SlideShare a Scribd company logo
1 of 5
Download to read offline
K Sravan Abhilash Int. Journal of Engineering Research and Applications www.ijera.com 
ISSN : 2248-9622, Vol. 4, Issue 8( Version 5), August 2014, pp.75-79 
www.ijera.com 75 | P a g e 
A Case Study on Ip Based Cdma Ran by Controlling Router K Sravan Abhilash, Asst Professor Department of ECE, Dadi institute of Engineering & Technology Abstract 
As communication plays an important role in day to day life, the effective and efficient data transmission is to be maintained. This paper mainly deals with implements a congestion control mechanism using Router control method for IP-RAN on CDMA cellular network. The Router control mechanism uses the features of CDMA networks using active Queue Management technique to reduce delay and to minimize the correlated losses. When utilizing these new personal tools and services to enrich our lives, while being mobile, we are using Mobile Multimedia applications. As new handsets, new technologies and new business models are introduced on the marketplace, new attractive multimedia services can and will be launched, fulfilling the demands. Because the number of multimedia services and even more so, the context in which the services are used is numerous, the following model is introduced in order to simplify and clarify how different services will evolve, enrich our lives and fulfill our desires.The proposed paper work is to be realized using Matlab platform. Keywords: REDAQM, CDMA, IP-RAN, Matlab. 
I. Introduction 
A typical communication system will input data, perform some form of processing and frequency translation, transmit the data, and perform the converse operations at the receiver. Wireless communication is the transfer of data from one place to another through electromagnetic waves. It is a mode of communication that uses free space instead of wires[1]. Hence the data travels in the air as same as light does. Wireless communication mostly related to radio, microwave and infrared waves. Cellular wireless Network has become an indispensable part of communication infrastructure. CDMA is an important air interface technologies for cellular wireless networks. Traditionally in these wireless access networks, the base station are connected to radio network controller or base station controller by Point to Point links. These Links are expensive and their use imposes and ongoing cost on the service providers. In such networks, reliability comes at a high price. As CDMA-based cellular networks mature, the current point-to-point links will evolve to an IP-based Radio Access Network (RAN). While the use of RAN has many advantages, mechanisms must be designed to control the IP Radio Access Network congestion. Congestion occurs when the offered traffic exceeds the engineered IP RAN capacity. 
II. Problem Statement 
The present wireless communication system is moving towards the IP enabled network, where the cellular services are integrated with IP network for the transmission of data. Such networks are generally termed as IP-RAN network[7]. In this network the Transmission Control Protocol (TCP) is the most widely used method to achieve elastic sharing between end-to-end IP flows[4]. At present the core network basically relies on end-system TCP to provide congestion control and sharing but this will not be acceptable in coming future because, to avoid time-out, each TCP connection requires few packets to be stored in the network, and most of that storage occurs in the router buffer which leads to congestion. Without sufficient storage in router, the time-out will give a poor performance to the end user and prevent sharing in network. Providing larger storage for large number of connections will cause too much latency. So, if latency is to be limited then the number of connections must be severely reduced. With the increase in the data access using these protocol, demands for larger bandwidth in coming future. Increasing bandwidth may not be a suitable solution as it is economically non-advisable. The decrease in the resources may lead to congestion in the network resulting to complete collapsing of the network[7]. A mechanism is hence required to overcome these problems so as to support larger data in the constraint resource to provide fair routing with least congestion. 
III. OBJECTIVE OF STUDY 
In this paper work implementation is proposed for the control of congestion in IP-RAN network to maximize network capacity while maintaining good voice quality router control mechanism is evaluated. 
The principle underlying the scheme is regulation of the IP RAN load by adjusting the impact of router control in the form of active queue 
RESEARCH ARTICLE OPEN ACCESS
K Sravan Abhilash Int. Journal of Engineering Research and Applications www.ijera.com 
ISSN : 2248-9622, Vol. 4, Issue 8( Version 1), August 2014, pp. 
www.ijera.com 76 | P a g e 
management. IP routers using a drop tail mechanism 
during congestion could produce high delays and 
bursty losses resulting in poor service quality. Use of 
active queue management at the routers reduces 
delays and loss correlation, thereby improving service 
quality during congestion. This paper objective is to 
implement a efficient congestion control mechanism 
on router using RED, Random Early detection 
method for improving the performance of IP-Based 
Radio Access Network. 
IV. CDMA THEORY 
In a code-division multiple-access (CDMA) 
communication system, a communication channel 
with a given bandwidth is accessed by all the users 
simultaneously. The different mobile users are 
distinguished at the base station receiver by the 
“unique spreading code” assigned to the users to 
modulate the transmitted signals. Hence, the CDMA 
signal transmitted by any given user consists of that 
user's data which modulates the unique spreading 
code assigned to that user, which in turn modulates a 
carrier using any well-known modulation scheme[5]. 
The frequency of this carrier is the same for all users. 
At the receiver separation is possible because each 
user spreads the modulated waveform over a wide 
bandwidth using unique spreading codes. This 
technique is used for channels, which suffer 
frequency selective fading or interference. 
Fig. 1: Code Division Multiple Access 
In wireless access networks today, the base 
stations and the radio network controllers are 
conected by point-to-point T1/E1 links. These back-haul 
links are expensive and add to operating 
costs[2]. 
One effective way to reduce these costs is to 
replace the point-to-point links with an IP-based 
Radio Access Network [3] (IP-based RAN). The 
current wireless access network architecture and an 
architecture based on IP RANs is shown below. 
Fig. 2: Wireless access network architectures 
In the data transfer form IP-RAN is done through 
the control of congestion in router and a RANDOM 
DROP ROUTER is used to better data transmission 
in average. 
Fig. 3: Random Drop Router 
V. Random Early Detection Router 
Random early Detection is one of the active 
queue management control mechanism deployed at 
gateways. The RED gateway detects incipient 
congestion by computing the average queue size 
(Jacobson, 1998). The gateway could notify 
connections of congestions either by dropping 
packets arriving at the gateway or by setting a bit in 
packet headers. When the average queue size exceeds 
a preset threshold, the gateway drops or marks each 
arriving packet with a certain probability, where the 
exact probability is a function of the average queue 
size[3]. RED gateways keep the average queue size 
low while allowing occasional burst of packets in the 
queue. Figure 4 show a network that uses RED 
gateway with a number of source and destination host 
