SlideShare a Scribd company logo
1 of 4
Download to read offline
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 10 87 – 90
_______________________________________________________________________________________________
87
IJRITCC | October 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
Multiservice Delivery in Wireless Networks Management
K. Ravikumar
Dept: Computer Science
Tamil University,
Thanjavur-613010,India
H. Bakyasri
Dept: Computer Science
Tamil University
Thanjavur-613010, India
Email id : bakyahari@gmail.com
Abstract: A Wireless Sensor Network is a self-configuring set of connections of tiny sensor nodes communicate in the middle of themselves
using radio signals, and deployed in measure to sense, observe and identify with the physical world.WSN provide a bridge between the real
physical and virtual worlds. Allow the ability to observe the previously unobservable at a fine resolution over large spatiotemporal scales. A join
that execute different than typical behavior (drop packets, scare routing system and save their assets by not ahead the other node packets) is
identified as selfish node. The multiservice delivery between the source-destination pairs in distributed selfish wireless networks (SeWN), where
selfish relay nodes (RN) expose their selfish behaviors. Research focus evaluating the trust of a node group and excluding selfish nodes for
improving the network performance. In the network connectivity of selfish wireless networks (SeWNs) constituted by selfish nodes (SeNs).
Source transfer the multi-service delivery to destination through Relay Node (RN). At the time of transfer, the selfish relay nodes expose their
selfish behavior by doing dropping multiservice. In this environment, the network need to establish the connection between source and
destination, for that source need to find the optimal path. Concept of Node selfishness management is constructed to manage the RN’sto manage
the RN’s node-selfishness information (NSI). It includes the degree of node-selfishness (DeNS), the degree of intrinsic selfishness (DeIS) and
the degree of extrinsic selfishness (DeES). DeNs determines in terms of RN’s historical behaviors, DeIS defines in terms of its available
resources and finally DeES described by means of the employed incentive mechanism and the quality-of-service (QoS) requirements. Over the
spread node-selfishness administration, a path collection criterion is considered to select the most reliable and through path in terms of RNs’
DeISs precious by their accessible resources, and the optimal incentive are determined by the source to motivate forwarding multiservice of the
RNs in the selected path. Simulation results show that this future model effectively manages the RNs’ NSI, and the most select path selection
and the optimal incentives are determined.
Key Words: Selfish wireless networks, Relay Node, Quality of service, Multiservice Delivery, Telecommunication, End to End Service
__________________________________________________*****_________________________________________________
I. INTRODUCTION
Today’s mobile telecommunications service
providers face strong competition to deliver new revenue-
generating services to the market while decreasing related
operational costs [1]. Mobile users are getting more
demanding in their requirements for useful, personalized
application offered at a reasonable price. Future service
creation and delivery platforms as key network components
are targeted to deliver more creative services and more
quickly to a service provider’s target market [6]. They
support objectives for next-generation services, such as the
ability to tailor services quickly and adaptable to individual
customers and to provide an open platform for third-party
service development [4]. Systems integrators are carrying
together multiple SDP products of different vendors,
combining the strengths of these different products, and
ensuring to be in a standards based and open service-
oriented environment [7].
Within 3rd Generation Mobile Networks, Internet-
related concepts are being introduced more and more in the
telecommunication environment. At the same time the
industry is standardizing services and service enablers
within the Open Mobile Alliance (OMA) [5]. OMA has
defined a reference architecture called OSE that defines how
basic services can be re-used and combined to integrate into
new and advanced services. OMA’s role is to create
application level specifications for various services,
uncertain to the basic network technology [8]. The missing
part of the way to even more attractive new services is the
glue that ties network and service enablers together and
makes service creation easy and efficient. The Service
Integration Environment (SIE) described in this thesis aims
to provide an enabling technology for developing advanced
applications for fixed and mobile networks [10].
Network technologies and services have changed
through a virtuous circle of innovation. Service systems
built by network operators offer business opportunities to
third parties such as content providers, and they have
contributed to the quick launch of new services [3]. This
thesis will discuss the fundamental system to generate
service revenue for network operators, or the SDP (service
delivery platform).
Networks are now in a segment of evolution measured
by the integration of IP (Internet protocol) technologies and
the appearance of high speed mobile access technologies.
The SDPs for this new location need to be advanced in
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 10 87 – 90
_______________________________________________________________________________________________
88
IJRITCC | October 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
terms of the scope of networks and terminals they carry, the
services they offer, and the business opportunities they
provide [10]. This has led to consideration on what
architectures should be adopted. The subsequent sectors
discuss the Hitachi’s involvement with SDPs for network
operators and the hope outlook for this business [9].
SDPs for mobile network operators were first
introduced about 2000, creating a new market that has
rapidly extend to world major operators. The Japanese
market pioneered the implementation of commercialized
services by mobile network operators, with many new
services appearing in front of equality initiatives such as the
OMA (Open Mobile Alliance) [4]. These platforms provide
an open environment that supports both various services and
proven returns models. The length of with providing their
subscribers with revenue generating services such as
messaging, network operators have succeeded in providing
an open business environment for many service providers so
that they can increase as well as introduce new contented
and services capably.
The service providers with simple service systems
have been clever to offer monetized services to a large
number of customers by using the charging and arrangement
features furnished by network operators [7]. The network
operators have improved their own revenue with fees for
revenue collection for service providers and small package
communications charges. In addition, prosperous smart
contents and customers’ acknowledgement of premium
values attributable to global access are the reasons for the
quick adoption of these business models in the mobile
industry [1].
Hitachi is currently working on increasing SDPs in
order to meet with the new requirements based on its
expertise and incident in the SDP for mobile operators. User
services will grow in speed and capacity to allow seamless
use by users both of the fixed and mobile networks [3].
Since services are mounting to cover non-voice, voice,
broadcast and network have power over applications, the
junction of these services will in turn make new services.
The Hitachi Group has developed non-voice
solutions, including service control platforms for bright
home appliances, voice solutions using IP telephony and
speech synthesis/recognition, broadcast solutions like video
delivery platforms and image identification techniques, and
network control solutions like VPN (virtual private network)
control [2]. Hitachi will always work on further
enhancements that will deliver revenue-generating solutions
for network operators. These network services will be
presented to service providers such as MVNOs with open
application interfaces, and will work with various
applications on the Internet.
