of handover simulator model in 5G cellular network
Design and development of handover simulator model in 5G cellular network Design and development of handover simulator model in 5G cellular network
Design and development of handover simulator model in 5G cellular network IJECEIAES
 
International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...ijcseit
 

Similar to Performance Evaluation of VEnodeb Using Virtualized Radio Resource Management (20)

Performance Analysis of Resource Allocation in 5G & Beyond 5G using AI
Performance Analysis of Resource Allocation in 5G & Beyond 5G using AIPerformance Analysis of Resource Allocation in 5G & Beyond 5G using AI
Performance Analysis of Resource Allocation in 5G & Beyond 5G using AI
 
Nanotechnology in 5G Wireless Communication Network: An Approach
Nanotechnology in 5G Wireless Communication Network: An ApproachNanotechnology in 5G Wireless Communication Network: An Approach
Nanotechnology in 5G Wireless Communication Network: An Approach
 
Correlation between Terms of 5G Networks, IoT and D2D Communication
Correlation between Terms of 5G Networks, IoT and D2D CommunicationCorrelation between Terms of 5G Networks, IoT and D2D Communication
Correlation between Terms of 5G Networks, IoT and D2D Communication
 
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING MLSECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
 
5 g network white paper
5 g network white paper 5 g network white paper
5 g network white paper
 
Performance comparison of umts and lte on the basis of data rates
Performance comparison of umts and lte on the basis of data ratesPerformance comparison of umts and lte on the basis of data rates
Performance comparison of umts and lte on the basis of data rates
 
56_5G Wireless Communication Network Architecture and Its Key Enabling Techno...
56_5G Wireless Communication Network Architecture and Its Key Enabling Techno...56_5G Wireless Communication Network Architecture and Its Key Enabling Techno...
56_5G Wireless Communication Network Architecture and Its Key Enabling Techno...
 
Performance Evaluation of Interactive Video Streaming over WiMAX Network
Performance Evaluation of Interactive Video Streaming over WiMAX Network Performance Evaluation of Interactive Video Streaming over WiMAX Network
Performance Evaluation of Interactive Video Streaming over WiMAX Network
 
Challenges and Emerging Technology in 5G
Challenges and Emerging Technology in 5GChallenges and Emerging Technology in 5G
Challenges and Emerging Technology in 5G
 
5G Telecom Infrastructure Market Participants Should Consider
5G Telecom Infrastructure Market Participants Should Consider5G Telecom Infrastructure Market Participants Should Consider
5G Telecom Infrastructure Market Participants Should Consider
 
Efficient Vertical Handoff Management in LTE Cellular Networks
Efficient Vertical Handoff Management in LTE Cellular NetworksEfficient Vertical Handoff Management in LTE Cellular Networks
Efficient Vertical Handoff Management in LTE Cellular Networks
 
Review on a new generation wireless mobile network
Review on a new generation wireless mobile network  Review on a new generation wireless mobile network
Review on a new generation wireless mobile network
 
An efficient transport protocol for delivery of multimedia content in wireles...
An efficient transport protocol for delivery of multimedia content in wireles...An efficient transport protocol for delivery of multimedia content in wireles...
An efficient transport protocol for delivery of multimedia content in wireles...
 
An extensive review: Internet of things is speeding up the necessity for 5G
An extensive review: Internet of things is speeding up the necessity for 5GAn extensive review: Internet of things is speeding up the necessity for 5G
An extensive review: Internet of things is speeding up the necessity for 5G
 
SPECIAL SECTION ON RECENT ADVANCES IN SOFTWARE DEFINED NETWORKING FOR 5G NETW...
SPECIAL SECTION ON RECENT ADVANCES IN SOFTWARE DEFINED NETWORKING FOR 5G NETW...SPECIAL SECTION ON RECENT ADVANCES IN SOFTWARE DEFINED NETWORKING FOR 5G NETW...
SPECIAL SECTION ON RECENT ADVANCES IN SOFTWARE DEFINED NETWORKING FOR 5G NETW...
 
Ijsrp p10274
Ijsrp p10274Ijsrp p10274
Ijsrp p10274
 
6G Technology.pdf
6G Technology.pdf6G Technology.pdf
6G Technology.pdf
 
6G Technology
6G Technology6G Technology
6G Technology
 
Design and development of handover simulator model in 5G cellular network
Design and development of handover simulator model in 5G cellular network Design and development of handover simulator model in 5G cellular network
Design and development of handover simulator model in 5G cellular network
 
International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...
 