while Table 1 shows RED gateway parameters and 
their meanings. The RED congestion control 
mechanism monitors the average queue size for each 
output queue, and using randomization, chooses 
connections to notify of the congestion Transient 
congestion is accommodated by a temporary increase 
in the queue. Longer-lived congestion is reflected by 
an increase in the computed average queue size and 
result In randomized feedback to some of the 
connections to decrease their windows[1]. The 
probability that a connection is notified of congestion 
is proportional to that connection’s share of the 
throughput through the gateway. 
5.1 Red Algorithm 
RED mechanism contains two key 
algorithms. One is used to calculate the exponentially 
weighted moving average of the queue size, so as to 
determine the burstiness that is allowed in the 
gateway queue and to detect possible congestion. The 
second algorithm is for computing the drop or 
marking probability, which determines how 
frequently the gateway drops or marks arrival 
packets[9]. This algorithm can avoid global 
synchronization by dropping or marking packets at 
fairly evenly spaced intervals. Furthermore, 
sufficiently dropping or marking packets, this 
algorithm can maintain a reasonable bound of the 
average delay, if the average queue length is under 
control.
K Sravan Abhilash Int. Journal of Engineering Research and Applications www.ijera.com 
ISSN : 2248-9622, Vol. 4, Issue 8( Version 1), August 2014, pp. 
www.ijera.com 77 | P a g e 
VI. Transmitter Module 
The basic function of the DPSK demodulator is 
illustrated below. At the receiver, a reference carrier 
is created from the input signal. This recovered 
carrier is at the same frequency as that of the original 
carrier, but without any phase changes, in the sense 
the reference carrier has a constant phase, the 
recovery scheme used is explained. The recovered 
carrier is mixed with the input modulated signal to 
retrieve the unmodulated signal. At the receiver input, 
the received DPSK signal plus noise is passed 
through a band-pass filter centered at the carrier 
frequency c f , so as to limit the noise power. 
VII. Simulation Results 
The matlab results explain you about the router 
congestion in IP-RAN mode and the transfer of data 
with help of RED algorithm. 
The below plot shows the user interface created 
for simulating the implementation. There are two 
active buttons designed for the process. Continue and 
close buttons. The continue button is linked for 
execution of implementation and close button 
terminates the application. 
Fig. 6: Graphical user interface for implemented 
system 
Fig. 7: User Interface for Buffer length and 
Threshold entry 
The above plot shows the user interface for 
entering the value of buffer length , maximum and 
minimum threshold passed to Random Early 
Detection algorithm for the evaluation of congestion. 
For the testing of implemented system buffer length 
of 25 is passed. 
Figure 8: processing user data using CDMA 
This plot shows the process bar indicating the 
computation of the user data to be processed using 
CDMA architecture. 
Figure 9: Simulation for Implemented Router Method 
This plot shows the transmission of four 
simultaneous user data processing under one router 
architecture with a buffer length of 25. Figure 
illustrates the congestion level at the buffer used the 
proposed control mechanism i.e., RED algorithm 
and the Drop Tail method. The packet dropped due to 
RED and Drop Tail method is also illustrated. 
Fig. 8: Percentage of Router Congestion for two 
methods
K Sravan Abhilash Int. Journal of Engineering Research and Applications www.ijera.com 
ISSN : 2248-9622, Vol. 4, Issue 8( Version 1), August 2014, pp. 
www.ijera.com 78 | P a g e 
Fig. 9: showing considered input image and speech samples The plot input considered for processing the implementation. Four images and speech samples read and processed for evaluation of the proposed system. The two data’s are considered so as to evaluate the performance for both audio and video compatibility. Figure 12: Input cropped image This plot shows the implementations cropped into smaller region for processing the implemented system. Input figure shown in figure 6.8 are read contained data of about 50,000 samples. Processing on such data may take large time and require high resource for supporting the process. The data are hence cropped to smaller size for faster evaluation of the implemented system. The result obtained for the cropped data is found proportional to the original image. Figure 13: Final Retrieved Data This plot shows the retrieved image and speech samples after processing the implemented system. The obtained results compared to the original data are found to be almost same. This shows an accurate system implementation with congestion avoidance algorithm for terrestrial controlling. Figure 14: Simulation for Implemented Router Method This plot shows the transmission of four simultaneous user data processing under one router architecture with a buffer length of 40. Figure illustrates the congestion level at the buffer used the proposed control mechanism i.e., RED algorithm and the Drop Tail method. The packet dropped due to RED and Drop Tail method is also illustrated. The two functional buttons analyze and close is used for the evaluation of the implemented system with the existing system. 
VIII. Conclusion 
With the advancement of communication technology need for supporting larger data communication over the constraint resource becomes a challenging task. For the present point to point access the resource available may support low bit applications such as voice data. But for larger data transmission such as audio video transmission, over
K Sravan Abhilash Int. Journal of Engineering Research and Applications www.ijera.com 
ISSN : 2248-9622, Vol. 4, Issue 8( Version 1), August 2014, pp. 
www.ijera.com 79 | P a g e 
these constraint resources the system needs to be modified. With the increase in demand for multiple services such as image and voice transmission and Internet accessing a new network called IP based Radio Access Network is evolved. This paper realizes a control mechanism for CDMA based IP network for controlling the congestion using Active Queue Congestion control method. An algorithm called Random Early Detection (RED) is implemented to control the congestion at router level. From the obtained results it is observed that the congestion level is quite efficiently will control using RED algorithm than the DROP TAIL mechanism. The throughput is seen to be improved using RED algorithm than the DROP TAIL mechanism. 
IX. Acknowledgment 
The authors thank Sri. A.Vamsidhar Professor, Department of E.C.E, DADI INSTITUTE OF ENGINEERING & TECHNOLOGY, for his valuable suggestions in completing this paper References [1] Andy Miller and Michael Gulotta,(1999) “PN Generators Using the SRL Macro”, Application Note: Virtex Series, Virtex-II Series, and Spartan-II Family, Xilinx Website [2] E.H. Dinan, B. Jabbari, "Spreading codes for direct sequence CDMA”, IEEE Communications Magazine, pp. 48-54, September 1998. [3] Marat and Bosquet, (2002)“Satellite Communications Systems”, Fourth Edition, John Wiley & Sons, Inc [4] Simon Haykin,(2000) “Communication Systems “, Fourth Edition, John Wiley & Sons, Inc [5] Timothy Pratt, Charles W. Bostian, (1989) “Satellite Communications”, John Wiley & Sons, Inc [6] B. Braden et al, ”Recommendations on queue management and congestion avoidance in the internet,” Request for Comments 2309, Network Working Group, April 1998. [7] V.GARG, wireless Network Evolution 2G to 3G,Prentice-Hall, 2001. [8] R. Vaccaro, Digital control, a state space approach, McGraw Hill, 1998.