As broadband services cause a great deal of content
volume, the number of transactions through networks,
together with machine-to-machine communication such as
surveillance cameras will grow exponentially. As a result,
performance supplies will become an order of magnitude
higher than existing SDPs [2]. On the other hand, it is also
anticipated that the ability to look into the content of
communicating data, such as filtering and transfer functions
will need to be further superior. Therefore, protocol
processing which can be customized and is highly scalable
shall be one of the key technologies to endure future SDPs.
Under these circumstances, Hitachi has residential
and evolved a high-speed protocol engine called AWG
(active web gateway). The improvements in feat of
WAPGW (wireless application protocol gateway) that is
developed with the technology [8]. At the present stage of
development, the system is accomplished of processing
3,200 HTTP (hypertext transfer protocol) needs per second
when it is run on a single blade server [3 GHz×2 CPUs
(central processing units)].
The evolution of backbone networks will outcome
in the interconnection of various access networks.
Therefore, it is essential to have a secure validation platform
to identify service users [5]. The GBA (generic
bootstrapping architecture) standard of the 3GPP is a
hopeful technology for extending the mobile SDP’s scope of
fixed and mobile joined services. A client function of the
SIM (subscriber identity module) card in the mortal queries
the HSS (home subscriber server) or other network operator
database of key information via the BSF (bootstrap server
function) server [7]. This provides an assemblage
authentication method that is agnostic to the access network.
II. EXISTING SYSTEM
With the beginning of the ad hoc networks
paradigm, novel security exposures arise. The classical
mechanisms, namely authentication and encryption, for
assuring security in adhoc networks seem to be inefficient in
detecting incorrect forwarding attacks and denial of service
problems. The existing mechanism suggested to enables
routing protocols to detect packet dropping frauds. In fact,
the nodes in the network monitor in dependently the
behavior of each other, however, they need to collaborate to
detect intruders and identify them. This mechanism allows
only malicious packet dropping detection. It wouldn’t
envisage to discard malicious nodes and help in changing
the routing path.
A) Demerits
 The existing system only detect the malicious
packet drop but it couldn’t tried to change the
path of transmission.
 The system doesn’t analysis the deep concept
of selfish node.
 The loss of packet occur due to selfish
behavior of the malicious node.
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 10 87 – 90
_______________________________________________________________________________________________
89
IJRITCC | October 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
III. PROPOSED SYSTEM
During E2E multi-service delivery selfish relay
nodes (RN) expose their selfish behaviors, i.e., forwarding
or dropping multi-services in distributed SeWNs. In such
distributed networks, consider RNs’ available resources as
their intrinsic factors, and both the service impact factors,
i.e., the QoS requirements, and the factor of an employee
incentive mechanism. Accordingly, the grade of intrinsic
selfishness and the grade of extrinsic selfishness are defined
as the influences of the intrinsic issues and the extrinsic
issues on the node-selfishness, respectively, while the
degree of node-selfishness (DeNS) exhibits the selfish
behavior of forwarding multi-services. These DeIS, DeES
and DeNS are all the RN’s node-selfishness information
(NSI). For the E2E multi-service delivery, the source and
every RN should determine and maintain the information
about its selfish behavior in terms of its intrinsic and
extrinsic factors, and extract other RNs’ NSI. According to
those NSI, the source selects a unfailing and short path and
maintains the reliability of this selected path by adjusting the
incentives provided for exciting selfish RNs under an
employee inducement mechanism.
A) Merits
 The proposed method Improve the network
security.
 It reduces the loss of pack by selecting optimal
shortest path for multiservice delivery.
 The source should reduce the selection frequency
and maintain the reliability of the selected path.
IV. EXPERIMENTAL RESULT
A) Network Throughput
In these experiments maximum throughput.CSW
gives a result with throughput of 45%.HTM gives a result
with throughput of 65%.SM gives a result with throughput
of 50%.E2E gives a result with throughput of 75%.
B) Cost
In these experiments describe cost rate.CSW gives
a result with throughput of 50%.HTM gives a result with
throughput of 65%.SM gives a result with throughput of
70%.E2E gives a result with throughput of 40%.
C) High Performance
In these experiments describe performance.CSW
gives a result with throughput of 55%.HTM gives a result
with throughput of 40%.SM gives a result with throughput
of 65%.E2E gives a result with throughput of 85%.
V. CONCLUSION
Proposed system introduced the disseminated
framework of the node-selfishness management, where each
RN manages its Node Selfishness Information that is
Intrinsic and Extrinsic information and other nodes’ NSI and
all source node manages the RNs’ NSI in circulated SeWNs.
In this support, the RN’s models of intrinsic and extrinsic
selfishness have been residential to manage its DeIS and
DeES, and the other RNs’ NSI has been obtained in terms of
the RNs’ past behaviors and their recommended NSI. Under
this distributed framework of the node-selfishness
administration, the path selection criterion has been planned
to select the most reliable and shortest path for the multi-
service delivery. Additionally, the best possible incentives
have been adjusted by the source for maintaining the path
dependability of the E2E multi-service delivery.
0
20
40
60
80
CSW HTM SM E2E
Network Throughput
Low cost
CSW HTM SM E2E
0
20
40
60
80
100
CSW HTM SM E2E
High Performance
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 10 87 – 90
_______________________________________________________________________________________________
90
IJRITCC | October 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
VI. FUTURE WORK
Future work of the proposed system has to improve
the performance of the system, in the way of finding or
improving path selection scheme. To improve the
performances of the network include more factor to
determine the selfish node. It may alter the incentive concept
for relay node performance. But future work for this system
is not a big deal.
REFERENCES
[1] J. Li, Q. Yang, K. S. Kwak, and L. Hanzo, “The
connectivity of selfishwireless networks,” IEEE Access,
vol. 3, pp. 2814–2827, Nov. 2015.
[2] J. Li, Q. Yang, and K. S. Kwak, “Neural-network based
optimaldynamic control of delivering packets in selfish
wireless networks,” IEEE Commun. Lett., vol. 19, no. 12,
pp. 2246–2249, Dec. 2015.
[3] L. Cheng, J. Niu, J. Cao, S. K. Das, and Y. Gu, “QoS aware
geographicopportunistic routing in wireless sensor
networks,” IEEE Trans. ParallelDistrib. Syst., vol. 25, no.
7, pp. 1864–1875, Jul. 2014.
[4] L. Cheng, J. Niu, J. Cao, S. K. Das, and Y. Gu, “QoS aware
geographic opportunistic routing in wireless sensor
networks”, in IEEE, vol. 25, issue. 7, pp. 1864–1875, Jul.
2014.
[5] L. Cheng, J. Niu, J. Cao, S. K. Das, and Y. Gu, “QoS aware
geographicopportunistic routing in wireless sensor
networks,” IEEE Trans. ParallelDistrib. Syst., vol. 25, no.
7, pp. 1864–1875, Jul. 2014.
[6] D. You, C. F. Benitez-Quiroz, and A. M. Martinez, “Multi
objective optimization for model selection in kernel
methods in regression”, in IEEE, vol. 25, issue. 10, pp.
1879–1893, Oct. 2014.
[7] R. Dai, P. Wang, and I. F. Akyildiz, “Correlation-aware
QoS routing with differential coding for wireless video
sensor networks”, in IEEE, vol. 14, issue. 5, pp. 1469–
1479, Oct. 2012.
[8] Rui Dai, Pu Wang, Ian F. Akyildiz, “Correlation-
AwareQoS Routing for Wireless Video Sensor Network”,
Oct 2012.
[9] F. Bao, I. Chen, M. Chang, and J. Cho, “Hierarchical trust
management for wireless sensor networks and its
applications to trust-based routing and intrusion detection”,
in IEEE, vol. 9, issue. 2, pp. 169–183, Jun. 2012
[10] R. Dai, P. Wang, and I. F. Akyildiz, “Correlation-aware
QoS routing with differential coding for wireless video
sensor networks”, in IEEE, vol. 14, issue. 5, pp. 1469–
1479, Oct. 2012.

