SlideShare a Scribd company logo
1 of 10
Download to read offline
TELKOMNIKA, Vol.16, No.1, February 2018, pp. 200~209
ISSN: 1693-6930, accredited A by DIKTI, Decree No: 58/DIKTI/Kep/2013
DOI:10.12928/TELKOMNIKA.v16i1.7674  200
Received October 26, 2017; Revised December 1, 2017; Accepted January 10, 2018
Capacity Improvement and Protection of LTE Network
on Ethernet Based Technique
Fadli Sirait*, Akhmad Wahyu Dani, Triyanto Pangaribowo
Department of Electrical Engineering, Universitas Mercu Buana
Jakarta, Indonesia
*Corresponding author, e-mail: fadli.sirait@mercubuana.ac.id
Abstract
High demands for data rates in mobile communications is the reason for developing broadband
wireless access technologies. Long Term Evolution (4G LTE) networks which offer significantly higher data
rates and require suitably higher capacity backhaul networks. To prepare for the high data rates usage in
4G LTE, operators are using ethernet services in terms of backhaul connectivity. Protection packet
switching developed to anticipated network failure on ethernet based network technology. The failures in
the network include the link fails to connect to each network element, the network element fails to transfer
the data to the destination, or the quality drops below the standard. In this paper we used two ethernet
based technique, namely Ethernet over SDH and MPLS-TP with ring protection to anticipated network
failure on these techniques. Furthermore, we measured performance of network by measuring and
comparing the throughput, latency and jitter between Ethernet over SDH and MPLS-TP. We used
bandwidth capacity 240 Mbps as plant bandwidth link and worked in MIMO 2 2. The results of
measurements indicated that MPLS-TP with ring protection is the best technique to enhanced the
performance of LTE network.
Keywords: LTE, MPLS-TP, Ethernet over SDH, Protection Switching, Ring Protection
Copyright © 2018 Universitas Ahmad Dahlan. All rights reserved.
1. Introduction
The 4
th
Generation Long Term Evolution (4G LTE) is an emerging technology to
address the needs of high demand for the data rate. LTE aims to offer a minimum of 100/50
Mbps DL/UL (Downlink/Uplink, 1 sector, 20MHz spectrum) and up to 1 Gbps DL (3 sectors,
DL/UL of 300/150 Mbps per sector) per LTE Base Station (eNB) [1]. Moreover, there is a need
in terms of very high link utilization (<<100 percent) to support the improvement of customer
services such as multimedia distribution, e-Commerce, and cloud computing or gaming systems
as a part of future converged Industrial Internet of Things (IIoT) [2]. Ethernet based technique is
developing technology to support the backhaul capacity of LTE. Despite having such
advantage, there is one big issue in ethernet networks in terms of survivability focusing on
protection switching.
Aleksandra et al [3] have describe that Carrier Ethernet, one of the candidate
technologies for mobile backhaul, protects the network from users that want to flood the network
with their data and manages to keep the delay experienced by other users low. Andrei et al [4]
have analyzed the impact of backhaul packet delay (latency) on the LTE S1-U interface, which
provides user plane transport between the Core Network and the Evolved NodeBs.
Andrei et al [5] have analyzed the impact of backhaul packet loss by focusing on the LTE S1-U
interface, which provides user plane transport between the Core Network (CN) and the Evolved
NodeBs (eNBs). Yi Shi et al [6] introduced a novel wireless backhaul framework for small cell
networks by introducing a new backhauling component, which is referred to as Type-A relay in
order to capable of communicating simultaneously with two macrocells by leveraging the
downlink resource of one cell as well as the uplink resource of the other, which effectively
operates in full-duplex mode without incurring additional costs to acquire carrier resources.
Vijayalakshmy et al [7] presented the analyzing of convergence of 3G (3rd Generation), IEEE
802.16, IEEE 802.11 with an LTE backbone network for improving the network performance.
Christian et al [8] reviews the use case for MPLS-TP ring protection switching, how one of the
proposed mechanisms, namely MPLS-TP Ring Protection Switching (MRPS), can address the
TELKOMNIKA ISSN: 1693-6930 
Capacity Improvement and Protection of LTE Network on Ethernet Based … (Fadli Sirait)
201
requirements to support the packet transport reliability and some possible enhancements to the
MRPS base mechanism. Wenjun et al [9] have proposed a method of ring protection to reduce
the amount of packet loss. Jeong-dong et al [10] have discussed a linear protection switching
mechanism on a mesh-based MPLS-TP network and it is compatible to other types of network
topologies. Chang-Gyu et al [11] have presented a finding that the rapidly developing computer
networking technology, the Software Defined Networking (SDN), can be used to manage MPLS-
TP by using Transport-SDN (T-SDN) controller. Shicheng et al [12] proposed a protection
mechanism in Passive Optical Network (PON) to achieve high availability. Amra at al [13]
presented the result of practical performance benchmark analysis of the state-of-the-art
procedures for restoration and protection of Ethernet over SDH networks. Patteti et al [14]
describe that in LTE there is 100.8 Mbps for single chain, therefore in this paper, we used LTE
system with 2 2 MIMO (2T2R), then the throughput will be two times of single chain throughput.
i.e. 2 x 01.6 Mbps. Patteti et al [13] also describe that there is 25% of overhead used for
controlling and signaling. So the effective throughput will be 151.2 Mbps.
In this paper, we used Ethernet over SDH and MPLS-TP to describe performance of the
LTE network. On the other hand, there is still problem exist in these technique in terms of
network failure, therefore, to overcome this problem, we are implementing ring protection
method on Ethernet over SDH and MPLS-TP based network and then analyzing and comparing
performance of these network. There are four Quality of Service (QoS) parameters that are
tested in this paper, namely throughput utilization, jitter, latency, and recovery time. We used
these parameters to determine that the quality of these network with ring protection is not lower
than the quality of the main network.
The rest of this paper is organized as follows: Ethernet Based Networks is presented in
Section 2, in Section 3 Ring Protection on Ethernet Based Network is describe, in Section 4
Impairment Testing is described, in Section 4 the Results and Analysis are discussed, and in
Section V the Conclusion of this paper is presented.
2. Ring Protection on Ethernet Based Networks
2.1. Ring Protection on Ethernet over SDH
In Figure 1, it can be seen that the ring protection is presented as a red ring. The ring
protection is working when the main ring fails to work. The scenario in this section is the main
link between MUX-SDH-1 and MUX-SDH-3 is disabled manually (indicated with red x marks),
then the packets will travel on the ring protection network automatically. The BER Test Ethernet
is used to measure the QoS on the ring protection network. Then the main ring is enabled again
and the packets switched back to the main ring. The recovery time is the time needed for the
packets to revert back to the main ring. In this step throughput, jitter latency and recovery time
is measured.
Figure 1. Ethernet over SDH with Ring Protection Topology
X
 ISSN: 1693-6930
TELKOMNIKA Vol. 16, No. 1, February 2018: 200 – 209
202
2.2. Ring Protection on MPLS-TP
In Figure 2 it can be seen that the ring protection is presented as a red ring. The ring
protection is working when the main ring fails to work. The scenario in this section is the main
link between NE_MPLS-TP_1 and NE_MPLS-TP_2 is disabled manually (indicated with red x
marks), then the packets will travel on the ring protection network automatically. The BER Test
Ethernet is used to measure the QoS on the ring protection network. Then the main ring is
enabled again and the packets switched back to the main ring. The recovery time is the time
needed for the packets to revert back to the main ring. In this step throughput, jitter latency and
recovery time is measured.
Figure 2. MPLS-TP with Ring Protection Topology
3. Impairment Testing for LTE Networks
Impairments is affecting to traffic packets traversing the LTE networks. The cause for
these impairments are cumulative random events (e.g. busy hours, high profile events, panic
usage, localized service disruptions, dynamic routes and paths for packets, faulty or overloaded
network elements) [14]. RFC 2544 Standard testing are using to validate the Quality of Services
(QoS) in LTE networks. The RFC 2544 is a standard developed by the Internet international
standardization body, the Internet Engineering Task Force (IETF), which contains the necessary
testing methods to measure the quality of an Ethernet network. The parameters that are testing
in [16] are as shown in Tables 1, 2 and 3.
Table 1. Standard for Throughput
Category Throughput
Very Good 76% - 100 %
Good 51% - 75 %
Modearte
Bad
25% - 50 %
< 25%
Table 2. Standard for Jitter
Category Throughput
Very Good 0 ms
Good 0 – 75 ms
Modearte
Bad
76 – 125 ms
126 – 225 ms
Table 3. Standard for Latency
Category Throughput
Very Good t end to end < 150 ms
Good 150 ≤ t end to end ≤
300 ms
Modearte
Bad
t end to end > 450 ms
According to the ITU-T standard, the G 803.2, on Ethernet ring protection switching, the
standard recovery time is less than 50ms.
4. Results and Analysis
In this section, we provide the measurements results to verify the performance of
network quality for all the frame sizes measured. There are seven difference sizes of frame
length that we used during measurement process, which are 64, 128, 256, 512, 1024, 1280,
and 1518 fit to testing standard RFC 2544 [16].
TELKOMNIKA ISSN: 1693-6930 
Capacity Improvement and Protection of LTE Network on Ethernet Based … (Fadli Sirait)
203
4.1. Throughput on the Main Ring Network
Figure 3 presents the test results of throughput parameter values with different frame
length on the main ring, which could be seen that the actual link plan for throughput is 240 Mbps
for all frame sizes. The test results for Ethernet over SDH technique is varied from 224.94 Mbps
to 225.2 Mbps for all frame sizes. Whereas, the test results for MPLS-TP technique is 240 Mbps
for all frame sizes.
Figure 3. The Value of Throughput on the Main Ring for Actual Link Plan, Ethernet over SDH
and MPLS-TP
Figure 4 indicated the throughput utilization of those techniques on the main ring, where
the throughput utilization for Ethernet over SDH varied from 93.72 % to 93.83 % for all frame
sizes, whereas the throughput utilization for MPLS-TP is 100 % for all frame sizes.
Figure 4. The Value of Throughput on the Main Ring in Terms of Utilization in Percentage from
Actual Link Plan, Ethernet over SDH and MPLS-TP
From Figure 3 and Figure 4, we can see that there is gap between Ethernet over SDH
technique and actual link plan in term of throughput values, where the value of throughput from
the Ethernet over SDH technique didn’t reach the defined value that is 240 Mbps. Whereas
there is no gap between MPLS-TP technique and actual link plan.
4.2. Frame Loss on the Main Ring Network
Figure 5 shows the frame loss of Ethernet over SDH on the main ring and MPLS-TP on
the main ring with different frame length. The results showed the frame loss values of Ethernet
over SDH on the main ring varied from 14.8 Mbps to 15.08 Mbps for all frame sizes, whereas,
there is no frame loss in MPLS-TP on the main ring.
 ISSN: 1693-6930
TELKOMNIKA Vol. 16, No. 1, February 2018: 200 – 209
204
Figure 5. The Value of Frame Loss on the Main Ring Network from Actual Link Plan, Ethernet
over SDH and MPLS-TP
In Figure 6 shows the values of frame loss in percentage, where the percentage values
of frame loss in Ethernet over SDH on the main ring varied from 6.17 % to 6.28%, whereas,