More Related Content

What's hot

Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...
Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...
Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...Waqas Tariq
 
ROBOTIC INNER SIGNAL PROPAGATION AND RANDOM ACCESS OVER HYBRID ACCESS SCHEME
ROBOTIC INNER SIGNAL PROPAGATION AND RANDOM ACCESS OVER HYBRID ACCESS SCHEMEROBOTIC INNER SIGNAL PROPAGATION AND RANDOM ACCESS OVER HYBRID ACCESS SCHEME
ROBOTIC INNER SIGNAL PROPAGATION AND RANDOM ACCESS OVER HYBRID ACCESS SCHEMEIJCNCJournal
 
Study on Performance of Simulation Analysis on Multimedia Network
Study on Performance of Simulation Analysis on Multimedia NetworkStudy on Performance of Simulation Analysis on Multimedia Network
Study on Performance of Simulation Analysis on Multimedia NetworkIRJET Journal
 
An improved radio_resource_management_wi
An improved radio_resource_management_wiAn improved radio_resource_management_wi
An improved radio_resource_management_wiMd.Akm Sahansha
 
ISSUES IN AD HOC WIRELESS NETWORKS
ISSUES IN  AD HOC WIRELESS  NETWORKS ISSUES IN  AD HOC WIRELESS  NETWORKS
ISSUES IN AD HOC WIRELESS NETWORKS Dushhyant Kumar
 
PERFORMANCE ANALYSIS OF CARRIER AGGREGATION FOR VARIOUS MOBILE NETWORK IMPLEM...
PERFORMANCE ANALYSIS OF CARRIER AGGREGATION FOR VARIOUS MOBILE NETWORK IMPLEM...PERFORMANCE ANALYSIS OF CARRIER AGGREGATION FOR VARIOUS MOBILE NETWORK IMPLEM...
PERFORMANCE ANALYSIS OF CARRIER AGGREGATION FOR VARIOUS MOBILE NETWORK IMPLEM...ijwmn
 
Review on buffer management schemes for packet queues in wired & wireless net...
Review on buffer management schemes for packet queues in wired & wireless net...Review on buffer management schemes for packet queues in wired & wireless net...
Review on buffer management schemes for packet queues in wired & wireless net...IJERA Editor
 
A survey on congestion control mechanisms
A survey on congestion control mechanismsA survey on congestion control mechanisms
A survey on congestion control mechanismseSAT Publishing House
 
Modified PREQ in HWMP for Congestion Avoidance in Wireless Mesh Network
Modified PREQ in HWMP for Congestion Avoidance in Wireless Mesh NetworkModified PREQ in HWMP for Congestion Avoidance in Wireless Mesh Network
Modified PREQ in HWMP for Congestion Avoidance in Wireless Mesh NetworkIRJET Journal
 
Motivation and results coverage enhancment for 3GPP NR Rel.17
Motivation and results coverage enhancment for 3GPP NR Rel.17 Motivation and results coverage enhancment for 3GPP NR Rel.17
Motivation and results coverage enhancment for 3GPP NR Rel.17 Eiko Seidel
 
Control aspects in Wireless sensor networks
Control aspects in Wireless sensor networks Control aspects in Wireless sensor networks
Control aspects in Wireless sensor networks Rushin Shah
 
An approach to control inter cellular interference using load matrix in multi...
An approach to control inter cellular interference using load matrix in multi...An approach to control inter cellular interference using load matrix in multi...
An approach to control inter cellular interference using load matrix in multi...eSAT Journals
 
MULTI-CRITERIA HANDOVER DECISION FOR HETEROGENEOUS NETWORKS: CARRIER AGGREGAT...
MULTI-CRITERIA HANDOVER DECISION FOR HETEROGENEOUS NETWORKS: CARRIER AGGREGAT...MULTI-CRITERIA HANDOVER DECISION FOR HETEROGENEOUS NETWORKS: CARRIER AGGREGAT...
MULTI-CRITERIA HANDOVER DECISION FOR HETEROGENEOUS NETWORKS: CARRIER AGGREGAT...IJCNCJournal
 
Communication Asymmetry - Mobile Computing
Communication Asymmetry - Mobile ComputingCommunication Asymmetry - Mobile Computing
Communication Asymmetry - Mobile ComputingAkshay Nagpal
 

What's hot (19)

Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...
Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...
Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...
 
LTE NETWORK OPTIMIZATION FOR URBAN AREA AT TAIZ CITY
LTE NETWORK OPTIMIZATION FOR  URBAN AREA AT TAIZ CITYLTE NETWORK OPTIMIZATION FOR  URBAN AREA AT TAIZ CITY
LTE NETWORK OPTIMIZATION FOR URBAN AREA AT TAIZ CITY
 
ROBOTIC INNER SIGNAL PROPAGATION AND RANDOM ACCESS OVER HYBRID ACCESS SCHEME
ROBOTIC INNER SIGNAL PROPAGATION AND RANDOM ACCESS OVER HYBRID ACCESS SCHEMEROBOTIC INNER SIGNAL PROPAGATION AND RANDOM ACCESS OVER HYBRID ACCESS SCHEME
ROBOTIC INNER SIGNAL PROPAGATION AND RANDOM ACCESS OVER HYBRID ACCESS SCHEME
 
Study on Performance of Simulation Analysis on Multimedia Network
Study on Performance of Simulation Analysis on Multimedia NetworkStudy on Performance of Simulation Analysis on Multimedia Network
Study on Performance of Simulation Analysis on Multimedia Network
 
Unit 5
Unit 5Unit 5
Unit 5
 
An improved radio_resource_management_wi
An improved radio_resource_management_wiAn improved radio_resource_management_wi
An improved radio_resource_management_wi
 
ISSUES IN AD HOC WIRELESS NETWORKS
ISSUES IN  AD HOC WIRELESS  NETWORKS ISSUES IN  AD HOC WIRELESS  NETWORKS
ISSUES IN AD HOC WIRELESS NETWORKS
 
PERFORMANCE ANALYSIS OF CARRIER AGGREGATION FOR VARIOUS MOBILE NETWORK IMPLEM...
PERFORMANCE ANALYSIS OF CARRIER AGGREGATION FOR VARIOUS MOBILE NETWORK IMPLEM...PERFORMANCE ANALYSIS OF CARRIER AGGREGATION FOR VARIOUS MOBILE NETWORK IMPLEM...
PERFORMANCE ANALYSIS OF CARRIER AGGREGATION FOR VARIOUS MOBILE NETWORK IMPLEM...
 