More Related Content

What's hot

Ch19-Software Engineering 9
Ch19-Software Engineering 9Ch19-Software Engineering 9
Ch19-Software Engineering 9Ian Sommerville
 
Rcs volte_whitepaper
Rcs volte_whitepaperRcs volte_whitepaper
Rcs volte_whitepaperMorg
 
How Telecoms Can Adjust To The Reality Of The Digital Era
How Telecoms Can Adjust To The Reality Of The Digital EraHow Telecoms Can Adjust To The Reality Of The Digital Era
How Telecoms Can Adjust To The Reality Of The Digital EraComarch
 
Rach congestion in vehicular
Rach congestion in vehicularRach congestion in vehicular
Rach congestion in vehicularijwmn
 
Comparative analysis telecommunication industry: Indonesia 2013
Comparative analysis telecommunication industry: Indonesia 2013Comparative analysis telecommunication industry: Indonesia 2013
Comparative analysis telecommunication industry: Indonesia 2013Yudianto -
 
Chinese taipei ct001 1366598053
Chinese taipei ct001 1366598053Chinese taipei ct001 1366598053
Chinese taipei ct001 1366598053Nurul Yakin
 
2 wp maximizing_network_value_with_next_generation_policy
2 wp maximizing_network_value_with_next_generation_policy2 wp maximizing_network_value_with_next_generation_policy
2 wp maximizing_network_value_with_next_generation_policyson6971
 
A XMLRPC Approach to the Management of Cloud Infrastructure
A XMLRPC Approach to the Management of Cloud InfrastructureA XMLRPC Approach to the Management of Cloud Infrastructure
A XMLRPC Approach to the Management of Cloud Infrastructureiosrjce
 
Michael ghorbanzadeh, ahmed abdelhadi practical channel-aware resource allo...
Michael ghorbanzadeh, ahmed abdelhadi   practical channel-aware resource allo...Michael ghorbanzadeh, ahmed abdelhadi   practical channel-aware resource allo...
Michael ghorbanzadeh, ahmed abdelhadi practical channel-aware resource allo...sardarBityaan
 
Price of Quality, 6th concertation meeting
Price of Quality, 6th concertation meetingPrice of Quality, 6th concertation meeting
Price of Quality, 6th concertation meetingSAIL
 
WASPAG Presentation on ICH - Final Version
WASPAG Presentation on ICH - Final VersionWASPAG Presentation on ICH - Final Version
WASPAG Presentation on ICH - Final VersionIshmael Yamson
 
Connected Africa Concept Note
Connected Africa Concept NoteConnected Africa Concept Note
Connected Africa Concept NoteAdrian Hall
 
LIGHTWEIGHT MOBILE WEB SERVICE PROVISIONING FOR THE INTERNET OF THINGS MEDIATION
LIGHTWEIGHT MOBILE WEB SERVICE PROVISIONING FOR THE INTERNET OF THINGS MEDIATIONLIGHTWEIGHT MOBILE WEB SERVICE PROVISIONING FOR THE INTERNET OF THINGS MEDIATION
LIGHTWEIGHT MOBILE WEB SERVICE PROVISIONING FOR THE INTERNET OF THINGS MEDIATIONijujournal
 
LIGHTWEIGHT MOBILE WEB SERVICE PROVISIONING FOR THE INTERNET OF THINGS MEDIATION
LIGHTWEIGHT MOBILE WEB SERVICE PROVISIONING FOR THE INTERNET OF THINGS MEDIATIONLIGHTWEIGHT MOBILE WEB SERVICE PROVISIONING FOR THE INTERNET OF THINGS MEDIATION
LIGHTWEIGHT MOBILE WEB SERVICE PROVISIONING FOR THE INTERNET OF THINGS MEDIATIONijujournal
 
Use of SOA and Web Services Technologies for EA Migration - Lessons Learned o...
Use of SOA and Web Services Technologies for EA Migration - Lessons Learned o...Use of SOA and Web Services Technologies for EA Migration - Lessons Learned o...
Use of SOA and Web Services Technologies for EA Migration - Lessons Learned o...Nathaniel Palmer
 

What's hot (15)

Ch19-Software Engineering 9
Ch19-Software Engineering 9Ch19-Software Engineering 9
Ch19-Software Engineering 9
 
Rcs volte_whitepaper
Rcs volte_whitepaperRcs volte_whitepaper
Rcs volte_whitepaper
 
How Telecoms Can Adjust To The Reality Of The Digital Era
How Telecoms Can Adjust To The Reality Of The Digital EraHow Telecoms Can Adjust To The Reality Of The Digital Era
How Telecoms Can Adjust To The Reality Of The Digital Era
 
Rach congestion in vehicular
Rach congestion in vehicularRach congestion in vehicular
Rach congestion in vehicular
 
Comparative analysis telecommunication industry: Indonesia 2013
Comparative analysis telecommunication industry: Indonesia 2013Comparative analysis telecommunication industry: Indonesia 2013
Comparative analysis telecommunication industry: Indonesia 2013
 
Chinese taipei ct001 1366598053
Chinese taipei ct001 1366598053Chinese taipei ct001 1366598053
Chinese taipei ct001 1366598053
 
2 wp maximizing_network_value_with_next_generation_policy
2 wp maximizing_network_value_with_next_generation_policy2 wp maximizing_network_value_with_next_generation_policy
2 wp maximizing_network_value_with_next_generation_policy
 
A XMLRPC Approach to the Management of Cloud Infrastructure
A XMLRPC Approach to the Management of Cloud InfrastructureA XMLRPC Approach to the Management of Cloud Infrastructure
A XMLRPC Approach to the Management of Cloud Infrastructure
 
Michael ghorbanzadeh, ahmed abdelhadi practical channel-aware resource allo...
Michael ghorbanzadeh, ahmed abdelhadi   practical channel-aware resource allo...Michael ghorbanzadeh, ahmed abdelhadi   practical channel-aware resource allo...
Michael ghorbanzadeh, ahmed abdelhadi practical channel-aware resource allo...
 