there is no frame loss in MPLS-TP on the main ring. All the results showed that on the main ring
performance of MPLS-TP is better than Ethernet over SDH.
Figure 6. The Value of Frame Loss in Percentageon on the Main Ring Network from Actual Link
Plan, Ethernet over SDH and MPLS-TP
4.3. Latency on the Main Ring Network
Figure 7 illustrates the results of measurements for latency values on the main ring of
Ethernet over SDH and MPLS-TP with different frame length. Both of the results is kept below
the standard QoS that is 150ms [17]. However, the results verify that MPLS-TP has better
performance as compared to Ethernet over SDH.
Figure 7. The Latency Values of Ethernet over SDH and MPLS-TP on the Main Ring Network
TELKOMNIKA ISSN: 1693-6930 
Capacity Improvement and Protection of LTE Network on Ethernet Based … (Fadli Sirait)
205
4.4. Jitter on the Main Ring Network
Table 4 shows the result of measurements on the main ring network for both Ethernet
over SDH and MPLS-TP. The results showed that the jitter’s values for both Ethernet over SDH
and MPLS-TP is matched with defined category that us 0-75ms [17]. The values of latency
Therefore, the value of jitter for both Ethernet over SDH and MPLS-TP are available to support
LTE network.
Table 4. Jitter on the Main Ring Network
Maximum
(ms)
Current
(ms)
Average
(ms)
Estimate
(ms)
Category
0.015 0.015 0.015 0.015 0-75 ms
4.5. Throughput on the Ring Protection Network
Figure 8 presents the test results of throughput parameter values with different frame
length, which could be seen that the actual link plan for throughput is 240 Mbps for all frame
sizes. The test results for Ethernet over SDH technique is varied from 224.94 Mbps to 225.2
Mbps for all frame sizes. Whereas, the test results for MPLS-TP technique is 240 Mbps for all
frame
Figure 8. The Value of Throughput on the Protection Ring Network for Actual Link Plan,
Ethernet over SDH and MPLS-TP
Figure 8 indicated the throughput utilization of those techniques on the protection ring,
where the throughput utilization for Ethernet over SDH varied from 93.72 % to 93.83 % for all
frame sizes, whereas the throughput utilization for MPLS-TP is 100 % for all frame sizes.
 ISSN: 1693-6930
TELKOMNIKA Vol. 16, No. 1, February 2018: 200 – 209
206
Figure 8. The Value of Throughput on the Protection Ring in Terms of Utilization in Percentage
from Actual Link Plan, Ethernet over SDH and MPLS-TP
From Figure 8 and Figure 9, we can see that there is gap between Ethernet over SDH
technique and actual link plan in term of throughput values, where the value of throughput from
the Ethernet over SDH technique didn’t reach the defined value that is 240 Mbps. Whereas
there is no gap between MPLS-TP technique and actual link plan.
The results verify that MPLS-TP with ring protection has superior performance as
compared to Ethernet over SDH with ring protection when the throughput values of MPLS-TP
with ring protection meet to 240 Mbps as a defined value. However, since throughput values of
MPLS-TP with ring protection meet to defined value, there is a greatly affect to performance of
LTE network, that is no packet loss during transmission. Conversely, when the throughput
values of Ethernet over SDH with ring protection below the defined value, therefore, it affected
to reduce performance of LTE network lead to packet loss during transmission process.
4.6. Frame Loss on the Ring Protection Network
Figure 10 shows the frame loss on the ring protection network between Ethernet over
SDH and MPLS-TP with different frame length. The results showed the frame loss values of
Ethernet over SDH varied from 14.8 Mbps to 15.08 Mbps for all frame sizes, whereas, there is
no frame loss in MPLS-TP.
Figure 10. The Value of Frame Loss on the Ring Protection Network from Actual Link Plan,
Ethernet over SDH and MPLS-TP
In Figure 11 shows the values of frame loss in percentage on the ring protection
network, where the percentage values of frame loss in Ethernet over SDH varied from 6.17 % to
6.28%, whereas, there is no frame loss in MPLS-TP. All the results showed that MPLS-TP with
ring protection provide better performance then Ethernet over SDH with ring protection.
TELKOMNIKA ISSN: 1693-6930 
Capacity Improvement and Protection of LTE Network on Ethernet Based … (Fadli Sirait)
207
Figure 11. The Value of Frame Loss in Percentage from Actual Link Plan on the Ring
Protection Network between Ethernet over SDH and MPLS-TP
4.7. Latency on the Ring Protection Network
Figure 12 illustrates the results of measurements for latency values of Ethernet over
SDH with ring protection and MPLS-TP with ring protection with different frame length. Both of
the results is kept below the standard QoS that is 150ms [16]. However, the results verify that
MPLS-TP with ring protection has better performance as compared to Ethernet over SDH with
ring protection.
Figure 12. The Latency Values on the Ring Protection Network between Ethernet over SDH and
MPLS-TP
4.8. Jitter on the Ring Protection Network
Table 5 shows the result of measurements for both Ethernet over SDH and MPLS-TP.
The results showed that the jitter’s values for both Ethernet over SDH with ring protection and
MPLS-TP with ring protection is matched with defined category that us 0-75ms [16]. The values
of latency Therefore, the value of jitter for both Ethernet over SDH with ring protection and
MPLS-TP with ring protection are available to support LTE network.
Table 5. Jitter on the Ring Protection Network
Maximum
(ms)
Maximum
(ms)
Current
(ms)
Average
(ms)
Estimate
(ms)
Category
0.015 0.015 0.015 0.015 0.015 0 – 75 ms
 ISSN: 1693-6930
TELKOMNIKA Vol. 16, No. 1, February 2018: 200 – 209
208
4.9. Recovery Time
In the testing for recovery time, the data packets are routed from the main ring network
into the ring protection network due to the failure on the main ring network. Table 6 and Table 7
shows that the recovery time between Ethernet over SDH and MPLS-TP on the protection
network does not have a significant difference. Table 6 and 7 indicated that the duration to
switch back from the ring protection network to the main ring network is in accordance with the
standard ITU-T G803.2, all the values are less than 50ms. From Figure 8 to Figure 12, it can be
seen that the value of throughput, loss ratio, and jitter on the ring protection network between
Ethernet over SDH and MPLS-TP indicated that MPLS-TP has better performance compare to
Ethernet over SDH. Therefore, it can be concluded that the protection ring network is able to
maintain network performance even though the main ring network is currently unavailable.
Table 6. Recovery Time on Ethernet Over SDH
Frame Length
(Byte)
Recovery
Time (ms)
Category
64 48.097 ≤ 50 ms
128 48.320 ≤ 50 ms
256 48.590 ≤ 50 ms
512
1024
1280
1518
48.887
48.970
49.178
49.397
≤ 50 ms
≤ 50 ms
≤ 50 ms
≤ 50 ms
Table 7. Recovery Time on MPLS-TP
Frame Length
(Byte)
Recovery
Time (ms)
Category
64 48.091 ≤ 50 ms
128 48.310 ≤ 50 ms
256 48.578 ≤ 50 ms
512
1024
1280
1518
48.878
48.951
49.145
49.388
≤ 50 ms
≤ 50 ms
≤ 50 ms
≤ 50 ms
5. Conclusion
Analyzing the results, we see that throughput values of MPLS-TP with ring protection
reached 100% (240 Mbps), and throughput values of Ethernet over SDH with ring protection
varying around 93% (224.92 Mbps – 225.2 Mbps). Refer to [17] both of values are able to
support LTE network (MIMO 2 x 2) but MPLS-TP with ring protection has a better performance
than Ethernet over SDH with ring protection. The latency values of MPLS-TP with ring
protection in this paper is around 0.078ms – 0.0218ms, while the latency values of Ethernet
over SDH with ring protection is around 0.048ms – 0.1502ms, both of values are consistent with
latency standard (<150ms) [17]. From the latency values, we see that MPLS-TP with ring
protection has better performance as compared to Ethernet over SDH with ring protection.
Table 5 shows that the result of jitter measurements for both techniques are same, that is
0.015ms, this results are meet to latency standard in [17]. The last parameter that is measured
is the recovery time, which is the time needed to switch back to the main ring network, there is
no significant difference between Ethernet over SDH and MPLS-TP. The recovery time for
Ethernet over SDH is ranging from 48.097ms – 49.397ms, while recovery time for MPLS-TP is
ranging from 48.091 ms to 49.388 ms, however, it is still in accordance with the standard that
must be below 50ms. From all the testing results, we see that MPLS-TP with ring protection has
a better performance in the current assessment to satisfy LTE backhaul requirements. In terms
of link utilization, the used of MPLS-TP are meeting to the requirements of backhaul technology
that can support Industrial Internet of Things (IIoT) but need further research to improve the
overall QoS.
TELKOMNIKA ISSN: 1693-6930 
Capacity Improvement and Protection of LTE Network on Ethernet Based … (Fadli Sirait)
209
References
[1] G Kalimani Venkatesan, Kishor Kulkarni. “Wireless backhaul for LTE – requirements, challenges and
options”. in Proc. ANTS’08. 2nd International Symposium. 2008: 1-3.
[2] Ted H Szymanski. “Supporting consumer services in a deterministic industrial internet core network”.
IEEE Communications Magazine. 2016; 54: 110-117.
[3] Aleksandra Checko, Lars Ellegaard, Michael Berger. “Capacity planning for carrier ethernet LTE
backhaul networks”. in Proc. Wireless Communications and Networking Conference (WCNC). 2012:
2741-2745.
[4] Andrei Rusan, Radu Vasiu. “Assessment of packet latency on the 4G LTE S1-U interface: impact on
end-user throughput”. in Proc. Software, Telecommunications and Computer Networks (SoftCOM).
2015: 305-309
[5] Andrei Rusan, Radu Vasiu. “Emulation of backhaul packet loss on the LTE S1-U interface and impact
on end user throughput”. in Proc. Intelligent Computer Communication and Processing (ICCP). 2015:
529-536.
[6] Yi Shi, Mingchao Li, Xin Xiong, Guanglin Han, Lei Wan, Xiaodai Dong, “A Flexible Backhaul
Architecture for LTE-Advanced”. in Proc. International conference on connected vehicles and expo
(ICCVE). 2014: 1098-1105.
[7] G Vijayalakshmy, G Sivaradje. “LTE backbone for heterogeneous architectures”. in Proc.
International Conference on Circuit, Power and Computing Technologies [ICCPCT]. 2014: 1354 –
1359.
[8] Christian Addeo, Italo Busi. “Protection switching in packet transport rings”. in Proc.
Telecommunications Network Strategy and Planning Symposium (NETWORKS), XVth International.
2012: 1-6
[9] Wenjun Xie, Shanguo Huang, and Wanyi Gu. “An improved ring protection method in MPLS-TP
networks”. in Proc. Network infrastructure and digital content. 2010 2nd IEEE International
Conference. 2010: 1056-1060.
[10] Jeong-dong Ryoo, Taesik Cheung, Daniel King, Adrian Farrel, Huub van Helvoort. “MPLS-TP linear
protection for ITU-T and IETF”. IEEE Communications Magazine. 2014; 52(12): 16-21.
[11] Chang-Gyu Lim, Soo-Myung Pahk, Young-Hwa Kim. “Model of transport SDN and MPLS-TP for T-
SDN controller”. in Proc. 18th International Conference on Advanced Communication Technology
(ICACT). 2016: 522 – 526.
[12] Shicheng Zhang, Wei Ji, Xiao Li, Kangrui Huang, and Zenglu Yan. “Efficient and reliable protection
mechanism in long-reach PON”. IEEE/OSA Journal of Optical Communications and Networking.
2016; 8(1): 23 – 32.
[13] Amra Imamovic, Vlatko Lipovac. “Practial benchmark analysis of traffic protection with ethernet-over-
SDH transmission”. In Proc. Ultra Modern Telecommunications and Control Systems and Workshops
(ICUMT), 3th International Congress. 2011: 1-7.
[14] Patteti Krishna, Tipparti Anil Kumar, Kalithkar Kishan Rao. “Throughput evaluation of downlink
multiuser-MIMO OFDM-LTE System”. Int. J. Communications, Network and System Sciences. 2015;
8: 58-61.
[15] IXIA. “Predicting and managing network impairments”. White paper, rev. A. 2012.
[16] Nigel Burgess. “RFC 2544 Testing of Ethernet Services in Telecom Networks”. White Paper, Agilent
Technologies. 2004.
[17] NEC, “SDH Transmission System”. 6
th
ed, Japan. 1999.