Review on buffer management schemes for packet queues in wired & wireless net...
Review on buffer management schemes for packet queues in wired & wireless net...Review on buffer management schemes for packet queues in wired & wireless net...
Review on buffer management schemes for packet queues in wired & wireless net...
 
A survey on congestion control mechanisms
A survey on congestion control mechanismsA survey on congestion control mechanisms
A survey on congestion control mechanisms
 
A new algorithm to improve the sharing of bandwidth
A new algorithm to improve the sharing of bandwidthA new algorithm to improve the sharing of bandwidth
A new algorithm to improve the sharing of bandwidth
 
Modified PREQ in HWMP for Congestion Avoidance in Wireless Mesh Network
Modified PREQ in HWMP for Congestion Avoidance in Wireless Mesh NetworkModified PREQ in HWMP for Congestion Avoidance in Wireless Mesh Network
Modified PREQ in HWMP for Congestion Avoidance in Wireless Mesh Network
 
Ed36788792
Ed36788792Ed36788792
Ed36788792
 
Motivation and results coverage enhancment for 3GPP NR Rel.17
Motivation and results coverage enhancment for 3GPP NR Rel.17 Motivation and results coverage enhancment for 3GPP NR Rel.17
Motivation and results coverage enhancment for 3GPP NR Rel.17
 
Control aspects in Wireless sensor networks
Control aspects in Wireless sensor networks Control aspects in Wireless sensor networks
Control aspects in Wireless sensor networks
 
An approach to control inter cellular interference using load matrix in multi...
An approach to control inter cellular interference using load matrix in multi...An approach to control inter cellular interference using load matrix in multi...
An approach to control inter cellular interference using load matrix in multi...
 
MULTI-CRITERIA HANDOVER DECISION FOR HETEROGENEOUS NETWORKS: CARRIER AGGREGAT...
MULTI-CRITERIA HANDOVER DECISION FOR HETEROGENEOUS NETWORKS: CARRIER AGGREGAT...MULTI-CRITERIA HANDOVER DECISION FOR HETEROGENEOUS NETWORKS: CARRIER AGGREGAT...
MULTI-CRITERIA HANDOVER DECISION FOR HETEROGENEOUS NETWORKS: CARRIER AGGREGAT...
 
Communication Asymmetry - Mobile Computing
Communication Asymmetry - Mobile ComputingCommunication Asymmetry - Mobile Computing
Communication Asymmetry - Mobile Computing
 
Enhancing Power Unbiased Cooperative Media Access Control Protocol in Manets
Enhancing Power Unbiased Cooperative Media Access Control Protocol in ManetsEnhancing Power Unbiased Cooperative Media Access Control Protocol in Manets
Enhancing Power Unbiased Cooperative Media Access Control Protocol in Manets
 

Viewers also liked

Case Study For Web Portal for Controlling Pot Operations
Case Study For Web Portal for Controlling Pot OperationsCase Study For Web Portal for Controlling Pot Operations
Case Study For Web Portal for Controlling Pot OperationsMike Taylor
 
Manufacturing Day - Case Study - MacLean Engineering
Manufacturing Day - Case Study - MacLean EngineeringManufacturing Day - Case Study - MacLean Engineering
Manufacturing Day - Case Study - MacLean EngineeringLarson Software Technology
 
Case Study on Leadership Styles
Case Study on Leadership StylesCase Study on Leadership Styles
Case Study on Leadership StylesRahul's Ventures
 
Effect of Different Occlusion on Facial Expressions Recognition
Effect of Different Occlusion on Facial Expressions RecognitionEffect of Different Occlusion on Facial Expressions Recognition
Effect of Different Occlusion on Facial Expressions RecognitionIJERA Editor
 
Reliability Analysis of a 3-Machine Power Station Using State Space Approach
Reliability Analysis of a 3-Machine Power Station Using State Space ApproachReliability Analysis of a 3-Machine Power Station Using State Space Approach
Reliability Analysis of a 3-Machine Power Station Using State Space ApproachIJERA Editor
 
Complexity of pilgering in nuclear applications
Complexity of pilgering in nuclear applicationsComplexity of pilgering in nuclear applications
Complexity of pilgering in nuclear applicationsIJERA Editor
 
A Novel Hybrid Dstatcom Topology for Load Compensation with Non-Stiff Source
A Novel Hybrid Dstatcom Topology for Load Compensation with Non-Stiff SourceA Novel Hybrid Dstatcom Topology for Load Compensation with Non-Stiff Source
A Novel Hybrid Dstatcom Topology for Load Compensation with Non-Stiff SourceIJERA Editor
 
Application of probiotics in complex treatment of tuberculosis
Application of probiotics in complex treatment of tuberculosisApplication of probiotics in complex treatment of tuberculosis
Application of probiotics in complex treatment of tuberculosisIJERA Editor
 
Empirical Determination of Locations of Unstable and Blank Gsm Signal Network...
Empirical Determination of Locations of Unstable and Blank Gsm Signal Network...Empirical Determination of Locations of Unstable and Blank Gsm Signal Network...
Empirical Determination of Locations of Unstable and Blank Gsm Signal Network...IJERA Editor
 
Comparative Study on Anchorage in Reinforced Concrete Using Codes of Practice...
Comparative Study on Anchorage in Reinforced Concrete Using Codes of Practice...Comparative Study on Anchorage in Reinforced Concrete Using Codes of Practice...
Comparative Study on Anchorage in Reinforced Concrete Using Codes of Practice...IJERA Editor
 
Fighting Accident Using Eye Detection forSmartphones
Fighting Accident Using Eye Detection forSmartphonesFighting Accident Using Eye Detection forSmartphones
Fighting Accident Using Eye Detection forSmartphonesIJERA Editor
 
Approaches for Keyword Query Routing
Approaches for Keyword Query RoutingApproaches for Keyword Query Routing
Approaches for Keyword Query RoutingIJERA Editor
 
A Microcontroller Based Intrusion Detection System
A Microcontroller Based Intrusion Detection SystemA Microcontroller Based Intrusion Detection System
A Microcontroller Based Intrusion Detection SystemIJERA Editor
 
Effect of simultaneous movement of multiple particles under electric field in...
Effect of simultaneous movement of multiple particles under electric field in...Effect of simultaneous movement of multiple particles under electric field in...
Effect of simultaneous movement of multiple particles under electric field in...IJERA Editor
 
