SlideShare a Scribd company logo
IJSRST15152 | Received: 30 October 2015 |Accepted: 11 November 2015 | November-December-2015 [(1)5: 12-16]
© 2015 IJSRST | Volume 1 | Issue 5 | Print ISSN: 2395-6011 | Online ISSN: 2395-602X
Themed Section: Science and Technology
12
A Review paper on Viral Mobile Communications System
Dr. Deepak Singh Yadav*, Rajesh Kumar Pandey
Department of Computer Science & Engineering, Sachdeva Institute of Technology, Mathura, Uttar Pradesh, India
ABSTRACT
In this paper a research has been done to overview the viral mobile communication technology. In the modern era
the GSM technology is obsolete and a new concept of viral mobile communication in the form of 3G as well as 4G
CDMA in spite of GSM for the point-to-point information transportation when the network is stabilised through the
research and analysis in the field of viral mobile communication. Due to this research and analysis a new perception
with new conception for a new model of the viral mobile technology will be formed.
Keywords: Cross Entropy, Hard handover, Soft Handover, Viral Mobile Communication.
I. INTRODUCTION
Along with the development of 3G and 4G mobile
communication system, neither TD-SCDMA (Time
Division Synchronous code division multiple access) nor
WCDMA (Wide Band Code Division Multiple access)
and CDMA2000 (is also known as multi-carrier code
division multiple access) can satisfy the mobile service
provider and mobile subscriber (MS) with their
performance [1,2], which will make new standard and
technology develop constantly, supporting the system
performance more mature and perfect [3]. The theory of
viral mobile communication (VMC) will apply itself to
solve the problem of point-to-point information
transportation of MS in network [4,5,6], trying to make
the MS get rid of the participation and support of the
upper equipments, more making vast MS achieving
point-to-point information transportation and switch[7,8].
This study introduces the viral communication theory
into mobile communication system of 3G and 4G and
analyses the corresponding performance. This new
technique explores the enabling principles wireless
communicators and will demonstrate their fundamental
ability to scale and automatically configure themselves
through a diverse set of applications including live voice,
secure transmission, low power/ high-availability
signaling, and sensors with a sense of place.
This paper is divided into eight parts. Starting with
introduction (Section-I), next section covers the
conception of viral mobile communication (Section-II).
Moving ahead, viral architecture requirement is
discussed (Section-III). After that design principles of
viral architecture are discussed (Section-IV), the model
of viral mobile communication are discussed (Section-
V), the process of MSA soft handover communication
are discussed (Section-VI), link capacity equation of the
viral mobile communication network are discussed
(Section - VII). Finally, conclusions summarize the last
section (Section-VIII).
II. METHODS AND MATERIAL
A. The Conception of Viral Mobile Communication
The definition of viral mobile communication (VMC) is
to apply the theory of viral communication to 3G and 4G
mobile communication system without direct support of
upper equipment, devoting itself to realize point-to-point
information transportation and switch of MS. Its
characteristics are shown below:
a. Mutual independency
b. Scalability
c. Share resources
d. Rapid reproduction
International Journal of Scientific Research in Science and Technology (www.ijsrst.com)
13
New technologies allow us to make wired and wireless
devices that are ad hoc, incrementally installed and
populous almost without limit. They need no backbone
or infrastructure in order to work as an alternative, they
use neighbours to bootstrap both bit delivery and geo
location. This re-distributes privileges of
communications from a vertically integrated provider to
the end-user or end-device and segregates bit delivery
from services. Communications can become something
you do rather than something you acquire. This is very
important issue in economic and social cases that
include telephony, media distribution, safety and rising
markets.
The key idea is communications devices that work with
no central backbone and scale almost without bound.
They are based on reinterpreting the basic principles of
wireless in the glow of efficiently viable digital radios
that can expand spectrum capacity even as they use it.
This obvious challenge is resolved by real-time RF
processing that collaboratively distributes signals and
reduces the power required at each node. As with the PC,
this fundamental shift in architecture, moves