More Related Content

What's hot

Performance evaluation of qos in
Performance evaluation of qos inPerformance evaluation of qos in
Performance evaluation of qos incaijjournal
 
Performance analysis of massive multiple input multiple output for high speed...
Performance analysis of massive multiple input multiple output for high speed...Performance analysis of massive multiple input multiple output for high speed...
Performance analysis of massive multiple input multiple output for high speed...IJECEIAES
 
An Efficient Wireless Backhaul Utilizing MIMO Transmission and IPT Forwarding
An Efficient Wireless Backhaul Utilizing MIMO Transmission and IPT ForwardingAn Efficient Wireless Backhaul Utilizing MIMO Transmission and IPT Forwarding
An Efficient Wireless Backhaul Utilizing MIMO Transmission and IPT ForwardingCSCJournals
 
Opnet based simulation and investigation of wimax network using different qo s
Opnet based simulation and investigation of wimax network using different qo sOpnet based simulation and investigation of wimax network using different qo s
Opnet based simulation and investigation of wimax network using different qo seSAT Publishing House
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
IRJET-QOS parameter analysis of UMTS networks based on Handovers and Sectoriz...
IRJET-QOS parameter analysis of UMTS networks based on Handovers and Sectoriz...IRJET-QOS parameter analysis of UMTS networks based on Handovers and Sectoriz...
IRJET-QOS parameter analysis of UMTS networks based on Handovers and Sectoriz...IRJET Journal
 
A bi scheduler algorithm for frame aggregation in ieee 802.11 n
A bi scheduler algorithm for frame aggregation in ieee 802.11 nA bi scheduler algorithm for frame aggregation in ieee 802.11 n
A bi scheduler algorithm for frame aggregation in ieee 802.11 nijwmn
 
General Model for Single and Multiple Channels WLANs with Quality of Service ...
General Model for Single and Multiple Channels WLANs with Quality of Service ...General Model for Single and Multiple Channels WLANs with Quality of Service ...
General Model for Single and Multiple Channels WLANs with Quality of Service ...ijwmn
 
Handover Behaviour of Transparent Relay in WiMAX Networks
Handover Behaviour of Transparent Relay in WiMAX NetworksHandover Behaviour of Transparent Relay in WiMAX Networks
Handover Behaviour of Transparent Relay in WiMAX NetworksIDES Editor
 