PV-solar / Wind Hybrid Energy System for GSM/CDMA Type Mobile Telephony Base ...
PV-solar / Wind Hybrid Energy System for GSM/CDMA Type Mobile Telephony Base ...PV-solar / Wind Hybrid Energy System for GSM/CDMA Type Mobile Telephony Base ...
PV-solar / Wind Hybrid Energy System for GSM/CDMA Type Mobile Telephony Base ...IJERA Editor
 
An Experimental Investigation of Performance and Emissions of LPG as Dual Fue...
An Experimental Investigation of Performance and Emissions of LPG as Dual Fue...An Experimental Investigation of Performance and Emissions of LPG as Dual Fue...
An Experimental Investigation of Performance and Emissions of LPG as Dual Fue...IJERA Editor
 

Viewers also liked (20)

Organizing and Organizational Structure
Organizing and Organizational StructureOrganizing and Organizational Structure
Organizing and Organizational Structure
 
Case Study For Web Portal for Controlling Pot Operations
Case Study For Web Portal for Controlling Pot OperationsCase Study For Web Portal for Controlling Pot Operations
Case Study For Web Portal for Controlling Pot Operations
 
Manufacturing Day - Case Study - MacLean Engineering
Manufacturing Day - Case Study - MacLean EngineeringManufacturing Day - Case Study - MacLean Engineering
Manufacturing Day - Case Study - MacLean Engineering
 
Case Study on Leadership Styles
Case Study on Leadership StylesCase Study on Leadership Styles
Case Study on Leadership Styles
 
Effect of Different Occlusion on Facial Expressions Recognition
Effect of Different Occlusion on Facial Expressions RecognitionEffect of Different Occlusion on Facial Expressions Recognition
Effect of Different Occlusion on Facial Expressions Recognition
 
A046020112
A046020112A046020112
A046020112
 
Reliability Analysis of a 3-Machine Power Station Using State Space Approach
Reliability Analysis of a 3-Machine Power Station Using State Space ApproachReliability Analysis of a 3-Machine Power Station Using State Space Approach
Reliability Analysis of a 3-Machine Power Station Using State Space Approach
 
Complexity of pilgering in nuclear applications
Complexity of pilgering in nuclear applicationsComplexity of pilgering in nuclear applications
Complexity of pilgering in nuclear applications
 
A Novel Hybrid Dstatcom Topology for Load Compensation with Non-Stiff Source
A Novel Hybrid Dstatcom Topology for Load Compensation with Non-Stiff SourceA Novel Hybrid Dstatcom Topology for Load Compensation with Non-Stiff Source
A Novel Hybrid Dstatcom Topology for Load Compensation with Non-Stiff Source
 
Application of probiotics in complex treatment of tuberculosis
Application of probiotics in complex treatment of tuberculosisApplication of probiotics in complex treatment of tuberculosis
Application of probiotics in complex treatment of tuberculosis
 
Ai04606213215
Ai04606213215Ai04606213215
Ai04606213215
 
Empirical Determination of Locations of Unstable and Blank Gsm Signal Network...
Empirical Determination of Locations of Unstable and Blank Gsm Signal Network...Empirical Determination of Locations of Unstable and Blank Gsm Signal Network...
Empirical Determination of Locations of Unstable and Blank Gsm Signal Network...
 
Comparative Study on Anchorage in Reinforced Concrete Using Codes of Practice...
Comparative Study on Anchorage in Reinforced Concrete Using Codes of Practice...Comparative Study on Anchorage in Reinforced Concrete Using Codes of Practice...
Comparative Study on Anchorage in Reinforced Concrete Using Codes of Practice...
 
Fighting Accident Using Eye Detection forSmartphones
Fighting Accident Using Eye Detection forSmartphonesFighting Accident Using Eye Detection forSmartphones
Fighting Accident Using Eye Detection forSmartphones
 
Approaches for Keyword Query Routing
Approaches for Keyword Query RoutingApproaches for Keyword Query Routing
Approaches for Keyword Query Routing
 
A Microcontroller Based Intrusion Detection System
A Microcontroller Based Intrusion Detection SystemA Microcontroller Based Intrusion Detection System
A Microcontroller Based Intrusion Detection System
 
Effect of simultaneous movement of multiple particles under electric field in...
Effect of simultaneous movement of multiple particles under electric field in...Effect of simultaneous movement of multiple particles under electric field in...
Effect of simultaneous movement of multiple particles under electric field in...
 
Ac04603170174
Ac04603170174Ac04603170174
Ac04603170174
 
PV-solar / Wind Hybrid Energy System for GSM/CDMA Type Mobile Telephony Base ...
PV-solar / Wind Hybrid Energy System for GSM/CDMA Type Mobile Telephony Base ...PV-solar / Wind Hybrid Energy System for GSM/CDMA Type Mobile Telephony Base ...
PV-solar / Wind Hybrid Energy System for GSM/CDMA Type Mobile Telephony Base ...
 
An Experimental Investigation of Performance and Emissions of LPG as Dual Fue...
An Experimental Investigation of Performance and Emissions of LPG as Dual Fue...An Experimental Investigation of Performance and Emissions of LPG as Dual Fue...
An Experimental Investigation of Performance and Emissions of LPG as Dual Fue...
 

Similar to A Case Study on Ip Based Cdma Ran by Controlling Router

rupali published paper
rupali published paperrupali published paper
rupali published paperRoopali Singh
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless NetworksEfficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless NetworksCSCJournals
 
Enhancing Performance for Orthogonal Frequency Division Multiplexing in Wirel...
Enhancing Performance for Orthogonal Frequency Division Multiplexing in Wirel...Enhancing Performance for Orthogonal Frequency Division Multiplexing in Wirel...
Enhancing Performance for Orthogonal Frequency Division Multiplexing in Wirel...IRJET Journal
 
A novel token based approach towards packet loss control
A novel token based approach towards packet loss controlA novel token based approach towards packet loss control
A novel token based approach towards packet loss controleSAT Journals
 
A novel token based approach towards packet loss
A novel token based approach towards packet lossA novel token based approach towards packet loss
A novel token based approach towards packet losseSAT Publishing House
 
ANFIS Based Temporally Ordered Routing Algorithm to Enhance the Performance i...
ANFIS Based Temporally Ordered Routing Algorithm to Enhance the Performance i...ANFIS Based Temporally Ordered Routing Algorithm to Enhance the Performance i...
ANFIS Based Temporally Ordered Routing Algorithm to Enhance the Performance i...rahulmonikasharma
 
IRJET- Review Paper on Call Admission Control with Bandwidth Reservation Sche...
IRJET- Review Paper on Call Admission Control with Bandwidth Reservation Sche...IRJET- Review Paper on Call Admission Control with Bandwidth Reservation Sche...
IRJET- Review Paper on Call Admission Control with Bandwidth Reservation Sche...IRJET Journal
 