More from JIEMS Akkalkuwa

4.report (gi fi technology)
4.report (gi fi technology)4.report (gi fi technology)
4.report (gi fi technology)JIEMS Akkalkuwa
 
3.acknowledgement (gi fi technology)
3.acknowledgement (gi fi technology)3.acknowledgement (gi fi technology)
3.acknowledgement (gi fi technology)JIEMS Akkalkuwa
 
2.index (gi fi technology)
2.index (gi fi technology)2.index (gi fi technology)
2.index (gi fi technology)JIEMS Akkalkuwa
 
1.frontpage (gi fi technology)
1.frontpage (gi fi technology)1.frontpage (gi fi technology)
1.frontpage (gi fi technology)JIEMS Akkalkuwa
 
4 (data security in local network using)
4 (data security in local network using)4 (data security in local network using)
4 (data security in local network using)JIEMS Akkalkuwa
 
3 (data security in local network using)
3 (data security in local network using)3 (data security in local network using)
3 (data security in local network using)JIEMS Akkalkuwa
 
2 (data security in local network using)
2 (data security in local network using)2 (data security in local network using)
2 (data security in local network using)JIEMS Akkalkuwa
 
1 (data security in local network using)
1 (data security in local network using)1 (data security in local network using)
1 (data security in local network using)JIEMS Akkalkuwa
 
4.report (biometric security system)
4.report (biometric security system)4.report (biometric security system)
4.report (biometric security system)JIEMS Akkalkuwa
 
3.abstact (biometric security system)
3.abstact (biometric security system)3.abstact (biometric security system)
3.abstact (biometric security system)JIEMS Akkalkuwa
 
2.index (biometric security system)
2.index (biometric security system)2.index (biometric security system)
2.index (biometric security system)JIEMS Akkalkuwa
 
1.front page (biometric security system)
1.front page (biometric security system)1.front page (biometric security system)
1.front page (biometric security system)JIEMS Akkalkuwa
 
3.abstract (stenography)
3.abstract (stenography)3.abstract (stenography)
3.abstract (stenography)JIEMS Akkalkuwa
 

More from JIEMS Akkalkuwa (20)

4.report (gi fi technology)
4.report (gi fi technology)4.report (gi fi technology)
4.report (gi fi technology)
 
3.acknowledgement (gi fi technology)
3.acknowledgement (gi fi technology)3.acknowledgement (gi fi technology)
3.acknowledgement (gi fi technology)
 
2.index (gi fi technology)
2.index (gi fi technology)2.index (gi fi technology)
2.index (gi fi technology)
 
1.frontpage (gi fi technology)
1.frontpage (gi fi technology)1.frontpage (gi fi technology)
1.frontpage (gi fi technology)
 
4 (data security in local network using)
4 (data security in local network using)4 (data security in local network using)
4 (data security in local network using)
 
3 (data security in local network using)
3 (data security in local network using)3 (data security in local network using)
3 (data security in local network using)
 
2 (data security in local network using)
2 (data security in local network using)2 (data security in local network using)
2 (data security in local network using)
 
1 (data security in local network using)
1 (data security in local network using)1 (data security in local network using)
1 (data security in local network using)
 
4.report (biometric security system)
4.report (biometric security system)4.report (biometric security system)
4.report (biometric security system)
 
3.abstact (biometric security system)
3.abstact (biometric security system)3.abstact (biometric security system)
3.abstact (biometric security system)
 
2.index (biometric security system)
2.index (biometric security system)2.index (biometric security system)
2.index (biometric security system)
 
1.front page (biometric security system)
1.front page (biometric security system)1.front page (biometric security system)
1.front page (biometric security system)
 
4 (mobile computing)
4 (mobile computing)4 (mobile computing)
4 (mobile computing)
 
3 (mobile computing)
3 (mobile computing)3 (mobile computing)
3 (mobile computing)
 
2 (mobile computing)
2 (mobile computing)2 (mobile computing)
2 (mobile computing)
 
1 (mobile computing)
1 (mobile computing)1 (mobile computing)
1 (mobile computing)
 
4.content (stenography)
4.content (stenography)4.content (stenography)
4.content (stenography)
 