communications intelligence from the core of a network
to the ends, and builds upon a viral architecture that
enables infinite growth and very much reduced costs of
improvement.
Our study boundary entails conception of infrastructure
free, scalable networks that preserve operating power,
interoperate with existing systems, adapt to new radio
techniques as they appear, and minimize the cost of
functional evolution. This is practicable in the near term.
We will demonstrate it through sample applications in
domains as diverse as sensor nets and personal
telephony. Viral communication architecture is one
where elements are independent, scalable and where
each new element adds capacity to the system, so that it
can be adopted incrementally from a small base and
gains accelerating value with scale.
B. Viral Architecture Requirements
We use the term viral architecture to mean a system that
is adopted “virally”. Viral adoption refers to a system
architecture that can be adopted incrementally, and gains
momentum as it scales. The growth behaviour of such a
system can be called viral growth. Although many
systems are fairly scalable, many are not viral, because
they require a critical mass of adoption before any
benefit is achieved [9].
Figure 1: Basic architecture of viral system
Ad hoc network is a decentralized type of wireless
network. The network is said to be ad hoc because it
does not really pre-existing infrastructure. Scalability of
a network is defined as the capability of a process, to
handle growing amounts of work in a graceful manner
or its ability to be distended to accommodate that
growth.
For example, it can refer to the capability of a system to
increase total throughput under an increased load when
resources (typically hardware) are added. Each new
element of a viral architecture must not reduce the
capabilities of those that were there before to gain
momentum, each new element must create more value
from connecting into the system than from operating
alone (Fig.1). That is, each adoption is a “win-win”
decision the existing elements gain a little more benefit
from the new element, and each new element has a
stronger value proposition for joining the system.
Momentum results from this process, because a reluctant
adopter will eventually be attracted to adopt when the
scale reaches his cost/benefit trade-off even when the
architecture still has small reach.
C. Design Principles of Viral Architecture
There are two primary design principles that lead to a
viral architecture scalability and independence [10]. The
first states that viral systems have to be able to grow
almost without bound, and the second requires that its
elements operate autonomously, without connection to a
central authority. In fundamental nature, one should be
able to freely add elements and they should work
without connection to a backbone. This works for
International Journal of Scientific Research in Science and Technology (www.ijsrst.com)
14
automobiles as long as there are sufficient
infrastructures, and we will show that it can work for
communications and that the roadways are
fundamentally infinite.
 Scalability
From the point of view of a single handed radio receiver,
capacity in bits per second is limited primarily by
bandwidth of signals coming into its antenna. Signals
whose frequencies overlap cannot be easily
distinguished, hence the notion of interference. When
the bulk of information services were broadcast services
and radios where expensive, this view of spectrum made
intelligence.
However, from the perspective of electromagnetic
propagation in space, information capacity is unlimited.
The limit is defined by the processes of detection, not
the space itself. The technology of the receivers and the
computational architecture of the radio system, not the
physics of the space, are the limits to communications
capacity. There are a number of methods in common use
that prove this point. Space division multiplexing, for
example, as used in microwave and satellite links, re-
uses the spectrum by restricting either the direction of
emission or requiring directivity in the receiving antenna.
License is granted to a place, not a merely a band. The
fundamental nature of scalable wireless networks is
cooperation, a generalization of the phased array.
Sheppard’s packet repeater network design works
because each node forwards packets of information on
behalf of each other node. Since the power needed to
reach an adjacent node is reduced by a factor equal or
greater to the square of the distance, the total amount of
energy used to carry a bit from source to destination is
reduced. And since the energy radiates over a narrower
region, the total amount of information that can be