Energy Behavior in Ad Hoc Network Minimizing the Number of Hops and Maintaini...
Energy Behavior in Ad Hoc Network Minimizing the Number of Hops and Maintaini...Energy Behavior in Ad Hoc Network Minimizing the Number of Hops and Maintaini...
Energy Behavior in Ad Hoc Network Minimizing the Number of Hops and Maintaini...CSCJournals
 
Call Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
Call Admission Control (CAC) with Load Balancing Approach for the WLAN NetworksCall Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
Call Admission Control (CAC) with Load Balancing Approach for the WLAN NetworksIJARIIT
 
A modified approach for secure routing and power aware in mobile ad hoc network
A modified approach for secure routing and power aware in mobile ad hoc networkA modified approach for secure routing and power aware in mobile ad hoc network
A modified approach for secure routing and power aware in mobile ad hoc networkDiksha Katiyar
 
Civilizing the Network Lifespan of Manets Through Cooperative Mac Protocol Me...
Civilizing the Network Lifespan of Manets Through Cooperative Mac Protocol Me...Civilizing the Network Lifespan of Manets Through Cooperative Mac Protocol Me...
Civilizing the Network Lifespan of Manets Through Cooperative Mac Protocol Me...IRJET Journal
 
Congestion Control in Wireless Sensor Networks: A survey
Congestion Control in Wireless Sensor Networks: A surveyCongestion Control in Wireless Sensor Networks: A survey
Congestion Control in Wireless Sensor Networks: A surveyIJERA Editor
 
The improvement of end to end delays in network management system using netwo...
The improvement of end to end delays in network management system using netwo...The improvement of end to end delays in network management system using netwo...
The improvement of end to end delays in network management system using netwo...IJCNCJournal
 
Comparative Analysis of Green Algorithm within Active Queue Management for Mo...
Comparative Analysis of Green Algorithm within Active Queue Management for Mo...Comparative Analysis of Green Algorithm within Active Queue Management for Mo...
Comparative Analysis of Green Algorithm within Active Queue Management for Mo...ijtsrd
 
An ecn approach to congestion control mechanisms in mobile ad hoc networks
An ecn approach to congestion control mechanisms in mobile ad hoc networksAn ecn approach to congestion control mechanisms in mobile ad hoc networks
An ecn approach to congestion control mechanisms in mobile ad hoc networksAlexander Decker
 
Improving quality of service using ofdm technique for 4 th generation network
Improving quality of service using ofdm technique for 4 th generation networkImproving quality of service using ofdm technique for 4 th generation network
Improving quality of service using ofdm technique for 4 th generation networkeSAT Journals
 
Improving quality of service using ofdm technique for 4 th generation network
Improving quality of service using ofdm technique for 4 th generation networkImproving quality of service using ofdm technique for 4 th generation network
Improving quality of service using ofdm technique for 4 th generation networkeSAT Publishing House
 
A scalable and power efficient solution for routing in mobile ad hoc network ...
A scalable and power efficient solution for routing in mobile ad hoc network ...A scalable and power efficient solution for routing in mobile ad hoc network ...
A scalable and power efficient solution for routing in mobile ad hoc network ...ijmnct
 

Similar to A Case Study on Ip Based Cdma Ran by Controlling Router (20)

rupali published paper
rupali published paperrupali published paper
rupali published paper
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless NetworksEfficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
 
Enhancing Performance for Orthogonal Frequency Division Multiplexing in Wirel...
Enhancing Performance for Orthogonal Frequency Division Multiplexing in Wirel...Enhancing Performance for Orthogonal Frequency Division Multiplexing in Wirel...
Enhancing Performance for Orthogonal Frequency Division Multiplexing in Wirel...
 
29 88-96
29 88-9629 88-96
29 88-96
 
A novel token based approach towards packet loss control
A novel token based approach towards packet loss controlA novel token based approach towards packet loss control
A novel token based approach towards packet loss control
 
A novel token based approach towards packet loss
A novel token based approach towards packet lossA novel token based approach towards packet loss
A novel token based approach towards packet loss
 
ANFIS Based Temporally Ordered Routing Algorithm to Enhance the Performance i...
ANFIS Based Temporally Ordered Routing Algorithm to Enhance the Performance i...ANFIS Based Temporally Ordered Routing Algorithm to Enhance the Performance i...
ANFIS Based Temporally Ordered Routing Algorithm to Enhance the Performance i...
 
IRJET- Review Paper on Call Admission Control with Bandwidth Reservation Sche...
IRJET- Review Paper on Call Admission Control with Bandwidth Reservation Sche...IRJET- Review Paper on Call Admission Control with Bandwidth Reservation Sche...
IRJET- Review Paper on Call Admission Control with Bandwidth Reservation Sche...
 
Energy Behavior in Ad Hoc Network Minimizing the Number of Hops and Maintaini...
Energy Behavior in Ad Hoc Network Minimizing the Number of Hops and Maintaini...Energy Behavior in Ad Hoc Network Minimizing the Number of Hops and Maintaini...
Energy Behavior in Ad Hoc Network Minimizing the Number of Hops and Maintaini...
 
Call Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
Call Admission Control (CAC) with Load Balancing Approach for the WLAN NetworksCall Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
Call Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
 
A modified approach for secure routing and power aware in mobile ad hoc network
A modified approach for secure routing and power aware in mobile ad hoc networkA modified approach for secure routing and power aware in mobile ad hoc network
A modified approach for secure routing and power aware in mobile ad hoc network
 
Civilizing the Network Lifespan of Manets Through Cooperative Mac Protocol Me...
Civilizing the Network Lifespan of Manets Through Cooperative Mac Protocol Me...Civilizing the Network Lifespan of Manets Through Cooperative Mac Protocol Me...
Civilizing the Network Lifespan of Manets Through Cooperative Mac Protocol Me...
 
Congestion Control in Wireless Sensor Networks: A survey
Congestion Control in Wireless Sensor Networks: A surveyCongestion Control in Wireless Sensor Networks: A survey
Congestion Control in Wireless Sensor Networks: A survey
 
The improvement of end to end delays in network management system using netwo...
The improvement of end to end delays in network management system using netwo...The improvement of end to end delays in network management system using netwo...
The improvement of end to end delays in network management system using netwo...
 
Comparative Analysis of Green Algorithm within Active Queue Management for Mo...
Comparative Analysis of Green Algorithm within Active Queue Management for Mo...Comparative Analysis of Green Algorithm within Active Queue Management for Mo...
Comparative Analysis of Green Algorithm within Active Queue Management for Mo...
 