3.abstract (stenography)
3.abstract (stenography)3.abstract (stenography)
3.abstract (stenography)
 
2.index (stenography)
2.index (stenography)2.index (stenography)
2.index (stenography)
 
1.front (stenography)
1.front (stenography)1.front (stenography)
1.front (stenography)
 

Recently uploaded

Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 

Recently uploaded (20)

Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 

Performance Evaluation of VEnodeb Using Virtualized Radio Resource Management

  • 1. CSEIT183718 | Received : 03 Sep 2018 | Accepted : 18 Sep 2018 | September-October - 2018 [ 3 (7) : 115-122 ] International Journal of Scientific Research in Computer Science, Engineering and Information Technology © 2018 IJSRCSEIT | Volume 3 | Issue 7 | ISSN : 2456-3307 115 Performance Evaluation of VEnodeb Using Virtualized Radio Resource Management Afzal Ahmad1, Mohammad Asif2, Shaikh Rohan Ali3 1M.Tech (CSE), Head of Computer Department Jamia Polytechnic, Akkalkuwa, Maharashtra, India 2M.Tech (CSE) Pursuing, Lecturer Jamia Institute of Engineering & Mgmt. Studies, Akkalkuwa, Maharashtra India 3B.E. (Computer) Pursuing Jamia Institute of Engineering & Mgmt. Studies, Akkalkuwa, Maharashtra India ABSTRACT With the demand upsurge for high bandwidth services, continuous increase in the number of cellular subscriptions, adoption of Internet of Things (IoT), and marked growth in Machine to Machine (M2M) tract, there is great stress exerted on cellular network infrastructure. The present wire line and wireless networking technologies are rigid in nature and heavily hardware dependent. The embrace of SDN in traditional cellular networks has led to the implementation of vital network functions in the form of software that are deployed in virtualized environments. This approach to move crucial and hardware intensive network functions to virtual environments is collectively referred to as network function virtualization (NFV).we implement a virtualized eNodeB component (Radio Resource Management) to add agility to the network setup and improve performance, which we compare with a traditional resource manager. When combined with dynamic network resource allocation techniques proposed in Elastic Hando. Agnostic approach can achieve a greater reduction in capital and operational expenses through optimal use of network resources and client energy utilization to better handle these agreements under peak network load. Keywords : Internet of Things, Machine to Machine, Radio Resource Management, Network Function Virtualization, Software Defined Networks, Radio Access Networks, MIMO, eNodeB I. INTRODUCTION In the last two decades, cellular networks have revolutionized telecommunications and are responsible for connecting more people and devices than ever. The rapid advances in cellular network technologies have solved most connectivity challenges; have handled increase in the number of subscribers and large amounts of data traffic. At the end of the year 2017, the total number of mobile subscriptions reached 7.8 billion by adding almost 100 million new subscriptions in a span of three months. With the number of subscribers increasing and consumption of multimedia content, in particular video, data traffic rose by as much as 65% [1].The explosive growth in the number of cellular devices results in significant greenhouse emissions due to substantial electricity usage of which up to 90% is consumed by the network infrastructure [2]. As the adoption of virtualization technologies in addressing similar challenges in storage and computing in the information technology industry has had remarkable success, the research community is exploring cloudification of internetbased services with the goal of creating hardware independent, flexible, and efficient design of network services. The
  • 2. Volume 3, Issue 7, September-October-2018 | http:// ijsrcseit.com Afzal Ahmad et al. Int J S Res CSE & IT. 2018 September-October-2018; 3(7) : 115-122 116 cellular networks through Software Defined Networks (SDN), Network Function Virtualization (NFV), and Cloudbased Radio Access Networks (CRAN). With the increase in the adoption of Internet of things (IoT) and the addition of new users, the struggle for network resource is increasing. Cellular service providers have depended on procuring more frequency bands and efficient communication techniques such as multiple input, multiple outputs (MIMO), etc. The alone effort can’t solve the problem of increasing cellular network problem. Apart from the challenges, financial resources are invested for procuring new spectrum and operational expenses involved in upgrading specialized hardware. Figure 1.1. Energy utilization in current cellular network components