Quality of Service in bandwidth adapted hybrid UMTS/WLAN interworking network
Quality of Service in bandwidth adapted hybrid UMTS/WLAN interworking networkQuality of Service in bandwidth adapted hybrid UMTS/WLAN interworking network
Quality of Service in bandwidth adapted hybrid UMTS/WLAN interworking networkTELKOMNIKA JOURNAL
 
Implementation of Mobility and QoS Aware Energy Efficient Anycast Routing in ...
Implementation of Mobility and QoS Aware Energy Efficient Anycast Routing in ...Implementation of Mobility and QoS Aware Energy Efficient Anycast Routing in ...
Implementation of Mobility and QoS Aware Energy Efficient Anycast Routing in ...Eswar Publications
 
ON THE SUPPORT OF MULTIMEDIA APPLICATIONS OVER WIRELESS MESH NETWORKS
ON THE SUPPORT OF MULTIMEDIA APPLICATIONS  OVER WIRELESS MESH NETWORKS ON THE SUPPORT OF MULTIMEDIA APPLICATIONS  OVER WIRELESS MESH NETWORKS
ON THE SUPPORT OF MULTIMEDIA APPLICATIONS OVER WIRELESS MESH NETWORKS ijwmn
 
A Network and Position Proposal Scheme using a Link-16 based C3I System
A Network and Position Proposal Scheme using a Link-16 based C3I SystemA Network and Position Proposal Scheme using a Link-16 based C3I System
A Network and Position Proposal Scheme using a Link-16 based C3I SystemUniversity of Piraeus
 
PERFORMANCE EVALUATION OF MOBILE WIMAX IEEE 802.16E FOR HARD HANDOVER
PERFORMANCE EVALUATION OF MOBILE WIMAX IEEE 802.16E FOR HARD HANDOVERPERFORMANCE EVALUATION OF MOBILE WIMAX IEEE 802.16E FOR HARD HANDOVER
PERFORMANCE EVALUATION OF MOBILE WIMAX IEEE 802.16E FOR HARD HANDOVERIJCNCJournal
 
The improvement of end to end delays in network management system using netwo...
The improvement of end to end delays in network management system using netwo...The improvement of end to end delays in network management system using netwo...
The improvement of end to end delays in network management system using netwo...IJCNCJournal
 
Cu3210381040
Cu3210381040Cu3210381040
Cu3210381040IJMER
 
A New Model of Genetic Zone Routing Protocol (GZRP): The Process of Load Bala...
A New Model of Genetic Zone Routing Protocol (GZRP): The Process of Load Bala...A New Model of Genetic Zone Routing Protocol (GZRP): The Process of Load Bala...
A New Model of Genetic Zone Routing Protocol (GZRP): The Process of Load Bala...TELKOMNIKA JOURNAL
 

What's hot (20)

Performance evaluation of qos in
Performance evaluation of qos inPerformance evaluation of qos in
Performance evaluation of qos in
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
Performance analysis of massive multiple input multiple output for high speed...
Performance analysis of massive multiple input multiple output for high speed...Performance analysis of massive multiple input multiple output for high speed...
Performance analysis of massive multiple input multiple output for high speed...
 
An Efficient Wireless Backhaul Utilizing MIMO Transmission and IPT Forwarding
An Efficient Wireless Backhaul Utilizing MIMO Transmission and IPT ForwardingAn Efficient Wireless Backhaul Utilizing MIMO Transmission and IPT Forwarding
An Efficient Wireless Backhaul Utilizing MIMO Transmission and IPT Forwarding
 
Opnet based simulation and investigation of wimax network using different qo s
Opnet based simulation and investigation of wimax network using different qo sOpnet based simulation and investigation of wimax network using different qo s
Opnet based simulation and investigation of wimax network using different qo s
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
IRJET-QOS parameter analysis of UMTS networks based on Handovers and Sectoriz...
IRJET-QOS parameter analysis of UMTS networks based on Handovers and Sectoriz...IRJET-QOS parameter analysis of UMTS networks based on Handovers and Sectoriz...
IRJET-QOS parameter analysis of UMTS networks based on Handovers and Sectoriz...
 
A bi scheduler algorithm for frame aggregation in ieee 802.11 n
A bi scheduler algorithm for frame aggregation in ieee 802.11 nA bi scheduler algorithm for frame aggregation in ieee 802.11 n
A bi scheduler algorithm for frame aggregation in ieee 802.11 n
 
General Model for Single and Multiple Channels WLANs with Quality of Service ...
General Model for Single and Multiple Channels WLANs with Quality of Service ...General Model for Single and Multiple Channels WLANs with Quality of Service ...
General Model for Single and Multiple Channels WLANs with Quality of Service ...
 
Handover Behaviour of Transparent Relay in WiMAX Networks
Handover Behaviour of Transparent Relay in WiMAX NetworksHandover Behaviour of Transparent Relay in WiMAX Networks
Handover Behaviour of Transparent Relay in WiMAX Networks
 
Quality of Service in bandwidth adapted hybrid UMTS/WLAN interworking network
Quality of Service in bandwidth adapted hybrid UMTS/WLAN interworking networkQuality of Service in bandwidth adapted hybrid UMTS/WLAN interworking network
Quality of Service in bandwidth adapted hybrid UMTS/WLAN interworking network
 
Aq4103266271
Aq4103266271Aq4103266271
Aq4103266271
 
Implementation of Mobility and QoS Aware Energy Efficient Anycast Routing in ...
Implementation of Mobility and QoS Aware Energy Efficient Anycast Routing in ...Implementation of Mobility and QoS Aware Energy Efficient Anycast Routing in ...
Implementation of Mobility and QoS Aware Energy Efficient Anycast Routing in ...
 
ON THE SUPPORT OF MULTIMEDIA APPLICATIONS OVER WIRELESS MESH NETWORKS
ON THE SUPPORT OF MULTIMEDIA APPLICATIONS  OVER WIRELESS MESH NETWORKS ON THE SUPPORT OF MULTIMEDIA APPLICATIONS  OVER WIRELESS MESH NETWORKS
ON THE SUPPORT OF MULTIMEDIA APPLICATIONS OVER WIRELESS MESH NETWORKS
 
A Network and Position Proposal Scheme using a Link-16 based C3I System
A Network and Position Proposal Scheme using a Link-16 based C3I SystemA Network and Position Proposal Scheme using a Link-16 based C3I System
A Network and Position Proposal Scheme using a Link-16 based C3I System
 
A NETWORK DATA AND COMMUNICATION ANALYSIS BASED COMBINED APPROACH TO IMPROVE ...
A NETWORK DATA AND COMMUNICATION ANALYSIS BASED COMBINED APPROACH TO IMPROVE ...A NETWORK DATA AND COMMUNICATION ANALYSIS BASED COMBINED APPROACH TO IMPROVE ...
A NETWORK DATA AND COMMUNICATION ANALYSIS BASED COMBINED APPROACH TO IMPROVE ...
 
PERFORMANCE EVALUATION OF MOBILE WIMAX IEEE 802.16E FOR HARD HANDOVER
PERFORMANCE EVALUATION OF MOBILE WIMAX IEEE 802.16E FOR HARD HANDOVERPERFORMANCE EVALUATION OF MOBILE WIMAX IEEE 802.16E FOR HARD HANDOVER
PERFORMANCE EVALUATION OF MOBILE WIMAX IEEE 802.16E FOR HARD HANDOVER
 
The improvement of end to end delays in network management system using netwo...
The improvement of end to end delays in network management system using netwo...The improvement of end to end delays in network management system using netwo...
The improvement of end to end delays in network management system using netwo...
 
Cu3210381040
Cu3210381040Cu3210381040
Cu3210381040
 
A New Model of Genetic Zone Routing Protocol (GZRP): The Process of Load Bala...
A New Model of Genetic Zone Routing Protocol (GZRP): The Process of Load Bala...A New Model of Genetic Zone Routing Protocol (GZRP): The Process of Load Bala...
A New Model of Genetic Zone Routing Protocol (GZRP): The Process of Load Bala...
 