An ecn approach to congestion control mechanisms in mobile ad hoc networks
An ecn approach to congestion control mechanisms in mobile ad hoc networksAn ecn approach to congestion control mechanisms in mobile ad hoc networks
An ecn approach to congestion control mechanisms in mobile ad hoc networks
 
Improving quality of service using ofdm technique for 4 th generation network
Improving quality of service using ofdm technique for 4 th generation networkImproving quality of service using ofdm technique for 4 th generation network
Improving quality of service using ofdm technique for 4 th generation network
 
Improving quality of service using ofdm technique for 4 th generation network
Improving quality of service using ofdm technique for 4 th generation networkImproving quality of service using ofdm technique for 4 th generation network
Improving quality of service using ofdm technique for 4 th generation network
 
A scalable and power efficient solution for routing in mobile ad hoc network ...
A scalable and power efficient solution for routing in mobile ad hoc network ...A scalable and power efficient solution for routing in mobile ad hoc network ...
A scalable and power efficient solution for routing in mobile ad hoc network ...
 

Recently uploaded

HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 

Recently uploaded (20)

HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 

A Case Study on Ip Based Cdma Ran by Controlling Router

  • 1. K Sravan Abhilash Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 8( Version 5), August 2014, pp.75-79 www.ijera.com 75 | P a g e A Case Study on Ip Based Cdma Ran by Controlling Router K Sravan Abhilash, Asst Professor Department of ECE, Dadi institute of Engineering & Technology Abstract As communication plays an important role in day to day life, the effective and efficient data transmission is to be maintained. This paper mainly deals with implements a congestion control mechanism using Router control method for IP-RAN on CDMA cellular network. The Router control mechanism uses the features of CDMA networks using active Queue Management technique to reduce delay and to minimize the correlated losses. When utilizing these new personal tools and services to enrich our lives, while being mobile, we are using Mobile Multimedia applications. As new handsets, new technologies and new business models are introduced on the marketplace, new attractive multimedia services can and will be launched, fulfilling the demands. Because the number of multimedia services and even more so, the context in which the services are used is numerous, the following model is introduced in order to simplify and clarify how different services will evolve, enrich our lives and fulfill our desires.The proposed paper work is to be realized using Matlab platform. Keywords: REDAQM, CDMA, IP-RAN, Matlab. I. Introduction A typical communication system will input data, perform some form of processing and frequency translation, transmit the data, and perform the converse operations at the receiver. Wireless communication is the transfer of data from one place to another through electromagnetic waves. It is a mode of communication that uses free space instead of wires[1]. Hence the data travels in the air as same as light does. Wireless communication mostly related to radio, microwave and infrared waves. Cellular wireless Network has become an indispensable part of communication infrastructure. CDMA is an important air interface technologies for cellular wireless networks. Traditionally in these wireless access networks, the base station are connected to radio network controller or base station controller by Point to Point links. These Links are expensive and their use imposes and ongoing cost on the service providers. In such networks, reliability comes at a high price. As CDMA-based cellular networks mature, the current point-to-point links will evolve to an IP-based Radio Access Network (RAN). While the use of RAN has many advantages, mechanisms must be designed to control the IP Radio Access Network congestion. Congestion occurs when the offered traffic exceeds the engineered IP RAN capacity. II. Problem Statement The present wireless communication system is moving towards the IP enabled network, where the cellular services are integrated with IP network for the transmission of data. Such networks are generally termed as IP-RAN network[7]. In this network the Transmission Control Protocol (TCP) is the most widely used method to achieve elastic sharing between end-to-end IP flows[4]. At present the core network basically relies on end-system TCP to provide congestion control and sharing but this will not be acceptable in coming future because, to avoid time-out, each TCP connection requires few packets to be stored in the network, and most of that storage occurs in the router buffer which leads to congestion. Without sufficient storage in router, the time-out will give a poor performance to the end user and prevent sharing in network. Providing larger storage for large number of connections will cause too much latency. So, if latency is to be limited then the number of connections must be severely reduced. With the increase in the data access using these protocol, demands for larger bandwidth in coming future. Increasing bandwidth may not be a suitable solution as it is economically non-advisable. The decrease in the resources may lead to congestion in the network resulting to complete collapsing of the network[7]. A mechanism is hence required to overcome these problems so as to support larger data in the constraint resource to provide fair routing with least congestion. III. OBJECTIVE OF STUDY In this paper work implementation is proposed for the control of congestion in IP-RAN network to maximize network capacity while maintaining good voice quality router control mechanism is evaluated. The principle underlying the scheme is regulation of the IP RAN load by adjusting the impact of router control in the form of active queue RESEARCH ARTICLE OPEN ACCESS
  • 2. K Sravan Abhilash Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 8( Version 1), August 2014, pp. www.ijera.com 76 | P a g e management. IP routers using a drop tail mechanism during congestion could produce high delays and bursty losses resulting in poor service quality. Use of active queue management at the routers reduces delays and loss correlation, thereby improving service quality during congestion. This paper objective is to implement a efficient congestion control mechanism on router using RED, Random Early detection method for improving the performance of IP-Based Radio Access Network. IV. CDMA THEORY In a code-division multiple-access (CDMA) communication system, a communication channel with a given bandwidth is accessed by all the users simultaneously. The different mobile users are distinguished at the base station receiver by the “unique spreading code” assigned to the users to modulate the transmitted signals. Hence, the CDMA signal transmitted by any given user consists of that user's data which modulates the unique spreading code assigned to that user, which in turn modulates a carrier using any well-known modulation scheme[5]. The frequency of this carrier is the same for all users. At the receiver separation is possible because each user spreads the modulated waveform over a wide bandwidth using unique spreading codes. This technique is used for channels, which suffer frequency selective fading or interference. Fig. 1: Code Division Multiple Access In wireless access networks today, the base stations and the radio network controllers are conected by point-to-point T1/E1 links. These back-haul links are expensive and add to operating costs[2]. One effective way to reduce these costs is to replace the point-to-point links with an IP-based Radio Access Network [3] (IP-based RAN). The current wireless access network architecture and an architecture based on IP RANs is shown below. Fig. 2: Wireless access network architectures In the data transfer form IP-RAN is done through the control of congestion in router and a RANDOM DROP ROUTER is used to better data transmission in average. Fig. 3: Random Drop Router V. Random Early Detection Router Random