The telecom towers, which include the base station alone may consume an estimated 2.5 billion liters of fossil fuel annually, leading to an approximate addition of 6.5 million metric tonnes of CO2 emissions. II. LITURATURE SURVEY The eNodeB which is the base station in the cuttingedge Long Term Evolution (LTE) cellular networking technology handles several key functions such as supporting flexible bandwidth allocation, radiorelated functions, location management, handover functionality, etc. The contributions of this topic include: Spectrum Sensing Data Collection: We capture, curate and study spectrum utilization data in the 2.4 GHz ISM band for a period of 30 days. This dataset with 5 million+ data points can be used for future research work. Analytical Model to Perform Call Admission Control: We propose a model and use proven mathematical approaches to study the state of the network based on three parameters: i. data rate the network can support, ii. a carrier's cost to service a subscriber, and iii. quality of service. Implement Virtual RRM: We implement and evaluate our proposed call admission process in a virtualized eNodeB component called Radio Resource Management (RRM) by applying SDN and NVF technologies. Performance Analysis: We study and compare total network utilization, cost of service and quality of service of our virtual eNodeB implementation against a traditional base station. Evolution of Wireless: The concept of wireless cellular telephone system was first discussed in
  • 3. Volume 3, Issue 7, September-October-2018 | http:// ijsrcseit.com Afzal Ahmad et al. Int J S Res CSE & IT. 2018 September-October-2018; 3(7) : 115-122 117 1947 by Bell Labs' D.H.Ring and W.R.Young.In 1948, these RCCs operated the first fully automated radiotelephone service, which eliminated the need for an operator in most cases. Bell system went on to build its first mobile phone technology called Mobile Telephone System (MTS). Figure 2. Evolution of Cellular Networks III. METHODOLOGY 4G Native IP networks: The 4G systems were originally envisioned by the Defence Advanced Research Projects Agency (DARPA). DARPA selected the distributed architecture and endtoend Internet Protocol (IP),In 4G systems, the circuitswitched infrastructure is abandoned and only a packetswitched network is provided, while 2.5G and 3G systems require both packet switched and circuitswitched network nodes, i.e. two infrastructures in parallel. This implies that in 4G, traditional voice calls are replaced by IP telephony One of the key technologies for 4G and beyond is the Open Wireless Architecture(OWA) which supports multiple wireless air interfaces in an open architecture platform, one of which is Software Defined Radio (SDR) that promises radio convergence. SDR: SDR offers several compelling benefits to all the stakeholders, some of which are listed below [3]: Implement common platform architecture, allowing for the introduction of new radio technologies as radio “products" in the market. Promote software reusability across radio “products", reducing development costs dramatically.
  • 4. Volume 3, Issue 7, September-October-2018 | http:// ijsrcseit.com Afzal Ahmad et al. Int J S Res CSE & IT. 2018 September-October-2018; 3(7) : 115-122 118 Figure 3.1. 4G (LTE) cellular network architecture One of the key technologies for 4G and beyond is the Open Wireless Architecture(OWA) which supports multiple wireless air interfaces in an open architecture platform, one of which is Software Defined Radio (SDR) that promises radio convergence. SDR: SDR offers several compelling benefits to all the stakeholders, some of which are listed below [3]: Implement common platform architecture, allowing for the introduction of new radio technologies as radio “products" in the market. Promote software reusability across radio “products", reducing development costs dramatically. Network Function Virtualization: Network functions virtualization (NFV) is an initiative to virtualized network services traditionally run on proprietary, dedicated hardware. With NFV, functions like routing, load balancing and firewalls are packaged as virtual machines (VMs) on commodity hardware. NFV's mission to use commodity hardware is important as it relinquishes network managers to no longer purchase and manually configure dedicated hardware devices in order to build a service chain that links specific functions in order to achieve a desired result. As NFV virtualizes network function and eliminates functionspecific hardware, network managers can add, move or change network functions at the server level in a simplified provisioning process. Figure 3.2. A simplified NFV architecture.