simultaneously travelling in the network increases as the
nodes in the network get denser. In effect, each node is a
“tower” for all of the nodes that are nearby the “cells”
are defined by who wishes to communicate with whom
rather than the topography or zoning requirements of the
place.
Secondary concerns are that a viral system be future
proof and adaptable. In automobiles, the presence of
either new cars or new routes does not obsolesce
existing ones. A communications device should work
indefinitely no matter what other communicators enter
the environment and no matter how the underlying
communications technology evolves.
 Independence
The second criterion for a viral system is independence
of operation. While this is almost understood by
impression of the manner by which they scale, it is a
requirement for decentralized growth. It is dictated by
the applications we require independence in order to
extend communications to cases for which an account or
registration process simply does not apply. But more
important, “de-centrality” includes a range of
autonomous, distributed devices as diverse as remote
controls for home entertainment equipment, portable and
wearable health monitoring equipment, things placed in
the physical world such as security cameras, burglar
alarms, environmental sensors, thermostats, and
consumer equipment such as digital cameras, personal
recorders, and so onward. It is unreasonable to expect
that a radio-operated TV remote control would require
an account with the local cellular operator or that one
would need permission to download the photo from a
digital camera. Independence results from the use of a
collaborative scheme for spectrum use. The principle is
that each participant in a communication has the full
capability of the network. Routing, relaying, and signal
regeneration are alive in each device.
The notion is not radical and is implicit in ad-hoc
networks. There, the general definition is that each node
is a router. We likewise include routing in the devices,
but we extend that notion to the radio layer itself and use
the RF signal itself as a routing control parameter.
Rather than complicate the design, this allows viral
elements to literally sneak a signal around corners or
through gaps in the local spectral flux.
D. The Model of Viral Mobile Communication
There are two kinds of call process of MS in CDMA
mobile communication system: one is hard handover
that MS only communicate with one base
station(BS),which means the connection of MS and BS
is broken off firstly and connected successively. The call
process is shown in figure 2(MSC is the mobile switch
International Journal of Scientific Research in Science and Technology (www.ijsrst.com)
15
center) ; the other is soft handover that the MS
communicate with two or more BSs, which means the
connection of MS and BSs is connected firstly and
broken off successively. The call process is shown in
figure 3; the corresponding zone of two segments of arc
is soft handover zone.
Reason of handover failure will be minimize if we
consider viral mobile communication network the
process of information transportation among the MSs is
shown in fig 4, In the general communication processes
shown in fig 2 and fig 3, MSs carry through
corresponding call under certain condition viral mobile
communication is needed; the algorithm of the
information transportation process is given below [11].
Figure 2: Hard handover call process
Figure 3: Soft handover call process
1. Assume that Base Station (BS) is microcell.
Figure 4: Viral Communication Process
2. Define BSi and MSi, where i=1, 2, 3, 4;
3. The information transportation between MS1 and
MS3 can be completed by MS2 indirectly or can
be completed by MS4 indirectly.
4. MS1 may choose not to transport the information
to corresponding BS1.
5. MS3 may choose not to transport the information
to corresponding BS3.
6. Return to general communication process after the
VMC finishes.
E. The Process of Msa Soft Handover
Communication
• Soft handover is that the MSB and MSC connect to
their corresponding BS1 and BS2 separately.
• Construct corresponding forward and backward
link.
• Soft handover is the MSA connects to BS1 and
BS2 together.
• The soft handover communication link of MSA
and MSB shows in this figure based on above
assumption.
Figure 5: Soft handover call process (MSA)
F. Link Capacity Equation of the Viral Mobile
Communication Network
The viral mobile communications system is controlled
under ideal power; the reverse link equation in every cell
can be written as:
Where
Eb is the energy per bit,
No is the noise spectral density,
W is the CDMA bandwidth,
Rbi is the service bit rate,
N is the number of services,