Similar to Capacity Improvement and Protection of LTE Network on Ethernet Based Technique

Mpls tp as packet platform for critical services in power transmission
Mpls tp as packet platform for critical services in power transmissionMpls tp as packet platform for critical services in power transmission
Mpls tp as packet platform for critical services in power transmissionHughCab
 
Mpls tp as packet platform for critical services in power transmission
Mpls tp as packet platform for critical services in power transmissionMpls tp as packet platform for critical services in power transmission
Mpls tp as packet platform for critical services in power transmissionHughCab
 
Performance improvement of bottleneck link in red vegas over heterogeneous ne...
Performance improvement of bottleneck link in red vegas over heterogeneous ne...Performance improvement of bottleneck link in red vegas over heterogeneous ne...
Performance improvement of bottleneck link in red vegas over heterogeneous ne...eSAT Journals
 
Performance improvement of bottleneck link in red vegas over heterogeneous ne...
Performance improvement of bottleneck link in red vegas over heterogeneous ne...Performance improvement of bottleneck link in red vegas over heterogeneous ne...
Performance improvement of bottleneck link in red vegas over heterogeneous ne...eSAT Publishing House
 
Duplexing mode, ARB and modulation approaches parameters affection on LTE upl...
Duplexing mode, ARB and modulation approaches parameters affection on LTE upl...Duplexing mode, ARB and modulation approaches parameters affection on LTE upl...
Duplexing mode, ARB and modulation approaches parameters affection on LTE upl...IJECEIAES
 
1 improvement of tcp congestion window over lte
1 improvement of tcp congestion window over lte1 improvement of tcp congestion window over lte
1 improvement of tcp congestion window over ltetanawan44
 
Nokia_Mission-critical_Utilities_Network_Teleprotection_Application_Note_EN
Nokia_Mission-critical_Utilities_Network_Teleprotection_Application_Note_ENNokia_Mission-critical_Utilities_Network_Teleprotection_Application_Note_EN
Nokia_Mission-critical_Utilities_Network_Teleprotection_Application_Note_ENJuan Boggiano
 
An Enhanced Algorithm for Load-based Handover Decision-making in 5G Wireless ...
An Enhanced Algorithm for Load-based Handover Decision-making in 5G Wireless ...An Enhanced Algorithm for Load-based Handover Decision-making in 5G Wireless ...
An Enhanced Algorithm for Load-based Handover Decision-making in 5G Wireless ...IRJET Journal
 
Macro with pico cells (hetnets) system behaviour using well known scheduling ...
Macro with pico cells (hetnets) system behaviour using well known scheduling ...Macro with pico cells (hetnets) system behaviour using well known scheduling ...
Macro with pico cells (hetnets) system behaviour using well known scheduling ...ijwmn
 
Survey on scheduling and radio resources allocation in lte
Survey on scheduling and radio resources allocation in lteSurvey on scheduling and radio resources allocation in lte
Survey on scheduling and radio resources allocation in lteijngnjournal
 
Analysis of data transmission in wireless lan for 802.11
Analysis of data transmission in wireless lan for 802.11Analysis of data transmission in wireless lan for 802.11
Analysis of data transmission in wireless lan for 802.11eSAT Publishing House
 
Analysis of data transmission in wireless lan for 802.11 e2 et
Analysis of data transmission in wireless lan for 802.11 e2 etAnalysis of data transmission in wireless lan for 802.11 e2 et
Analysis of data transmission in wireless lan for 802.11 e2 eteSAT Journals
 
Practical aspects of lte design and deployment
Practical aspects of lte design and deploymentPractical aspects of lte design and deployment
Practical aspects of lte design and deploymentDr. Ayman Elnashar, PhD
 
A Novel Approach for Cell Selection and Synchronization in LTE-Advanced
A Novel Approach for Cell Selection and Synchronization in LTE-AdvancedA Novel Approach for Cell Selection and Synchronization in LTE-Advanced
A Novel Approach for Cell Selection and Synchronization in LTE-AdvancedT. L. Singal
 
Lte advanced coverage enhancements
Lte advanced coverage enhancementsLte advanced coverage enhancements
Lte advanced coverage enhancementsS.c. Lu
 
Energy Behavior in Ad Hoc Network Minimizing the Number of Hops and Maintaini...
Energy Behavior in Ad Hoc Network Minimizing the Number of Hops and Maintaini...Energy Behavior in Ad Hoc Network Minimizing the Number of Hops and Maintaini...
Energy Behavior in Ad Hoc Network Minimizing the Number of Hops and Maintaini...CSCJournals
 
Cross Layer- Performance Enhancement Architecture (CL-PEA) for MANET
Cross Layer- Performance Enhancement Architecture (CL-PEA) for MANETCross Layer- Performance Enhancement Architecture (CL-PEA) for MANET
Cross Layer- Performance Enhancement Architecture (CL-PEA) for MANETijcncs
 
Traffic Engineering in Metro Ethernet
Traffic Engineering in Metro EthernetTraffic Engineering in Metro Ethernet
Traffic Engineering in Metro EthernetCSCJournals
 
PERFORMANCE EVALUATION OF LTE NETWORK USING MAXIMUM FLOW ALGORITHM
PERFORMANCE EVALUATION OF LTE NETWORK USING MAXIMUM FLOW ALGORITHMPERFORMANCE EVALUATION OF LTE NETWORK USING MAXIMUM FLOW ALGORITHM
PERFORMANCE EVALUATION OF LTE NETWORK USING MAXIMUM FLOW ALGORITHMijcsit
 

Similar to Capacity Improvement and Protection of LTE Network on Ethernet Based Technique (20)

Mpls tp as packet platform for critical services in power transmission
Mpls tp as packet platform for critical services in power transmissionMpls tp as packet platform for critical services in power transmission
Mpls tp as packet platform for critical services in power transmission
 
Mpls tp as packet platform for critical services in power transmission
Mpls tp as packet platform for critical services in power transmissionMpls tp as packet platform for critical services in power transmission
Mpls tp as packet platform for critical services in power transmission
 
Performance improvement of bottleneck link in red vegas over heterogeneous ne...
Performance improvement of bottleneck link in red vegas over heterogeneous ne...Performance improvement of bottleneck link in red vegas over heterogeneous ne...
Performance improvement of bottleneck link in red vegas over heterogeneous ne...
 
Performance improvement of bottleneck link in red vegas over heterogeneous ne...
Performance improvement of bottleneck link in red vegas over heterogeneous ne...Performance improvement of bottleneck link in red vegas over heterogeneous ne...
Performance improvement of bottleneck link in red vegas over heterogeneous ne...
 
Duplexing mode, ARB and modulation approaches parameters affection on LTE upl...
Duplexing mode, ARB and modulation approaches parameters affection on LTE upl...Duplexing mode, ARB and modulation approaches parameters affection on LTE upl...
Duplexing mode, ARB and modulation approaches parameters affection on LTE upl...
 
1 improvement of tcp congestion window over lte
1 improvement of tcp congestion window over lte1 improvement of tcp congestion window over lte
1 improvement of tcp congestion window over lte
 
Erp
ErpErp
Erp
 
Nokia_Mission-critical_Utilities_Network_Teleprotection_Application_Note_EN
Nokia_Mission-critical_Utilities_Network_Teleprotection_Application_Note_ENNokia_Mission-critical_Utilities_Network_Teleprotection_Application_Note_EN
Nokia_Mission-critical_Utilities_Network_Teleprotection_Application_Note_EN
 
An Enhanced Algorithm for Load-based Handover Decision-making in 5G Wireless ...
An Enhanced Algorithm for Load-based Handover Decision-making in 5G Wireless ...An Enhanced Algorithm for Load-based Handover Decision-making in 5G Wireless ...
An Enhanced Algorithm for Load-based Handover Decision-making in 5G Wireless ...
 
Macro with pico cells (hetnets) system behaviour using well known scheduling ...
Macro with pico cells (hetnets) system behaviour using well known scheduling ...Macro with pico cells (hetnets) system behaviour using well known scheduling ...
Macro with pico cells (hetnets) system behaviour using well known scheduling ...
 
Survey on scheduling and radio resources allocation in lte
Survey on scheduling and radio resources allocation in lteSurvey on scheduling and radio resources allocation in lte
Survey on scheduling and radio resources allocation in lte
 
Analysis of data transmission in wireless lan for 802.11
Analysis of data transmission in wireless lan for 802.11Analysis of data transmission in wireless lan for 802.11
Analysis of data transmission in wireless lan for 802.11
 
Analysis of data transmission in wireless lan for 802.11 e2 et
Analysis of data transmission in wireless lan for 802.11 e2 etAnalysis of data transmission in wireless lan for 802.11 e2 et
Analysis of data transmission in wireless lan for 802.11 e2 et
 
Practical aspects of lte design and deployment
Practical aspects of lte design and deploymentPractical aspects of lte design and deployment
Practical aspects of lte design and deployment
 
A Novel Approach for Cell Selection and Synchronization in LTE-Advanced
A Novel Approach for Cell Selection and Synchronization in LTE-AdvancedA Novel Approach for Cell Selection and Synchronization in LTE-Advanced
A Novel Approach for Cell Selection and Synchronization in LTE-Advanced
 
Lte advanced coverage enhancements
Lte advanced coverage enhancementsLte advanced coverage enhancements
Lte advanced coverage enhancements
 
Energy Behavior in Ad Hoc Network Minimizing the Number of Hops and Maintaini...
Energy Behavior in Ad Hoc Network Minimizing the Number of Hops and Maintaini...Energy Behavior in Ad Hoc Network Minimizing the Number of Hops and Maintaini...
Energy Behavior in Ad Hoc Network Minimizing the Number of Hops and Maintaini...
 