  • 5. CSEIT183718 | Received : 03 Sep 2018 | Accepted : 18 Sep 2018 | September-October - 2018 [ 3 (7) : 115-122 ] International Journal of Scientific Research in Computer Science, Engineering and Information Technology © 2018 IJSRCSEIT | Volume 3 | Issue 7 | ISSN : 2456-3307 115 Benefits of NFV: If a service provider's customer requests a new function, for example, NFV enables the service provider to more easily add that service in the form of a virtual machine without upgrading or buying new hardware. In addition, NFV can reduce power consumption and increase physical space, since NFV eliminates most traditional hardware appliances reducing both CAPEX and OPEX. NFV Challenges: NFV deployment has seen relatively slow progress due to a lack of standards in NFV management, automation and orchestration (MANO). MANO provides the framework for provisioning VNFs and managing NFV infrastructure. It also helps components within NFV infrastructure communicate with existing operational and billing support systems (OSS/BSS). CRAN: CRAN (CloudRAN), sometimes referred to as CentralizedRAN, is a proposed architecture for future cellular networks. CRAN is a centralized, cloud computingbased architecture for radio access networks that supports 2G, 3G, 4G and future wireless communication standards. Realtime virtualization ensures the resources in the pool can be allocated dynamically to the base station software stacks, say4G/3G/2G function modules from different vendors according to network load. Figure 4.1. Hack RF One| a low cost, open source software defined radio However, to satisfy the stringent timing requirements of wireless communications systems, the realtime performance for CRAN is in the order of 10s of microseconds, which is two orders of magnitude higher than the millisecond level “realtime" performance usually seen in a cloudcomputing environment. Research on SDN, NFV and CRAN: The distributed nature of control plane in current cellular networks is not optimal for coherently managing spectrum, radio resources, call hand_, and other essential network functions in a way to manage future network demands. SDNbased approaches present opportunities in making the process of deploying and managing cellular networks that are traditionally not turnkey. These features include seamless mobility through efficient handover procedures [4], [5], load balancing [6], [7], creation of on demand virtual access points (VAPs) [6], [8], downlink scheduling (e.g., an Open Flow switch can do a rate shaping or time division) [8], dynamic spectrum usage [8], enhanced inter cell interference coordination [8], [5], shared wireless infrastructures [9],seamless subscriber mobility and cellular networks [5], QoS and access control policies made feasible and easier [9], [10], and easy deployment of new applications [6],[7], [9]. Some of the recent initiatives in the area of network virtualization, include XBone and Tempes focusing on networking technology; UCLP, VNET, AGAVE and VIOLIN focusing on layers of virtualization; VNRMS, NetScript, Genesis and FEDERICA. IV. SIMULATIONS AND RESULTES we discuss the hardware setup, simulation process, and evaluate the simulation results. The dataset for our research was compiled using a Hack RF One, a lowcost, open source SDR spectrum analyzer who’s beta testing phase was funded by
  • 6. Volume 3, Issue 7, September-October-2018 | http:// ijsrcseit.com Afzal Ahmad et al. Int J S Res CSE & IT. 2018 September-October-2018; 3(7) : 115-122 119 DARPA. The device can be used as a USB peripheral or programmed for standalone operation, and it is capable of scanning frequencies ranging from 1 MHz to up to 6 GHz. Figure 4.2. Gqrx Application free software application that interfaces with Hack RF One SDR receiver powered by the GNU Radio SDR framework and the Qt graphical toolkit. It is free software and supports many of the SDR hardware available, including Hack RF and USRP devices. The proposed model while improves network utilization and reduces energy consumption is susceptible to violate SLAs when subjected to sudden spikes in network access requests. During times of sudden rise in user load, the model takes a reactive approach to solving the congestion problem. Figure 4.3. Network Utilization vs. Proposed RRM We evaluate our network model for two broad test scenarios: network utilization and revenue generation. In addition, we also test for how the proposed approach fares against SLA violations. The RRM by design tries to provide access and service to PS subscribers. However, when there is an unanticipated rise in demand due to a large number of subscribers’s requesting network access, the operator is compelled to drop some users violating SLAs. When the various SLAs and their corresponding QoS parameters are assigned weights, the goal of the RRM is to minimize the overall violation weight. V. FUTURE SCOPE The work presented in this thesis can be extended and several variations of network resource allocation problem can be investigated in the future. Some of the topics are proposed below.