1
0
1
Ns
j j
N
i
bi
o
b
S
S
I
X
R
W
N
E

International Journal of Scientific Research in Science and Technology (www.ijsrst.com)
16
Ns is the users/cell,
I is the total interference,
S is the desired signal power,
ƞ is the background noise,
xj is the voice activity factor,
In addition assume that the signal-to-noise threshold
received by BS is q,

S
q  .
In the viral communication network for each cell,
defining the parameter of viral mobile communication
network, then the link capacity equation can be resulted
from formula.
• In above formula, Psho is the soft handover probability
of MS in microcell.
• Pvmc is the probability of viral mobile communication
for MS in microcell during soft handover.
III. CONCLUSION
Finally, I am concluding through deep thinking as this is
an under developing technology and hence there is a
vast field of expansion in the field of wireless
communication. Due to this technology the fundamental
ability to scale and auto configuration in life voice,
secure transmission, low power / high- availability
signaling etc. will be possible.
The communication is a very giant field and yet a great
exploration is to be done and this viral mobile
communicate technology will enable the principle of
wireless communication which the world has to see in
future and these new principles will apply to the broad
band 3G and 4G mobile communication for the
betterment and comfort of humanity by point-to-point
information system.
IV. REFERENCES
[1] Chang Soon Kang, Ho-Shin Cho, Dan Keun Sung,
“Capacity Analysis of Spectrally Overlaid
Macro/Microcellular CDMA Systems Supporting Multiple
Types of Traffic”, IEEE Transactions on Vehicular
Technology,Vol.52, pp.333-346,March2003.
[2] Zhiqiang Zhu, Junqiang Guo, Jiang Hui, “Performance
Analysis of Soft Handover Based on Link Balance in
Broadband CDMA Systems”,Computer Engineering and
Applications, Vol.43, pp.146-148, Aug. 2007.
[3] Zhu Zhiqiang, Xu Guangyin, Guo Junqiang, “Soft
Handover Algorithm Analysis of Overlaid Cellular in
CDMA System Based on Speed and Direction”,
Proceedings of the First International Conference on
Complex Systems and Applications, pp.753-756, June
2006.
[4] AndyLippman,“ViralCommunications”,http://dl.media.mit.
edu/viral/viral. Pdf, 2003.
[5] Aggelos Bletsas, Andrew Lippman, “Efficient
Collaborative (Viral) Communication in OFDM Based
LANs”
http://web.media.mit.edu/~aggelos/papers/bletsas_isart03.p
df,2003.
[6] Aggelos Bletsas, ”Low Complexity Virtual Antenna Arrays
Using Cooperative Relay Selection”,IWCMC’06, pp.461—
466 ,July 2006.
[7] Aggelos Bletsas, Ashish Khisti, Moe Z. Win. Opportunistic
Cooperative Diversity with Feedback and Cheap Radios.
IEEE Transactions on Wireless Communications, Vol.7,
pp.1823—1827, May 2008.
[8] Aggelos Bletsas, Hyundong Shin, M.Z.Win, “Cooperative
Communications With Outage-Optimal Opportunistic
Relaying”, IEEE Transactions on Wireless
Communications, Vol.6, pp.1-11, Sep. 2007.
[9] Andy Lippman, “Viral Communications”, dl.media.mit.edu
viral. pdf , 2003.
[10] Andrew Lippman David P.Reed, “Viral Communications”
Media Laboratory Research, Draft May 19th, 2003.
[11] Zhiqiang Zhu, Guangyin Xu, Lin Xu, Junqiang Guo,
“Performance Analysis of Viral CDMA Mobile
Communication Based on Cross Entropy” IEEE- 978-1-
4244-3693-4/09, 2009.
Bibliographies
Rajesh Kumar Pandey was born at Raebareli (U.P.), in
India. He received the B. Tech degree in
Computer Science & Engineering in
2010 from Feroze Gandhi Institute of
Engineering & Technology, Raebareli
(U.P.), India. Presently, he is an M.Tech
student in Computer Science &
Engineering from Sachdeva Institute of
Technology, Mathura (U.P.), India.
S
S
I
X
N
R
W
vmc
N
E
j
vmc
s
bi
N
i
o
b













 
)
1
(
1
vmc
s
sho
vmc
s P
N
P
N 

More Related Content

Similar to A Review Paper On Viral Mobile Communications System

IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Secure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor NetworksSecure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor Networks
Amy Moore
 
An Efficient Secure Ad Hoc Routing Protocol for Optimize the Performance of M...
An Efficient Secure Ad Hoc Routing Protocol for Optimize the Performance of M...An Efficient Secure Ad Hoc Routing Protocol for Optimize the Performance of M...
An Efficient Secure Ad Hoc Routing Protocol for Optimize the Performance of M...
ijtsrd
 
Analysis of back propagation and radial basis function neural networks for ha...
Analysis of back propagation and radial basis function neural networks for ha...Analysis of back propagation and radial basis function neural networks for ha...
Analysis of back propagation and radial basis function neural networks for ha...
IJECEIAES
 
Thesis on Mobile Ad-hoc Network (MANET)
Thesis on Mobile Ad-hoc Network (MANET) Thesis on Mobile Ad-hoc Network (MANET)
Thesis on Mobile Ad-hoc Network (MANET)
Thesis Scientist Private Limited
 
A Review On Wireless Grid Computing
A Review On Wireless Grid ComputingA Review On Wireless Grid Computing
A Review On Wireless Grid Computing
Jim Jimenez
 