Price of Quality, 6th concertation meeting
Price of Quality, 6th concertation meetingPrice of Quality, 6th concertation meeting
Price of Quality, 6th concertation meeting
 
WASPAG Presentation on ICH - Final Version
WASPAG Presentation on ICH - Final VersionWASPAG Presentation on ICH - Final Version
WASPAG Presentation on ICH - Final Version
 
Connected Africa Concept Note
Connected Africa Concept NoteConnected Africa Concept Note
Connected Africa Concept Note
 
LIGHTWEIGHT MOBILE WEB SERVICE PROVISIONING FOR THE INTERNET OF THINGS MEDIATION
LIGHTWEIGHT MOBILE WEB SERVICE PROVISIONING FOR THE INTERNET OF THINGS MEDIATIONLIGHTWEIGHT MOBILE WEB SERVICE PROVISIONING FOR THE INTERNET OF THINGS MEDIATION
LIGHTWEIGHT MOBILE WEB SERVICE PROVISIONING FOR THE INTERNET OF THINGS MEDIATION
 
LIGHTWEIGHT MOBILE WEB SERVICE PROVISIONING FOR THE INTERNET OF THINGS MEDIATION
LIGHTWEIGHT MOBILE WEB SERVICE PROVISIONING FOR THE INTERNET OF THINGS MEDIATIONLIGHTWEIGHT MOBILE WEB SERVICE PROVISIONING FOR THE INTERNET OF THINGS MEDIATION
LIGHTWEIGHT MOBILE WEB SERVICE PROVISIONING FOR THE INTERNET OF THINGS MEDIATION
 
Use of SOA and Web Services Technologies for EA Migration - Lessons Learned o...
Use of SOA and Web Services Technologies for EA Migration - Lessons Learned o...Use of SOA and Web Services Technologies for EA Migration - Lessons Learned o...
Use of SOA and Web Services Technologies for EA Migration - Lessons Learned o...
 

Similar to Multiservice Delivery in Wireless Networks Management

USING MOBILE SERVICE FOR SUPPLY CHAIN MANAGEMENT: A SURVEY AND CHALLENGES
USING MOBILE SERVICE FOR SUPPLY CHAIN MANAGEMENT: A SURVEY AND CHALLENGESUSING MOBILE SERVICE FOR SUPPLY CHAIN MANAGEMENT: A SURVEY AND CHALLENGES
USING MOBILE SERVICE FOR SUPPLY CHAIN MANAGEMENT: A SURVEY AND CHALLENGESijwscjournal
 
ON OPTIMIZATION OF MANUFACTURING OF FIELD EFFECT HETEROTRANSISTORS FRAMEWORK ...
ON OPTIMIZATION OF MANUFACTURING OF FIELD EFFECT HETEROTRANSISTORS FRAMEWORK ...ON OPTIMIZATION OF MANUFACTURING OF FIELD EFFECT HETEROTRANSISTORS FRAMEWORK ...
ON OPTIMIZATION OF MANUFACTURING OF FIELD EFFECT HETEROTRANSISTORS FRAMEWORK ...antjjournal
 
USING MOBILE SERVICE FOR SUPPLY CHAIN MANAGEMENT: A SURVEY AND CHALLENGES
USING MOBILE SERVICE FOR SUPPLY CHAIN MANAGEMENT: A SURVEY AND CHALLENGESUSING MOBILE SERVICE FOR SUPPLY CHAIN MANAGEMENT: A SURVEY AND CHALLENGES
USING MOBILE SERVICE FOR SUPPLY CHAIN MANAGEMENT: A SURVEY AND CHALLENGESijwscjournal
 
How Telecoms Can Adjust To The Reality Of The Digital Era
How Telecoms Can Adjust To The Reality Of The Digital EraHow Telecoms Can Adjust To The Reality Of The Digital Era
How Telecoms Can Adjust To The Reality Of The Digital EraComarch
 
Streamlining Home Service Website with Virtual Assistant AI
Streamlining Home Service Website with Virtual Assistant AIStreamlining Home Service Website with Virtual Assistant AI
Streamlining Home Service Website with Virtual Assistant AIIRJET Journal
 
Heavy reading sdn_metro_networks
Heavy reading sdn_metro_networksHeavy reading sdn_metro_networks
Heavy reading sdn_metro_networksthiru1324
 
Unified Billing-Realization of convergent architecture for charging and billi...
Unified Billing-Realization of convergent architecture for charging and billi...Unified Billing-Realization of convergent architecture for charging and billi...
Unified Billing-Realization of convergent architecture for charging and billi...IDES Editor
 
Concepts and Derivatives of Web Services
Concepts and Derivatives of Web ServicesConcepts and Derivatives of Web Services
Concepts and Derivatives of Web ServicesIOSR Journals
 
Transformation through Innovation: A Strategy for Service Provider Success
Transformation through Innovation:  A Strategy for Service Provider SuccessTransformation through Innovation:  A Strategy for Service Provider Success
Transformation through Innovation: A Strategy for Service Provider SuccessCisco Service Provider
 
Transformation Through Innovation: A Strategy For Service Provider Success
Transformation Through Innovation: A Strategy For Service Provider SuccessTransformation Through Innovation: A Strategy For Service Provider Success
Transformation Through Innovation: A Strategy For Service Provider SuccessCisco Service Provider
 
REUSABILITY-AWARE ROUTING WITH ENHANCED SECURE DATA TRANSMISSION USING HOP-BY...
REUSABILITY-AWARE ROUTING WITH ENHANCED SECURE DATA TRANSMISSION USING HOP-BY...REUSABILITY-AWARE ROUTING WITH ENHANCED SECURE DATA TRANSMISSION USING HOP-BY...
REUSABILITY-AWARE ROUTING WITH ENHANCED SECURE DATA TRANSMISSION USING HOP-BY...AM Publications,India
 
A Novel Framework for Reliable and Fault Tolerant Web Services
A Novel Framework for Reliable and Fault Tolerant Web ServicesA Novel Framework for Reliable and Fault Tolerant Web Services
A Novel Framework for Reliable and Fault Tolerant Web ServicesAbhishek Kumar
 
IRJET- Pervasive Computing Service Discovery in Secure Framework Environment
IRJET- Pervasive Computing Service Discovery in Secure Framework EnvironmentIRJET- Pervasive Computing Service Discovery in Secure Framework Environment
IRJET- Pervasive Computing Service Discovery in Secure Framework EnvironmentIRJET Journal
 
Container ecosystem based PaaS solution for Telco Cloud Analysis and Proposal
Container ecosystem based PaaS solution for Telco Cloud Analysis and ProposalContainer ecosystem based PaaS solution for Telco Cloud Analysis and Proposal
Container ecosystem based PaaS solution for Telco Cloud Analysis and ProposalKrishna-Kumar
 
Situation Alert and Quality of Service using Collaborative Filtering for Web ...
Situation Alert and Quality of Service using Collaborative Filtering for Web ...Situation Alert and Quality of Service using Collaborative Filtering for Web ...
Situation Alert and Quality of Service using Collaborative Filtering for Web ...IRJET Journal
 
IRJET- An Overview on Mobile Cloud Computing
IRJET-  	  An Overview on Mobile Cloud ComputingIRJET-  	  An Overview on Mobile Cloud Computing
IRJET- An Overview on Mobile Cloud ComputingIRJET Journal
 