early Detection is one of the active queue management control mechanism deployed at gateways. The RED gateway detects incipient congestion by computing the average queue size (Jacobson, 1998). The gateway could notify connections of congestions either by dropping packets arriving at the gateway or by setting a bit in packet headers. When the average queue size exceeds a preset threshold, the gateway drops or marks each arriving packet with a certain probability, where the exact probability is a function of the average queue size[3]. RED gateways keep the average queue size low while allowing occasional burst of packets in the queue. Figure 4 show a network that uses RED gateway with a number of source and destination host while Table 1 shows RED gateway parameters and their meanings. The RED congestion control mechanism monitors the average queue size for each output queue, and using randomization, chooses connections to notify of the congestion Transient congestion is accommodated by a temporary increase in the queue. Longer-lived congestion is reflected by an increase in the computed average queue size and result In randomized feedback to some of the connections to decrease their windows[1]. The probability that a connection is notified of congestion is proportional to that connection’s share of the throughput through the gateway. 5.1 Red Algorithm RED mechanism contains two key algorithms. One is used to calculate the exponentially weighted moving average of the queue size, so as to determine the burstiness that is allowed in the gateway queue and to detect possible congestion. The second algorithm is for computing the drop or marking probability, which determines how frequently the gateway drops or marks arrival packets[9]. This algorithm can avoid global synchronization by dropping or marking packets at fairly evenly spaced intervals. Furthermore, sufficiently dropping or marking packets, this algorithm can maintain a reasonable bound of the average delay, if the average queue length is under control.
  • 3. K Sravan Abhilash Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 8( Version 1), August 2014, pp. www.ijera.com 77 | P a g e VI. Transmitter Module The basic function of the DPSK demodulator is illustrated below. At the receiver, a reference carrier is created from the input signal. This recovered carrier is at the same frequency as that of the original carrier, but without any phase changes, in the sense the reference carrier has a constant phase, the recovery scheme used is explained. The recovered carrier is mixed with the input modulated signal to retrieve the unmodulated signal. At the receiver input, the received DPSK signal plus noise is passed through a band-pass filter centered at the carrier frequency c f , so as to limit the noise power. VII. Simulation Results The matlab results explain you about the router congestion in IP-RAN mode and the transfer of data with help of RED algorithm. The below plot shows the user interface created for simulating the implementation. There are two active buttons designed for the process. Continue and close buttons. The continue button is linked for execution of implementation and close button terminates the application. Fig. 6: Graphical user interface for implemented system Fig. 7: User Interface for Buffer length and Threshold entry The above plot shows the user interface for entering the value of buffer length , maximum and minimum threshold passed to Random Early Detection algorithm for the evaluation of congestion. For the testing of implemented system buffer length of 25 is passed. Figure 8: processing user data using CDMA This plot shows the process bar indicating the computation of the user data to be processed using CDMA architecture. Figure 9: Simulation for Implemented Router Method This plot shows the transmission of four simultaneous user data processing under one router architecture with a buffer length of 25. Figure illustrates the congestion level at the buffer used the proposed control mechanism i.e., RED algorithm and the Drop Tail method. The packet dropped due to RED and Drop Tail method is also illustrated. Fig. 8: Percentage of Router Congestion for two methods
  • 4. K Sravan Abhilash Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 8( Version 1), August 2014, pp. www.ijera.com 78 | P a g e Fig. 9: showing considered input image and speech samples The plot input considered for processing the implementation. Four images and speech samples read and processed for evaluation of the proposed system. The two data’s are considered so as to evaluate the performance for both audio and video compatibility. Figure 12: Input cropped image This plot shows the implementations cropped into smaller region for processing the implemented system. Input figure shown in figure 6.8 are read contained data of about 50,000 samples. Processing on such data may take large time and require high resource for supporting the process. The data are hence cropped to smaller size for faster evaluation of the implemented system. The result obtained for the cropped data is found proportional to the original image. Figure 13: Final Retrieved Data This plot shows the retrieved image and speech samples after processing the implemented system. The obtained results compared to the original data are found to be almost same. This shows an accurate system implementation with congestion avoidance algorithm for terrestrial controlling. Figure 14: Simulation for Implemented Router Method This plot shows the transmission of four simultaneous user data processing under one router architecture with a buffer length of 40. Figure illustrates the congestion level at the buffer used the proposed control mechanism i.e., RED algorithm and the Drop Tail method. The packet dropped due to RED and Drop Tail method is also illustrated. The two functional buttons analyze and close is used for the evaluation of the implemented system with the existing system. VIII. Conclusion With the advancement of communication technology need for supporting larger data communication over the constraint resource becomes a challenging task. For the present point to point access the resource available may support low bit applications such as voice data. But for larger data transmission such as audio video transmission, over
  • 5. K Sravan Abhilash Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 8( Version 1), August 2014, pp. www.ijera.com 79 | P a g e these constraint resources the system needs to be modified. With the increase in demand for multiple services such as image and voice transmission and Internet accessing a new network called IP based Radio Access Network is evolved. This paper realizes a control mechanism for CDMA based IP network for controlling the congestion using Active Queue Congestion control method. An algorithm called Random Early Detection (RED) is implemented to control the congestion at router level. From the obtained results it is observed that the congestion level is quite efficiently will control using RED algorithm than the DROP TAIL mechanism. The throughput is seen to be improved using RED algorithm than the DROP TAIL mechanism. IX. Acknowledgment The authors thank Sri. A.Vamsidhar Professor, Department of E.C.E, DADI INSTITUTE OF ENGINEERING & TECHNOLOGY, for his valuable suggestions in completing this paper References [1] Andy Miller and Michael Gulotta,(1999) “PN Generators Using the SRL Macro”, Application Note: Virtex Series, Virtex-II Series, and Spartan-II Family, Xilinx Website [2] E.H. Dinan, B. Jabbari, "Spreading codes for direct sequence CDMA”, IEEE Communications Magazine, pp. 48-54, September 1998. [3] Marat and Bosquet, (2002)“Satellite Communications Systems”, Fourth Edition, John Wiley & Sons, Inc [4] Simon Haykin,(2000) “Communication Systems “, Fourth Edition, John Wiley & Sons, Inc [5] Timothy Pratt, Charles W. Bostian, (1989) “Satellite Communications”, John Wiley & Sons, Inc [6] B. Braden et al, ”Recommendations on queue management and congestion avoidance in the internet,” Request for Comments 2309, Network Working Group, April 1998. [7] V.GARG, wireless Network Evolution 2G to 3G,Prentice-Hall, 2001. [8] R. Vaccaro, Digital control, a state space approach, McGraw Hill, 1998.