  • 7. Volume 3, Issue 7, September-October-2018 | http:// ijsrcseit.com Afzal Ahmad et al. Int J S Res CSE & IT. 2018 September-October-2018; 3(7) : 115-122 121 One possible area for research and extension is using machine learning techniques to perform predictive analysis on the network traffic patterns. This enables RRM to actively monitor traffic patterns and proactively allocate network resources anticipating demand in order to mitigate the occurrence of SLA violations. Finally, virtual RRM can be combined with cognitive cellular networks providing opportunistic network access to the users where they are not limited to be serviced by a single carrier. This could be a great value add in the design of next- generation mobile networks. VI. CONCLUSION In here, we model and implement a virtual eNodeB component- Radio Resource Management (RRM) and analyze the efficiency that can be achieved in the Call Admission Control function of the RRM. We define various service level agreement choices for the implementation and develop a model to allocate network resources based on three key factors: available data rate, carrier cost component, and service quality. We evaluate the network efficiency that can be achieved using our model and that our setup can potentially yield up to 33% reduction in energy consumption due to the elastic nature of the proposed NFV-based eNodeB. Our model leads to an increase in network utilization of as much as 60% compared to 40% when using a traditional RRM. We study the behaviour of the proposed setup under a dynamic pricing model which may generate as much as 27% increase in carrier revenue when compared to fixed access pricing. Finally, we put forth a weighted violation penalty metric to evaluate the model's QoS performance. While our model may help increase carrier profits improves it is prone to violate user agreements during periods of sudden spike in network traffic. This can be attributed to the reactive nature of the elasticity of RRM. VII. REFERENCES [1]. Ericsson, Ericsson Mobility Report," tech. rep., Ericsson, November 2016. [2]. Center for Energy-efficient Telecommunications, The Power of Wireless Cloud,"tech. rep., Bell Labs and University of Melbourne, April 2012. [3]. W. I. Forum, What is software defined radio," wirelessinnovation.org, 2001. [4]. P. Dely, A. Kassler, and N. Bayer, "Openflow for wireless mesh networks," in 2011 Proceedings of 20th International Conference on Computer Communications and Networks (ICCCN), pp. 1{6, July 2011}. [5]. L. E. Li, Z. M. Mao, and J. Rexford, "Toward software-defined cellular networks," in Proceedings of the 2012 European Workshop on Software Defined Networking, [6]. EWSDN '12, (Washington, DC, USA), pp. 7{12, IEEE Computer Society, 2012}. J. Schulz- Zander, L. Suresh, N. Sarrar, A. Feldmann, T. H•uhn, and R. Merz, [7]. "Programmatic orchestration of wifi networks," in Proceedings of the 2014 USENIX Conference on USENIX Annual Technical Conference, USENIX ATC'14, (Berkeley, CA, USA), pp. 347{358, USENIX Association, 2014. [8]. J. Schulz-Zander, L. Suresh, N. Sarrar, A. Feldmann, T. Huhn, and R. Merz,"Programmatic orchestration of wifi networks," in Proceedings of the 2014,USENIX Conference on USENIX Annual Technical Conference, USENIX ATC'14, (Berkeley, CA, USA), pp. 347{358, USENIX Association, 2014. [9]. Gudipati, D. Perry, L. E. Li, and S. Katti, "SoftRAN: Software defined radio access network," in Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, HotSDN '13, (New York, NY, USA),pp. 25{30, ACM, 2013.
  • 8. Volume 3, Issue 7, September-October-2018 | http:// ijsrcseit.com Afzal Ahmad et al. Int J S Res CSE & IT. 2018 September-October-2018; 3(7) : 115-122 122 [10]. J. Vestin, P. Dely, A. Kassler, N. Bayer, H. Einsiedler, and C. Peylo, "Cloudmac:Towards software defined wlans," SIGMOBILE Mob. Comput. Commun. Rev.,vol. 16, pp. 42{45, Feb. 2013}. [11]. K.-K. Yap, R. Sherwood, M. Kobayashi, T.-Y. Huang, M. Chan, N. Handigol, N. McKeown, and G. Parulkar, "Blueprint for introducing innovation into wireless mobile networks," in Proceedings of the Second ACM SIGCOMM Workshop on Virtualized Infrastructure Systems and Architectures, VISA '10, (New York,NY, USA), pp. 25{32, ACM, 2010. [12]. X. Jin, L. E. Li, L. Vanbever, and J. Rexford, "SoftCell: Scalable and flexiblecellular core network architecture," in Proceedings of the Ninth ACM Conferenceon Emerging Networking Experiments and Technologies, CoNEXT '13, (NewYork, NY, USA), pp. 163{174, ACM, 2013