Cross Layer- Performance Enhancement Architecture (CL-PEA) for MANET
Cross Layer- Performance Enhancement Architecture (CL-PEA) for MANETCross Layer- Performance Enhancement Architecture (CL-PEA) for MANET
Cross Layer- Performance Enhancement Architecture (CL-PEA) for MANET
 
Traffic Engineering in Metro Ethernet
Traffic Engineering in Metro EthernetTraffic Engineering in Metro Ethernet
Traffic Engineering in Metro Ethernet
 
PERFORMANCE EVALUATION OF LTE NETWORK USING MAXIMUM FLOW ALGORITHM
PERFORMANCE EVALUATION OF LTE NETWORK USING MAXIMUM FLOW ALGORITHMPERFORMANCE EVALUATION OF LTE NETWORK USING MAXIMUM FLOW ALGORITHM
PERFORMANCE EVALUATION OF LTE NETWORK USING MAXIMUM FLOW ALGORITHM
 

More from TELKOMNIKA JOURNAL

Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...TELKOMNIKA JOURNAL
 
Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...TELKOMNIKA JOURNAL
 
Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...TELKOMNIKA JOURNAL
 
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...TELKOMNIKA JOURNAL
 
Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...TELKOMNIKA JOURNAL
 
Efficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaEfficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaTELKOMNIKA JOURNAL
 
Design and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireDesign and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireTELKOMNIKA JOURNAL
 
Wavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkWavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkTELKOMNIKA JOURNAL
 
A novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsA novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsTELKOMNIKA JOURNAL
 
Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...TELKOMNIKA JOURNAL
 
Brief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesBrief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesTELKOMNIKA JOURNAL
 
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...TELKOMNIKA JOURNAL
 
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemEvaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemTELKOMNIKA JOURNAL
 
Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...TELKOMNIKA JOURNAL
 
Reagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorReagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorTELKOMNIKA JOURNAL
 
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...TELKOMNIKA JOURNAL
 
A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...TELKOMNIKA JOURNAL
 
Electroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksElectroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksTELKOMNIKA JOURNAL
 
Adaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingAdaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingTELKOMNIKA JOURNAL
 
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...TELKOMNIKA JOURNAL
 

More from TELKOMNIKA JOURNAL (20)

Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...
 
Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...
 
Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...
 
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
 
Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...
 
Efficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaEfficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antenna
 
Design and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireDesign and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fire
 
Wavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkWavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio network
 
A novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsA novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bands
 
Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...
 
Brief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesBrief note on match and miss-match uncertainties
Brief note on match and miss-match uncertainties
 
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
 
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemEvaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
 
Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...
 
Reagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorReagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensor
 
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
 
A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...
 
Electroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksElectroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networks
 
Adaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingAdaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imaging
 
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
 

Recently uploaded

What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 

Recently uploaded (20)