Evaluation of a Framework for Integrated Web Services
Evaluation of a Framework for Integrated Web ServicesEvaluation of a Framework for Integrated Web Services
Evaluation of a Framework for Integrated Web ServicesIRJET Journal
 
IRJET- Virtual Network Recognition and Optimization in SDN-Enabled Cloud Env...
IRJET-  Virtual Network Recognition and Optimization in SDN-Enabled Cloud Env...IRJET-  Virtual Network Recognition and Optimization in SDN-Enabled Cloud Env...
IRJET- Virtual Network Recognition and Optimization in SDN-Enabled Cloud Env...IRJET Journal
 
Unlocking the True Benefit of Software Defined Networking
Unlocking the True Benefit of Software Defined NetworkingUnlocking the True Benefit of Software Defined Networking
Unlocking the True Benefit of Software Defined Networkingaccenture
 

Similar to Multiservice Delivery in Wireless Networks Management (20)

USING MOBILE SERVICE FOR SUPPLY CHAIN MANAGEMENT: A SURVEY AND CHALLENGES
USING MOBILE SERVICE FOR SUPPLY CHAIN MANAGEMENT: A SURVEY AND CHALLENGESUSING MOBILE SERVICE FOR SUPPLY CHAIN MANAGEMENT: A SURVEY AND CHALLENGES
USING MOBILE SERVICE FOR SUPPLY CHAIN MANAGEMENT: A SURVEY AND CHALLENGES
 
ON OPTIMIZATION OF MANUFACTURING OF FIELD EFFECT HETEROTRANSISTORS FRAMEWORK ...
ON OPTIMIZATION OF MANUFACTURING OF FIELD EFFECT HETEROTRANSISTORS FRAMEWORK ...ON OPTIMIZATION OF MANUFACTURING OF FIELD EFFECT HETEROTRANSISTORS FRAMEWORK ...
ON OPTIMIZATION OF MANUFACTURING OF FIELD EFFECT HETEROTRANSISTORS FRAMEWORK ...
 
USING MOBILE SERVICE FOR SUPPLY CHAIN MANAGEMENT: A SURVEY AND CHALLENGES
USING MOBILE SERVICE FOR SUPPLY CHAIN MANAGEMENT: A SURVEY AND CHALLENGESUSING MOBILE SERVICE FOR SUPPLY CHAIN MANAGEMENT: A SURVEY AND CHALLENGES
USING MOBILE SERVICE FOR SUPPLY CHAIN MANAGEMENT: A SURVEY AND CHALLENGES
 
In
InIn
In
 
How Telecoms Can Adjust To The Reality Of The Digital Era
How Telecoms Can Adjust To The Reality Of The Digital EraHow Telecoms Can Adjust To The Reality Of The Digital Era
How Telecoms Can Adjust To The Reality Of The Digital Era
 
Streamlining Home Service Website with Virtual Assistant AI
Streamlining Home Service Website with Virtual Assistant AIStreamlining Home Service Website with Virtual Assistant AI
Streamlining Home Service Website with Virtual Assistant AI
 
Heavy reading sdn_metro_networks
Heavy reading sdn_metro_networksHeavy reading sdn_metro_networks
Heavy reading sdn_metro_networks
 
Unified Billing-Realization of convergent architecture for charging and billi...
Unified Billing-Realization of convergent architecture for charging and billi...Unified Billing-Realization of convergent architecture for charging and billi...
Unified Billing-Realization of convergent architecture for charging and billi...
 
Concepts and Derivatives of Web Services
Concepts and Derivatives of Web ServicesConcepts and Derivatives of Web Services
Concepts and Derivatives of Web Services
 
Transformation through Innovation: A Strategy for Service Provider Success
Transformation through Innovation:  A Strategy for Service Provider SuccessTransformation through Innovation:  A Strategy for Service Provider Success
Transformation through Innovation: A Strategy for Service Provider Success
 
Transformation Through Innovation: A Strategy For Service Provider Success
Transformation Through Innovation: A Strategy For Service Provider SuccessTransformation Through Innovation: A Strategy For Service Provider Success
Transformation Through Innovation: A Strategy For Service Provider Success
 
REUSABILITY-AWARE ROUTING WITH ENHANCED SECURE DATA TRANSMISSION USING HOP-BY...
REUSABILITY-AWARE ROUTING WITH ENHANCED SECURE DATA TRANSMISSION USING HOP-BY...REUSABILITY-AWARE ROUTING WITH ENHANCED SECURE DATA TRANSMISSION USING HOP-BY...
REUSABILITY-AWARE ROUTING WITH ENHANCED SECURE DATA TRANSMISSION USING HOP-BY...
 
A Novel Framework for Reliable and Fault Tolerant Web Services
A Novel Framework for Reliable and Fault Tolerant Web ServicesA Novel Framework for Reliable and Fault Tolerant Web Services
A Novel Framework for Reliable and Fault Tolerant Web Services
 
IRJET- Pervasive Computing Service Discovery in Secure Framework Environment
IRJET- Pervasive Computing Service Discovery in Secure Framework EnvironmentIRJET- Pervasive Computing Service Discovery in Secure Framework Environment
IRJET- Pervasive Computing Service Discovery in Secure Framework Environment
 
Container ecosystem based PaaS solution for Telco Cloud Analysis and Proposal
Container ecosystem based PaaS solution for Telco Cloud Analysis and ProposalContainer ecosystem based PaaS solution for Telco Cloud Analysis and Proposal
Container ecosystem based PaaS solution for Telco Cloud Analysis and Proposal
 
Situation Alert and Quality of Service using Collaborative Filtering for Web ...
Situation Alert and Quality of Service using Collaborative Filtering for Web ...Situation Alert and Quality of Service using Collaborative Filtering for Web ...
Situation Alert and Quality of Service using Collaborative Filtering for Web ...
 
IRJET- An Overview on Mobile Cloud Computing
IRJET-  	  An Overview on Mobile Cloud ComputingIRJET-  	  An Overview on Mobile Cloud Computing
IRJET- An Overview on Mobile Cloud Computing
 
Evaluation of a Framework for Integrated Web Services
Evaluation of a Framework for Integrated Web ServicesEvaluation of a Framework for Integrated Web Services
Evaluation of a Framework for Integrated Web Services
 
IRJET- Virtual Network Recognition and Optimization in SDN-Enabled Cloud Env...
IRJET-  Virtual Network Recognition and Optimization in SDN-Enabled Cloud Env...IRJET-  Virtual Network Recognition and Optimization in SDN-Enabled Cloud Env...
IRJET- Virtual Network Recognition and Optimization in SDN-Enabled Cloud Env...
 