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
IRJET Journal
 
Hsing cuhk talk wireless 5_g_why-how-what_mar 31 2014
Hsing cuhk talk wireless 5_g_why-how-what_mar 31 2014Hsing cuhk talk wireless 5_g_why-how-what_mar 31 2014
Hsing cuhk talk wireless 5_g_why-how-what_mar 31 2014
HarshitParkar6677
 
Towards internet of things iots integration of wireless sensor network to clo...
Towards internet of things iots integration of wireless sensor network to clo...Towards internet of things iots integration of wireless sensor network to clo...
Towards internet of things iots integration of wireless sensor network to clo...
IJCNCJournal
 
Improvements for DMM in SDN and Virtualization-Based Mobile Network Architecture
Improvements for DMM in SDN and Virtualization-Based Mobile Network ArchitectureImprovements for DMM in SDN and Virtualization-Based Mobile Network Architecture
Improvements for DMM in SDN and Virtualization-Based Mobile Network Architecture
ijmnct
 
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTURE
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTUREIMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTURE
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTURE
ijmnct
 
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTURE
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTUREIMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTURE
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTURE
ijmnct
 
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
IJERA Editor
 
Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...
Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...
Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...
ijasuc
 
Characterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor networkCharacterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor network
ijwmn
 
Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation...
Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation...Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation...
Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation...
CSCJournals
 
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi  Hop TransmissionEnergy Minimization in Wireless Sensor Networks Using Multi  Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
IOSR Journals
 
Фреймворк промышленного интернета
Фреймворк промышленного интернетаФреймворк промышленного интернета
Фреймворк промышленного интернета
Sergey Zhdanov
 
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
IJEEE
 

Similar to A Review Paper On Viral Mobile Communications System (20)

IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Secure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor NetworksSecure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor Networks
 
An Efficient Secure Ad Hoc Routing Protocol for Optimize the Performance of M...
An Efficient Secure Ad Hoc Routing Protocol for Optimize the Performance of M...An Efficient Secure Ad Hoc Routing Protocol for Optimize the Performance of M...
An Efficient Secure Ad Hoc Routing Protocol for Optimize the Performance of M...
 
Analysis of back propagation and radial basis function neural networks for ha...
Analysis of back propagation and radial basis function neural networks for ha...Analysis of back propagation and radial basis function neural networks for ha...
Analysis of back propagation and radial basis function neural networks for ha...
 
Thesis on Mobile Ad-hoc Network (MANET)
Thesis on Mobile Ad-hoc Network (MANET) Thesis on Mobile Ad-hoc Network (MANET)
Thesis on Mobile Ad-hoc Network (MANET)
 
A Review On Wireless Grid Computing
A Review On Wireless Grid ComputingA Review On Wireless Grid Computing
A Review On Wireless Grid Computing
 
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
 
Hsing cuhk talk wireless 5_g_why-how-what_mar 31 2014
Hsing cuhk talk wireless 5_g_why-how-what_mar 31 2014Hsing cuhk talk wireless 5_g_why-how-what_mar 31 2014
Hsing cuhk talk wireless 5_g_why-how-what_mar 31 2014
 
Towards internet of things iots integration of wireless sensor network to clo...
Towards internet of things iots integration of wireless sensor network to clo...Towards internet of things iots integration of wireless sensor network to clo...
Towards internet of things iots integration of wireless sensor network to clo...
 
Improvements for DMM in SDN and Virtualization-Based Mobile Network Architecture
Improvements for DMM in SDN and Virtualization-Based Mobile Network ArchitectureImprovements for DMM in SDN and Virtualization-Based Mobile Network Architecture
Improvements for DMM in SDN and Virtualization-Based Mobile Network Architecture
 
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTURE
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTUREIMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTURE
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTURE
 
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTURE
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTUREIMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTURE
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTURE
 
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
 
Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...
Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...
Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...
 
Characterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor networkCharacterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor network
 
Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation...
Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation...Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation...
Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation...
 