What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 

Capacity Improvement and Protection of LTE Network on Ethernet Based Technique

  • 1. TELKOMNIKA, Vol.16, No.1, February 2018, pp. 200~209 ISSN: 1693-6930, accredited A by DIKTI, Decree No: 58/DIKTI/Kep/2013 DOI:10.12928/TELKOMNIKA.v16i1.7674  200 Received October 26, 2017; Revised December 1, 2017; Accepted January 10, 2018 Capacity Improvement and Protection of LTE Network on Ethernet Based Technique Fadli Sirait*, Akhmad Wahyu Dani, Triyanto Pangaribowo Department of Electrical Engineering, Universitas Mercu Buana Jakarta, Indonesia *Corresponding author, e-mail: fadli.sirait@mercubuana.ac.id Abstract High demands for data rates in mobile communications is the reason for developing broadband wireless access technologies. Long Term Evolution (4G LTE) networks which offer significantly higher data rates and require suitably higher capacity backhaul networks. To prepare for the high data rates usage in 4G LTE, operators are using ethernet services in terms of backhaul connectivity. Protection packet switching developed to anticipated network failure on ethernet based network technology. The failures in the network include the link fails to connect to each network element, the network element fails to transfer the data to the destination, or the quality drops below the standard. In this paper we used two ethernet based technique, namely Ethernet over SDH and MPLS-TP with ring protection to anticipated network failure on these techniques. Furthermore, we measured performance of network by measuring and comparing the throughput, latency and jitter between Ethernet over SDH and MPLS-TP. We used bandwidth capacity 240 Mbps as plant bandwidth link and worked in MIMO 2 2. The results of measurements indicated that MPLS-TP with ring protection is the best technique to enhanced the performance of LTE network. Keywords: LTE, MPLS-TP, Ethernet over SDH, Protection Switching, Ring Protection Copyright © 2018 Universitas Ahmad Dahlan. All rights reserved. 1. Introduction The 4 th Generation Long Term Evolution (4G LTE) is an emerging technology to address the needs of high demand for the data rate. LTE aims to offer a minimum of 100/50 Mbps DL/UL (Downlink/Uplink, 1 sector, 20MHz spectrum) and up to 1 Gbps DL (3 sectors, DL/UL of 300/150 Mbps per sector) per LTE Base Station (eNB) [1]. Moreover, there is a need in terms of very high link utilization (<<100 percent) to support the improvement of customer services such as multimedia distribution, e-Commerce, and cloud computing or gaming systems as a part of future converged Industrial Internet of Things (IIoT) [2]. Ethernet based technique is developing technology to support the backhaul capacity of LTE. Despite having such advantage, there is one big issue in ethernet networks in terms of survivability focusing on protection switching. Aleksandra et al [3] have describe that Carrier Ethernet, one of the candidate technologies for mobile backhaul, protects the network from users that want to flood the network with their data and manages to keep the delay experienced by other users low. Andrei et al [4] have analyzed the impact of backhaul packet delay (latency) on the LTE S1-U interface, which provides user plane transport between the Core Network and the Evolved NodeBs. Andrei et al [5] have analyzed the impact of backhaul packet loss by focusing on the LTE S1-U interface, which provides user plane transport between the Core Network (CN) and the Evolved NodeBs (eNBs). Yi Shi et al [6] introduced a novel wireless backhaul framework for small cell networks by introducing a new backhauling component, which is referred to as Type-A relay in order to capable of communicating simultaneously with two macrocells by leveraging the downlink resource of one cell as well as the uplink resource of the other, which effectively operates in full-duplex mode without incurring additional costs to acquire carrier resources. Vijayalakshmy et al [7] presented the analyzing of convergence of 3G (3rd Generation), IEEE 802.16, IEEE 802.11 with an LTE backbone network for improving the network performance. Christian et al [8] reviews the use case for MPLS-TP ring protection switching, how one of the proposed mechanisms, namely MPLS-TP Ring Protection Switching (MRPS), can address the
  • 2. TELKOMNIKA ISSN: 1693-6930  Capacity Improvement and Protection of LTE Network on Ethernet Based … (Fadli Sirait) 201 requirements to support the packet transport reliability and some possible enhancements to the MRPS base mechanism. Wenjun et al [9] have proposed a method of ring protection to reduce the amount of packet loss. Jeong-dong et al [10] have discussed a linear protection switching mechanism on a mesh-based MPLS-TP network and it is compatible to other types of network topologies. Chang-Gyu et al [11] have presented a finding that the rapidly developing computer networking technology, the Software Defined Networking (SDN), can be used to manage MPLS- TP by using Transport-SDN (T-SDN) controller. Shicheng et al [12] proposed a protection mechanism in Passive Optical Network (PON) to achieve high availability. Amra at al [13] presented the result of practical performance benchmark analysis of the state-of-the-art procedures for restoration and protection of Ethernet over SDH networks. Patteti et al [14] describe that in LTE there is 100.8 Mbps for single chain, therefore in this paper, we used LTE system with 2 2 MIMO (2T2R), then the throughput will be two times of single chain throughput. i.e. 2 x 01.6 Mbps. Patteti et al [13] also describe that there is 25% of overhead used for controlling and signaling. So the effective throughput will be 151.2 Mbps. In this paper, we used Ethernet over SDH and MPLS-TP to describe performance of the LTE network. On the other hand, there is still problem exist in these technique in terms of network failure, therefore, to overcome this problem, we are implementing ring protection method on Ethernet over SDH and MPLS-TP based network and then analyzing and comparing performance of these network. There are four Quality of Service (QoS) parameters that are tested in this paper, namely throughput utilization, jitter, latency, and recovery time. We used these parameters to determine that the quality of these network with ring protection is not lower than the quality of the main network. The rest of this paper is organized as follows: Ethernet Based Networks is presented in Section 2, in Section 3 Ring Protection on Ethernet Based Network is describe, in Section 4 Impairment Testing is described, in Section 4 the Results and Analysis are discussed, and in Section V the Conclusion of this paper is presented. 2. Ring Protection on Ethernet Based Networks 2.1. Ring Protection on Ethernet over SDH In Figure 1, it can be seen that the ring protection is presented as a red ring. The ring protection is working when the main ring fails to work. The scenario in this section is the main link between MUX-SDH-1 and MUX-SDH-3 is disabled manually (indicated with red x marks), then the packets will travel on the ring protection network automatically. The BER Test Ethernet is used to measure the QoS on the ring protection network. Then the main ring is enabled again and the packets switched back to the main ring. The recovery time is the time needed for the packets to revert back to the main ring. In this step throughput, jitter latency and recovery time is measured. Figure 1. Ethernet over SDH with Ring Protection Topology X
  • 3.  ISSN: 1693-6930 TELKOMNIKA Vol. 16, No. 1, February 2018: 200 – 209 202 2.2. Ring Protection on MPLS-TP In Figure 2 it can be seen that the ring protection is presented as a red ring. The ring protection is working when the main ring fails to work. The scenario in this section is the main link between NE_MPLS-TP_1 and NE_MPLS-TP_2 is disabled manually (indicated with red x marks), then the packets will travel on the ring protection network automatically. The BER Test Ethernet is used to measure the QoS on the ring protection network. Then the main ring is enabled again and the packets switched back to the main ring. The recovery time is the time needed for the packets to revert back to the main ring. In this step throughput, jitter latency and recovery time is measured. Figure 2. MPLS-TP with Ring Protection Topology 3. Impairment Testing for LTE Networks Impairments is affecting to traffic packets traversing the LTE networks. The cause for these impairments are cumulative random events (e.g. busy hours, high profile events, panic usage, localized service disruptions, dynamic routes and paths for packets, faulty or overloaded network elements) [14]. RFC 2544 Standard testing are using to validate the Quality of Services (QoS) in LTE networks. The RFC 2544 is a standard developed by the Internet international standardization body, the Internet Engineering Task Force (IETF), which contains the necessary testing methods to measure the quality of an Ethernet network. The parameters that are testing in [16] are as shown in Tables 1, 2 and 3. Table 1. Standard for Throughput Category Throughput Very Good 76% - 100 % Good 51% - 75 % Modearte Bad 25% - 50 % < 25% Table 2. Standard for Jitter Category Throughput Very Good 0 ms Good 0 – 75 ms Modearte Bad 76 – 125 ms 126 – 225 ms Table 3. Standard for Latency Category Throughput Very Good t end to end < 150 ms Good 150 ≤ t end to end ≤ 300 ms Modearte Bad t end to end > 450 ms According to the ITU-T standard, the G 803.2, on Ethernet ring protection switching, the standard recovery time is less than 50ms. 4. Results and Analysis In this section, we provide the measurements results to verify the performance of network quality for all the frame sizes measured. There are seven difference sizes of frame length that we used during measurement process, which are 64, 128, 256, 512, 1024, 1280, and 1518 fit to testing standard RFC 2544 [16].
  • 4. TELKOMNIKA ISSN: 1693-6930  Capacity Improvement and Protection of LTE Network on Ethernet Based … (Fadli Sirait) 203 4.1. Throughput on the Main Ring Network Figure 3 presents the test results of throughput parameter values with different frame length on the main ring, which could be seen that the actual link plan for throughput is 240 Mbps for all frame sizes. The test results for Ethernet over SDH technique is varied from 224.94 Mbps to 225.2 Mbps for all frame sizes. Whereas, the test results for MPLS-TP technique is 240 Mbps for all frame sizes. Figure 3. The Value of Throughput on the Main Ring for Actual Link Plan, Ethernet over SDH and MPLS-TP Figure 4 indicated the throughput utilization of those techniques on the main ring, where the throughput utilization for Ethernet over SDH varied from 93.72 % to 93.83 % for all frame sizes, whereas the throughput utilization for MPLS-TP is 100 % for all frame sizes. Figure 4. The Value of Throughput on the Main Ring in Terms of Utilization in Percentage from Actual Link Plan, Ethernet over SDH and MPLS-TP From Figure 3 and Figure 4, we can see that there is gap between Ethernet over SDH technique and actual link plan in term of throughput values, where the value of throughput from the Ethernet over SDH technique didn’t reach the defined value that is 240 Mbps. Whereas there is no gap between MPLS-TP technique and actual link plan. 4.2. Frame Loss on the Main Ring Network Figure 5 shows the frame loss of Ethernet over SDH on the main ring and MPLS-TP on the main ring with different frame length. The results showed the frame loss values of Ethernet over SDH on the main ring varied from 14.8 Mbps to 15.08 Mbps for all frame sizes, whereas, there is no frame loss in MPLS-TP on the main ring.