Unlocking the True Benefit of Software Defined Networking
Unlocking the True Benefit of Software Defined NetworkingUnlocking the True Benefit of Software Defined Networking
Unlocking the True Benefit of Software Defined Networking
 

More from rahulmonikasharma

Data Mining Concepts - A survey paper
Data Mining Concepts - A survey paperData Mining Concepts - A survey paper
Data Mining Concepts - A survey paperrahulmonikasharma
 
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...rahulmonikasharma
 
Considering Two Sides of One Review Using Stanford NLP Framework
Considering Two Sides of One Review Using Stanford NLP FrameworkConsidering Two Sides of One Review Using Stanford NLP Framework
Considering Two Sides of One Review Using Stanford NLP Frameworkrahulmonikasharma
 
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication SystemsA New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systemsrahulmonikasharma
 
Broadcasting Scenario under Different Protocols in MANET: A Survey
Broadcasting Scenario under Different Protocols in MANET: A SurveyBroadcasting Scenario under Different Protocols in MANET: A Survey
Broadcasting Scenario under Different Protocols in MANET: A Surveyrahulmonikasharma
 
Sybil Attack Analysis and Detection Techniques in MANET
Sybil Attack Analysis and Detection Techniques in MANETSybil Attack Analysis and Detection Techniques in MANET
Sybil Attack Analysis and Detection Techniques in MANETrahulmonikasharma
 
A Landmark Based Shortest Path Detection by Using A* and Haversine Formula
A Landmark Based Shortest Path Detection by Using A* and Haversine FormulaA Landmark Based Shortest Path Detection by Using A* and Haversine Formula
A Landmark Based Shortest Path Detection by Using A* and Haversine Formularahulmonikasharma
 
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...rahulmonikasharma
 
Quality Determination and Grading of Tomatoes using Raspberry Pi
Quality Determination and Grading of Tomatoes using Raspberry PiQuality Determination and Grading of Tomatoes using Raspberry Pi
Quality Determination and Grading of Tomatoes using Raspberry Pirahulmonikasharma
 
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...rahulmonikasharma
 
DC Conductivity Study of Cadmium Sulfide Nanoparticles
DC Conductivity Study of Cadmium Sulfide NanoparticlesDC Conductivity Study of Cadmium Sulfide Nanoparticles
DC Conductivity Study of Cadmium Sulfide Nanoparticlesrahulmonikasharma
 
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDMA Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDMrahulmonikasharma
 
IOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
IOT Based Home Appliance Control System, Location Tracking and Energy MonitoringIOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
IOT Based Home Appliance Control System, Location Tracking and Energy Monitoringrahulmonikasharma
 
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...rahulmonikasharma
 
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...rahulmonikasharma
 
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM System
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM SystemAlamouti-STBC based Channel Estimation Technique over MIMO OFDM System
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM Systemrahulmonikasharma
 
Empirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
Empirical Mode Decomposition Based Signal Analysis of Gear Fault DiagnosisEmpirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
Empirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosisrahulmonikasharma
 
Short Term Load Forecasting Using ARIMA Technique
Short Term Load Forecasting Using ARIMA TechniqueShort Term Load Forecasting Using ARIMA Technique
Short Term Load Forecasting Using ARIMA Techniquerahulmonikasharma
 
Impact of Coupling Coefficient on Coupled Line Coupler
Impact of Coupling Coefficient on Coupled Line CouplerImpact of Coupling Coefficient on Coupled Line Coupler
Impact of Coupling Coefficient on Coupled Line Couplerrahulmonikasharma
 
Design Evaluation and Temperature Rise Test of Flameproof Induction Motor
Design Evaluation and Temperature Rise Test of Flameproof Induction MotorDesign Evaluation and Temperature Rise Test of Flameproof Induction Motor
Design Evaluation and Temperature Rise Test of Flameproof Induction Motorrahulmonikasharma
 

More from rahulmonikasharma (20)

Data Mining Concepts - A survey paper
Data Mining Concepts - A survey paperData Mining Concepts - A survey paper
Data Mining Concepts - A survey paper
 
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
 
Considering Two Sides of One Review Using Stanford NLP Framework
Considering Two Sides of One Review Using Stanford NLP FrameworkConsidering Two Sides of One Review Using Stanford NLP Framework
Considering Two Sides of One Review Using Stanford NLP Framework
 
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication SystemsA New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
 
Broadcasting Scenario under Different Protocols in MANET: A Survey
Broadcasting Scenario under Different Protocols in MANET: A SurveyBroadcasting Scenario under Different Protocols in MANET: A Survey
Broadcasting Scenario under Different Protocols in MANET: A Survey
 
Sybil Attack Analysis and Detection Techniques in MANET
Sybil Attack Analysis and Detection Techniques in MANETSybil Attack Analysis and Detection Techniques in MANET
Sybil Attack Analysis and Detection Techniques in MANET
 
A Landmark Based Shortest Path Detection by Using A* and Haversine Formula
A Landmark Based Shortest Path Detection by Using A* and Haversine FormulaA Landmark Based Shortest Path Detection by Using A* and Haversine Formula
A Landmark Based Shortest Path Detection by Using A* and Haversine Formula
 
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
 
Quality Determination and Grading of Tomatoes using Raspberry Pi
Quality Determination and Grading of Tomatoes using Raspberry PiQuality Determination and Grading of Tomatoes using Raspberry Pi
Quality Determination and Grading of Tomatoes using Raspberry Pi
 
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
 
DC Conductivity Study of Cadmium Sulfide Nanoparticles
DC Conductivity Study of Cadmium Sulfide NanoparticlesDC Conductivity Study of Cadmium Sulfide Nanoparticles
DC Conductivity Study of Cadmium Sulfide Nanoparticles
 
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDMA Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
 
IOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
IOT Based Home Appliance Control System, Location Tracking and Energy MonitoringIOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
IOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
 
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
 
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
 
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM System
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM SystemAlamouti-STBC based Channel Estimation Technique over MIMO OFDM System
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM System
 
Empirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
Empirical Mode Decomposition Based Signal Analysis of Gear Fault DiagnosisEmpirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
Empirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
 
Short Term Load Forecasting Using ARIMA Technique
Short Term Load Forecasting Using ARIMA TechniqueShort Term Load Forecasting Using ARIMA Technique
Short Term Load Forecasting Using ARIMA Technique
 
Impact of Coupling Coefficient on Coupled Line Coupler
Impact of Coupling Coefficient on Coupled Line CouplerImpact of Coupling Coefficient on Coupled Line Coupler
Impact of Coupling Coefficient on Coupled Line Coupler
 
Design Evaluation and Temperature Rise Test of Flameproof Induction Motor
Design Evaluation and Temperature Rise Test of Flameproof Induction MotorDesign Evaluation and Temperature Rise Test of Flameproof Induction Motor
Design Evaluation and Temperature Rise Test of Flameproof Induction Motor
 

Recently uploaded

Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
computer application and construction management
computer application and construction managementcomputer application and construction management
computer application and construction managementMariconPadriquez1
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catcherssdickerson1
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 

Recently uploaded (20)

9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
computer application and construction management
computer application and construction managementcomputer application and construction management
computer application and construction management
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 