  • 5.  ISSN: 1693-6930 TELKOMNIKA Vol. 16, No. 1, February 2018: 200 – 209 204 Figure 5. The Value of Frame Loss on the Main Ring Network from Actual Link Plan, Ethernet over SDH and MPLS-TP In Figure 6 shows the values of frame loss in percentage, where the percentage values of frame loss in Ethernet over SDH on the main ring varied from 6.17 % to 6.28%, whereas, there is no frame loss in MPLS-TP on the main ring. All the results showed that on the main ring performance of MPLS-TP is better than Ethernet over SDH. Figure 6. The Value of Frame Loss in Percentageon on the Main Ring Network from Actual Link Plan, Ethernet over SDH and MPLS-TP 4.3. Latency on the Main Ring Network Figure 7 illustrates the results of measurements for latency values on the main ring of Ethernet over SDH and MPLS-TP with different frame length. Both of the results is kept below the standard QoS that is 150ms [17]. However, the results verify that MPLS-TP has better performance as compared to Ethernet over SDH. Figure 7. The Latency Values of Ethernet over SDH and MPLS-TP on the Main Ring Network
  • 6. TELKOMNIKA ISSN: 1693-6930  Capacity Improvement and Protection of LTE Network on Ethernet Based … (Fadli Sirait) 205 4.4. Jitter on the Main Ring Network Table 4 shows the result of measurements on the main ring network for both Ethernet over SDH and MPLS-TP. The results showed that the jitter’s values for both Ethernet over SDH and MPLS-TP is matched with defined category that us 0-75ms [17]. The values of latency Therefore, the value of jitter for both Ethernet over SDH and MPLS-TP are available to support LTE network. Table 4. Jitter on the Main Ring Network Maximum (ms) Current (ms) Average (ms) Estimate (ms) Category 0.015 0.015 0.015 0.015 0-75 ms 4.5. Throughput on the Ring Protection Network Figure 8 presents the test results of throughput parameter values with different frame length, which could be seen that the actual link plan for throughput is 240 Mbps for all frame sizes. The test results for Ethernet over SDH technique is varied from 224.94 Mbps to 225.2 Mbps for all frame sizes. Whereas, the test results for MPLS-TP technique is 240 Mbps for all frame Figure 8. The Value of Throughput on the Protection Ring Network for Actual Link Plan, Ethernet over SDH and MPLS-TP Figure 8 indicated the throughput utilization of those techniques on the protection ring, where the throughput utilization for Ethernet over SDH varied from 93.72 % to 93.83 % for all frame sizes, whereas the throughput utilization for MPLS-TP is 100 % for all frame sizes.
  • 7.  ISSN: 1693-6930 TELKOMNIKA Vol. 16, No. 1, February 2018: 200 – 209 206 Figure 8. The Value of Throughput on the Protection Ring in Terms of Utilization in Percentage from Actual Link Plan, Ethernet over SDH and MPLS-TP From Figure 8 and Figure 9, we can see that there is gap between Ethernet over SDH technique and actual link plan in term of throughput values, where the value of throughput from the Ethernet over SDH technique didn’t reach the defined value that is 240 Mbps. Whereas there is no gap between MPLS-TP technique and actual link plan. The results verify that MPLS-TP with ring protection has superior performance as compared to Ethernet over SDH with ring protection when the throughput values of MPLS-TP with ring protection meet to 240 Mbps as a defined value. However, since throughput values of MPLS-TP with ring protection meet to defined value, there is a greatly affect to performance of LTE network, that is no packet loss during transmission. Conversely, when the throughput values of Ethernet over SDH with ring protection below the defined value, therefore, it affected to reduce performance of LTE network lead to packet loss during transmission process. 4.6. Frame Loss on the Ring Protection Network Figure 10 shows the frame loss on the ring protection network between Ethernet over SDH and MPLS-TP with different frame length. The results showed the frame loss values of Ethernet over SDH varied from 14.8 Mbps to 15.08 Mbps for all frame sizes, whereas, there is no frame loss in MPLS-TP. Figure 10. The Value of Frame Loss on the Ring Protection Network from Actual Link Plan, Ethernet over SDH and MPLS-TP In Figure 11 shows the values of frame loss in percentage on the ring protection network, where the percentage values of frame loss in Ethernet over SDH varied from 6.17 % to 6.28%, whereas, there is no frame loss in MPLS-TP. All the results showed that MPLS-TP with ring protection provide better performance then Ethernet over SDH with ring protection.
  • 8. TELKOMNIKA ISSN: 1693-6930  Capacity Improvement and Protection of LTE Network on Ethernet Based … (Fadli Sirait) 207 Figure 11. The Value of Frame Loss in Percentage from Actual Link Plan on the Ring Protection Network between Ethernet over SDH and MPLS-TP 4.7. Latency on the Ring Protection Network Figure 12 illustrates the results of measurements for latency values of Ethernet over SDH with ring protection and MPLS-TP with ring protection with different frame length. Both of the results is kept below the standard QoS that is 150ms [16]. However, the results verify that MPLS-TP with ring protection has better performance as compared to Ethernet over SDH with ring protection. Figure 12. The Latency Values on the Ring Protection Network between Ethernet over SDH and MPLS-TP 4.8. Jitter on the Ring Protection Network Table 5 shows the result of measurements for both Ethernet over SDH and MPLS-TP. The results showed that the jitter’s values for both Ethernet over SDH with ring protection and MPLS-TP with ring protection is matched with defined category that us 0-75ms [16]. The values of latency Therefore, the value of jitter for both Ethernet over SDH with ring protection and MPLS-TP with ring protection are available to support LTE network. Table 5. Jitter on the Ring Protection Network Maximum (ms) Maximum (ms) Current (ms) Average (ms) Estimate (ms) Category 0.015 0.015 0.015 0.015 0.015 0 – 75 ms
  • 9.  ISSN: 1693-6930 TELKOMNIKA Vol. 16, No. 1, February 2018: 200 – 209 208 4.9. Recovery Time In the testing for recovery time, the data packets are routed from the main ring network into the ring protection network due to the failure on the main ring network. Table 6 and Table 7 shows that the recovery time between Ethernet over SDH and MPLS-TP on the protection network does not have a significant difference. Table 6 and 7 indicated that the duration to switch back from the ring protection network to the main ring network is in accordance with the standard ITU-T G803.2, all the values are less than 50ms. From Figure 8 to Figure 12, it can be seen that the value of throughput, loss ratio, and jitter on the ring protection network between Ethernet over SDH and MPLS-TP indicated that MPLS-TP has better performance compare to Ethernet over SDH. Therefore, it can be concluded that the protection ring network is able to maintain network performance even though the main ring network is currently unavailable. Table 6. Recovery Time on Ethernet Over SDH Frame Length (Byte) Recovery Time (ms) Category 64 48.097 ≤ 50 ms 128 48.320 ≤ 50 ms 256 48.590 ≤ 50 ms 512 1024 1280 1518 48.887 48.970 49.178 49.397 ≤ 50 ms ≤ 50 ms ≤ 50 ms ≤ 50 ms Table 7. Recovery Time on MPLS-TP Frame Length (Byte) Recovery Time (ms) Category 64 48.091 ≤ 50 ms 128 48.310 ≤ 50 ms 256 48.578 ≤ 50 ms 512 1024 1280 1518 48.878 48.951 49.145 49.388 ≤ 50 ms ≤ 50 ms ≤ 50 ms ≤ 50 ms 5. Conclusion Analyzing the results, we see that throughput values of MPLS-TP with ring protection reached 100% (240 Mbps), and throughput values of Ethernet over SDH with ring protection varying around 93% (224.92 Mbps – 225.2 Mbps). Refer to [17] both of values are able to support LTE network (MIMO 2 x 2) but MPLS-TP with ring protection has a better performance than Ethernet over SDH with ring protection. The latency values of MPLS-TP with ring protection in this paper is around 0.078ms – 0.0218ms, while the latency values of Ethernet over SDH with ring protection is around 0.048ms – 0.1502ms, both of values are consistent with latency standard (<150ms) [17]. From the latency values, we see that MPLS-TP with ring protection has better performance as compared to Ethernet over SDH with ring protection. Table 5 shows that the result of jitter measurements for both techniques are same, that is 0.015ms, this results are meet to latency standard in [17]. The last parameter that is measured is the recovery time, which is the time needed to switch back to the main ring network, there is no significant difference between Ethernet over SDH and MPLS-TP. The recovery time for Ethernet over SDH is ranging from 48.097ms – 49.397ms, while recovery time for MPLS-TP is ranging from 48.091 ms to 49.388 ms, however, it is still in accordance with the standard that must be below 50ms. From all the testing results, we see that MPLS-TP with ring protection has a better performance in the current assessment to satisfy LTE backhaul requirements. In terms of link utilization, the used of MPLS-TP are meeting to the requirements of backhaul technology that can support Industrial Internet of Things (IIoT) but need further research to improve the overall QoS.
  • 10. TELKOMNIKA ISSN: 1693-6930  Capacity Improvement and Protection of LTE Network on Ethernet Based … (Fadli Sirait) 209 References [1] G Kalimani Venkatesan, Kishor Kulkarni. “Wireless backhaul for LTE – requirements, challenges and options”. in Proc. ANTS’08. 2nd International Symposium. 2008: 1-3. [2] Ted H Szymanski. “Supporting consumer services in a deterministic industrial internet core network”. IEEE Communications Magazine. 2016; 54: 110-117. [3] Aleksandra Checko, Lars Ellegaard, Michael Berger. “Capacity planning for carrier ethernet LTE backhaul networks”. in Proc. Wireless Communications and Networking Conference (WCNC). 2012: 2741-2745. [4] Andrei Rusan, Radu Vasiu. “Assessment of packet latency on the 4G LTE S1-U interface: impact on end-user throughput”. in Proc. Software, Telecommunications and Computer Networks (SoftCOM). 2015: 305-309 [5] Andrei Rusan, Radu Vasiu. “Emulation of backhaul packet loss on the LTE S1-U interface and impact on end user throughput”. in Proc. Intelligent Computer Communication and Processing (ICCP). 2015: 529-536. [6] Yi Shi, Mingchao Li, Xin Xiong, Guanglin Han, Lei Wan, Xiaodai Dong, “A Flexible Backhaul Architecture for LTE-Advanced”. in Proc. International conference on connected vehicles and expo (ICCVE). 2014: 1098-1105. [7] G Vijayalakshmy, G Sivaradje. “LTE backbone for heterogeneous architectures”. in Proc. International Conference on Circuit, Power and Computing Technologies [ICCPCT]. 2014: 1354 – 1359. [8] Christian Addeo, Italo Busi. “Protection switching in packet transport rings”. in Proc. Telecommunications Network Strategy and Planning Symposium (NETWORKS), XVth International. 2012: 1-6 [9] Wenjun Xie, Shanguo Huang, and Wanyi Gu. “An improved ring protection method in MPLS-TP networks”. in Proc. Network infrastructure and digital content. 2010 2nd IEEE International Conference. 2010: 1056-1060. [10] Jeong-dong Ryoo, Taesik Cheung, Daniel King, Adrian Farrel, Huub van Helvoort. “MPLS-TP linear protection for ITU-T and IETF”. IEEE Communications Magazine. 2014; 52(12): 16-21. [11] Chang-Gyu Lim, Soo-Myung Pahk, Young-Hwa Kim. “Model of transport SDN and MPLS-TP for T- SDN controller”. in Proc. 18th International Conference on Advanced Communication Technology (ICACT). 2016: 522 – 526. [12] Shicheng Zhang, Wei Ji, Xiao Li, Kangrui Huang, and Zenglu Yan. “Efficient and reliable protection mechanism in long-reach PON”. IEEE/OSA Journal of Optical Communications and Networking. 2016; 8(1): 23 – 32. [13] Amra Imamovic, Vlatko Lipovac. “Practial benchmark analysis of traffic protection with ethernet-over- SDH transmission”. In Proc. Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), 3th International Congress. 2011: 1-7. [14] Patteti Krishna, Tipparti Anil Kumar, Kalithkar Kishan Rao. “Throughput evaluation of downlink multiuser-MIMO OFDM-LTE System”. Int. J. Communications, Network and System Sciences. 2015; 8: 58-61. [15] IXIA. “Predicting and managing network impairments”. White paper, rev. A. 2012. [16] Nigel Burgess. “RFC 2544 Testing of Ethernet Services in Telecom Networks”. White Paper, Agilent Technologies. 2004. [17] NEC, “SDH Transmission System”. 6 th ed, Japan. 1999.