Multiservice Delivery in Wireless Networks Management

  • 1. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 5 Issue: 10 87 – 90 _______________________________________________________________________________________________ 87 IJRITCC | October 2017, Available @ http://www.ijritcc.org _______________________________________________________________________________________ Multiservice Delivery in Wireless Networks Management K. Ravikumar Dept: Computer Science Tamil University, Thanjavur-613010,India H. Bakyasri Dept: Computer Science Tamil University Thanjavur-613010, India Email id : bakyahari@gmail.com Abstract: A Wireless Sensor Network is a self-configuring set of connections of tiny sensor nodes communicate in the middle of themselves using radio signals, and deployed in measure to sense, observe and identify with the physical world.WSN provide a bridge between the real physical and virtual worlds. Allow the ability to observe the previously unobservable at a fine resolution over large spatiotemporal scales. A join that execute different than typical behavior (drop packets, scare routing system and save their assets by not ahead the other node packets) is identified as selfish node. The multiservice delivery between the source-destination pairs in distributed selfish wireless networks (SeWN), where selfish relay nodes (RN) expose their selfish behaviors. Research focus evaluating the trust of a node group and excluding selfish nodes for improving the network performance. In the network connectivity of selfish wireless networks (SeWNs) constituted by selfish nodes (SeNs). Source transfer the multi-service delivery to destination through Relay Node (RN). At the time of transfer, the selfish relay nodes expose their selfish behavior by doing dropping multiservice. In this environment, the network need to establish the connection between source and destination, for that source need to find the optimal path. Concept of Node selfishness management is constructed to manage the RN’sto manage the RN’s node-selfishness information (NSI). It includes the degree of node-selfishness (DeNS), the degree of intrinsic selfishness (DeIS) and the degree of extrinsic selfishness (DeES). DeNs determines in terms of RN’s historical behaviors, DeIS defines in terms of its available resources and finally DeES described by means of the employed incentive mechanism and the quality-of-service (QoS) requirements. Over the spread node-selfishness administration, a path collection criterion is considered to select the most reliable and through path in terms of RNs’ DeISs precious by their accessible resources, and the optimal incentive are determined by the source to motivate forwarding multiservice of the RNs in the selected path. Simulation results show that this future model effectively manages the RNs’ NSI, and the most select path selection and the optimal incentives are determined. Key Words: Selfish wireless networks, Relay Node, Quality of service, Multiservice Delivery, Telecommunication, End to End Service __________________________________________________*****_________________________________________________ I. INTRODUCTION Today’s mobile telecommunications service providers face strong competition to deliver new revenue- generating services to the market while decreasing related operational costs [1]. Mobile users are getting more demanding in their requirements for useful, personalized application offered at a reasonable price. Future service creation and delivery platforms as key network components are targeted to deliver more creative services and more quickly to a service provider’s target market [6]. They support objectives for next-generation services, such as the ability to tailor services quickly and adaptable to individual customers and to provide an open platform for third-party service development [4]. Systems integrators are carrying together multiple SDP products of different vendors, combining the strengths of these different products, and ensuring to be in a standards based and open service- oriented environment [7]. Within 3rd Generation Mobile Networks, Internet- related concepts are being introduced more and more in the telecommunication environment. At the same time the industry is standardizing services and service enablers within the Open Mobile Alliance (OMA) [5]. OMA has defined a reference architecture called OSE that defines how basic services can be re-used and combined to integrate into new and advanced services. OMA’s role is to create application level specifications for various services, uncertain to the basic network technology [8]. The missing part of the way to even more attractive new services is the glue that ties network and service enablers together and makes service creation easy and efficient. The Service Integration Environment (SIE) described in this thesis aims to provide an enabling technology for developing advanced applications for fixed and mobile networks [10]. Network technologies and services have changed through a virtuous circle of innovation. Service systems built by network operators offer business opportunities to third parties such as content providers, and they have contributed to the quick launch of new services [3]. This thesis will discuss the fundamental system to generate service revenue for network operators, or the SDP (service delivery platform). Networks are now in a segment of evolution measured by the integration of IP (Internet protocol) technologies and the appearance of high speed mobile access technologies. The SDPs for this new location need to be advanced in
  • 2. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 5 Issue: 10 87 – 90 _______________________________________________________________________________________________ 88 IJRITCC | October 2017, Available @ http://www.ijritcc.org _______________________________________________________________________________________ terms of the scope of networks and terminals they carry, the services they offer, and the business opportunities they provide [10]. This has led to consideration on what architectures should be adopted. The subsequent sectors discuss the Hitachi’s involvement with SDPs for network operators and the hope outlook for this business [9]. SDPs for mobile network operators were first introduced about 2000, creating a new market that has rapidly extend to world major operators. The Japanese market pioneered the implementation of commercialized services by mobile network operators, with many new services appearing in front of equality initiatives such as the OMA (Open Mobile Alliance) [4]. These platforms provide an open environment that supports both various services and proven returns models. The length of with providing their subscribers with revenue generating services such as messaging, network operators have succeeded in providing an open business environment for many service providers so that they can increase as well as introduce new contented and services capably. The service providers with simple service systems have been clever to offer monetized services to a large number of customers by using the charging and arrangement features furnished by network operators [7]. The network operators have improved their own revenue with fees for revenue collection for service providers and small package communications charges. In addition, prosperous smart contents and customers’ acknowledgement of premium values attributable to global access are the reasons for the quick adoption of these business models in the mobile industry [1]. Hitachi is currently working on increasing SDPs in order to meet with the new requirements based on its expertise and incident in the SDP for mobile operators. User services will grow in speed and capacity to allow seamless use by users both of the fixed and mobile networks [3]. Since services are mounting to cover non-voice, voice, broadcast and network have power over applications, the junction of these services will in turn make new services. The Hitachi Group has developed non-voice solutions, including service control platforms for bright home appliances, voice solutions using IP telephony and speech synthesis/recognition, broadcast solutions like video delivery platforms and image identification techniques, and network control solutions like VPN (virtual private network) control [2]. Hitachi will always work on further enhancements that will deliver revenue-generating solutions for network operators. These network services will be presented to service providers such as MVNOs with open application interfaces, and will work with various applications on the Internet. As broadband services cause a great deal of content volume, the number of transactions through networks, together with machine-to-machine communication such as surveillance cameras will grow exponentially. As a result, performance supplies will become an order of magnitude higher than existing SDPs [2]. On the other hand, it is also anticipated that the ability to look into the content of communicating data, such as filtering and transfer functions will need to be further superior. Therefore, protocol processing which can be customized and is highly scalable shall be one of the key technologies to endure future SDPs. Under these circumstances, Hitachi has residential and evolved a high-speed protocol engine called AWG (active web gateway). The improvements in feat of WAPGW (wireless application protocol gateway) that is developed with the technology [8]. At the present stage of development, the system is accomplished of processing 3,200 HTTP (hypertext transfer protocol) needs per second when it is run on a single blade server [3 GHz×2 CPUs (central processing units)]. The evolution of backbone networks will outcome in the interconnection of various access networks. Therefore, it is essential to have a secure validation platform to identify service users [5]. The GBA (generic bootstrapping architecture) standard of the 3GPP is a hopeful technology for extending the mobile SDP’s scope of fixed and mobile joined services. A client function of the SIM (subscriber identity module) card in the mortal queries the HSS (home subscriber server) or other network operator database of key information via the BSF (bootstrap server function) server [7]. This provides an assemblage authentication method that is agnostic to the access network. II. EXISTING SYSTEM With the beginning of the ad hoc networks paradigm, novel security exposures arise. The classical mechanisms, namely authentication and encryption, for assuring security in adhoc networks seem to be inefficient in detecting incorrect forwarding attacks and denial of service problems. The existing mechanism suggested to enables routing protocols to detect packet dropping frauds. In fact, the nodes in the network monitor in dependently the behavior of each other, however, they need to collaborate to detect intruders and identify them. This mechanism allows only malicious packet dropping detection. It wouldn’t envisage to discard malicious nodes and help in changing the routing path. A) Demerits  The existing system only detect the malicious packet drop but it couldn’t tried to change the path of transmission.  The system doesn’t analysis the deep concept of selfish node.  The loss of packet occur due to selfish behavior of the malicious node.
  • 3. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 5 Issue: 10 87 – 90 _______________________________________________________________________________________________ 89 IJRITCC | October 2017, Available @ http://www.ijritcc.org _______________________________________________________________________________________ III. PROPOSED SYSTEM During E2E multi-service delivery selfish relay nodes (RN) expose their selfish behaviors, i.e., forwarding or dropping multi-services in distributed SeWNs. In such distributed networks, consider RNs’ available resources as their intrinsic factors, and both the service impact factors, i.e., the QoS requirements, and the factor of an employee incentive mechanism. Accordingly, the grade of intrinsic selfishness and the grade of extrinsic selfishness are defined as the influences of the intrinsic issues and the extrinsic issues on the node-selfishness, respectively, while the degree of node-selfishness (DeNS) exhibits the selfish behavior of forwarding multi-services. These DeIS, DeES and DeNS are all the RN’s node-selfishness information (NSI). For the E2E multi-service delivery, the source and every RN should determine and maintain the information about its selfish behavior in terms of its intrinsic and extrinsic factors, and extract other RNs’ NSI. According to those NSI, the source selects a unfailing and short path and maintains the reliability of this selected path by adjusting the incentives provided for exciting selfish RNs under an employee inducement mechanism. A) Merits  The proposed method Improve the network security.  It reduces the loss of pack by selecting optimal shortest path for multiservice delivery.  The source should reduce the selection frequency and maintain the reliability of the selected path. IV. EXPERIMENTAL RESULT A) Network Throughput In these experiments maximum throughput.CSW gives a result with throughput of 45%.HTM gives a result with throughput of 65%.SM gives a result with throughput of 50%.E2E gives a result with throughput of 75%. B) Cost In these experiments describe cost rate.CSW gives a result with throughput of 50%.HTM gives a result with throughput of 65%.SM gives a result with throughput of 70%.E2E gives a result with throughput of 40%. C) High Performance In these experiments describe performance.CSW gives a result with throughput of 55%.HTM gives a result with throughput of 40%.SM gives a result with throughput of 65%.E2E gives a result with throughput of 85%. V. CONCLUSION Proposed system introduced the disseminated framework of the node-selfishness management, where each RN manages its Node Selfishness Information that is Intrinsic and Extrinsic information and other nodes’ NSI and all source node manages the RNs’ NSI in circulated SeWNs. In this support, the RN’s models of intrinsic and extrinsic selfishness have been residential to manage its DeIS and DeES, and the other RNs’ NSI has been obtained in terms of the RNs’ past behaviors and their recommended NSI. Under this distributed framework of the node-selfishness administration, the path selection criterion has been planned to select the most reliable and shortest path for the multi- service delivery. Additionally, the best possible incentives have been adjusted by the source for maintaining the path dependability of the E2E multi-service delivery. 0 20 40 60 80 CSW HTM SM E2E Network Throughput Low cost CSW HTM SM E2E 0 20 40 60 80 100 CSW HTM SM E2E High Performance
  • 4. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 5 Issue: 10 87 – 90 _______________________________________________________________________________________________ 90 IJRITCC | October 2017, Available @ http://www.ijritcc.org _______________________________________________________________________________________ VI. FUTURE WORK Future work of the proposed system has to improve the performance of the system, in the way of finding or improving path selection scheme. To improve the performances of the network include more factor to determine the selfish node. It may alter the incentive concept for relay node performance. But future work for this system is not a big deal. REFERENCES [1] J. Li, Q. Yang, K. S. Kwak, and L. Hanzo, “The connectivity of selfishwireless networks,” IEEE Access, vol. 3, pp. 2814–2827, Nov. 2015. [2] J. Li, Q. Yang, and K. S. Kwak, “Neural-network based optimaldynamic control of delivering packets in selfish wireless networks,” IEEE Commun. Lett., vol. 19, no. 12, pp. 2246–2249, Dec. 2015. [3] L. Cheng, J. Niu, J. Cao, S. K. Das, and Y. Gu, “QoS aware geographicopportunistic routing in wireless sensor networks,” IEEE Trans. ParallelDistrib. Syst., vol. 25, no. 7, pp. 1864–1875, Jul. 2014. [4] L. Cheng, J. Niu, J. Cao, S. K. Das, and Y. Gu, “QoS aware geographic opportunistic routing in wireless sensor networks”, in IEEE, vol. 25, issue. 7, pp. 1864–1875, Jul. 2014. [5] L. Cheng, J. Niu, J. Cao, S. K. Das, and Y. Gu, “QoS aware geographicopportunistic routing in wireless sensor networks,” IEEE Trans. ParallelDistrib. Syst., vol. 25, no. 7, pp. 1864–1875, Jul. 2014. [6] D. You, C. F. Benitez-Quiroz, and A. M. Martinez, “Multi objective optimization for model selection in kernel methods in regression”, in IEEE, vol. 25, issue. 10, pp. 1879–1893, Oct. 2014. [7] R. Dai, P. Wang, and I. F. Akyildiz, “Correlation-aware QoS routing with differential coding for wireless video sensor networks”, in IEEE, vol. 14, issue. 5, pp. 1469– 1479, Oct. 2012. [8] Rui Dai, Pu Wang, Ian F. Akyildiz, “Correlation- AwareQoS Routing for Wireless Video Sensor Network”, Oct 2012. [9] F. Bao, I. Chen, M. Chang, and J. Cho, “Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection”, in IEEE, vol. 9, issue. 2, pp. 169–183, Jun. 2012 [10] R. Dai, P. Wang, and I. F. Akyildiz, “Correlation-aware QoS routing with differential coding for wireless video sensor networks”, in IEEE, vol. 14, issue. 5, pp. 1469– 1479, Oct. 2012.