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi  Hop TransmissionEnergy Minimization in Wireless Sensor Networks Using Multi  Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
 
Фреймворк промышленного интернета
Фреймворк промышленного интернетаФреймворк промышленного интернета
Фреймворк промышленного интернета
 
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
 

More from Michele Thomas

Cara Menulis Angka Dengan Kata Dalam Bahasa Inggris L
Cara Menulis Angka Dengan Kata Dalam Bahasa Inggris LCara Menulis Angka Dengan Kata Dalam Bahasa Inggris L
Cara Menulis Angka Dengan Kata Dalam Bahasa Inggris L
Michele Thomas
 
Critical Essay Short Persuasive Text Examples
Critical Essay Short Persuasive Text ExamplesCritical Essay Short Persuasive Text Examples
Critical Essay Short Persuasive Text Examples
Michele Thomas
 
Samanthability - College Essay Writing Tips - Sama
Samanthability - College Essay Writing Tips - SamaSamanthability - College Essay Writing Tips - Sama
Samanthability - College Essay Writing Tips - Sama
Michele Thomas
 
Prompt Assignment Help In The UK From Top Service WritingSquirrell
Prompt Assignment Help In The UK From Top Service WritingSquirrellPrompt Assignment Help In The UK From Top Service WritingSquirrell
Prompt Assignment Help In The UK From Top Service WritingSquirrell
Michele Thomas
 
1 Buy Essays Papers. Pay F
1 Buy Essays Papers. Pay F1 Buy Essays Papers. Pay F
1 Buy Essays Papers. Pay F
Michele Thomas
 
Example Of Essay About Life Experience
Example Of Essay About Life ExperienceExample Of Essay About Life Experience
Example Of Essay About Life Experience
Michele Thomas
 
Pay For Essay Online Affordable Prices 247 Support - EssayVikings.Com
Pay For Essay Online Affordable Prices 247 Support - EssayVikings.ComPay For Essay Online Affordable Prices 247 Support - EssayVikings.Com
Pay For Essay Online Affordable Prices 247 Support - EssayVikings.Com
Michele Thomas
 
Business Paper Essay On High School Experience
Business Paper Essay On High School ExperienceBusiness Paper Essay On High School Experience
Business Paper Essay On High School Experience
Michele Thomas
 
Frog Writing Papers - Spring Writing Activiti
Frog Writing Papers - Spring Writing ActivitiFrog Writing Papers - Spring Writing Activiti
Frog Writing Papers - Spring Writing Activiti
Michele Thomas
 
Thesis Statement Practice Worksheet B
Thesis Statement Practice Worksheet BThesis Statement Practice Worksheet B
Thesis Statement Practice Worksheet B
Michele Thomas
 
Example Of Position Paper Outline Position Paper D
Example Of Position Paper Outline Position Paper DExample Of Position Paper Outline Position Paper D
Example Of Position Paper Outline Position Paper D
Michele Thomas
 
Benefits Of Professional Paper Writing Service By Su
Benefits Of Professional Paper Writing Service By SuBenefits Of Professional Paper Writing Service By Su
Benefits Of Professional Paper Writing Service By Su
Michele Thomas
 
Thesis Statement Examples For Explanatory Essay - T
Thesis Statement Examples For Explanatory Essay - TThesis Statement Examples For Explanatory Essay - T
Thesis Statement Examples For Explanatory Essay - T
Michele Thomas
 
Research Report Sample Template (8) - TEMPLATE
Research Report Sample Template (8) - TEMPLATEResearch Report Sample Template (8) - TEMPLATE
Research Report Sample Template (8) - TEMPLATE
Michele Thomas
 
Free Printable Writing Paper Templates Page 23
Free Printable Writing Paper Templates Page 23Free Printable Writing Paper Templates Page 23
Free Printable Writing Paper Templates Page 23
Michele Thomas
 
013 How To Write Good Biographical Essay Biogra
013 How To Write Good Biographical Essay Biogra013 How To Write Good Biographical Essay Biogra
013 How To Write Good Biographical Essay Biogra
Michele Thomas
 
How To Write An Assignment Introduction Sample. How To Struct
How To Write An Assignment Introduction Sample. How To StructHow To Write An Assignment Introduction Sample. How To Struct
How To Write An Assignment Introduction Sample. How To Struct
Michele Thomas
 
Manual For Writers Of Research Papers Resear
Manual For Writers Of Research Papers  ResearManual For Writers Of Research Papers  Resear
Manual For Writers Of Research Papers Resear
Michele Thomas
 
Sports Writing Topics. Sports Persuasive Speech Topic
Sports Writing Topics. Sports Persuasive Speech TopicSports Writing Topics. Sports Persuasive Speech Topic
Sports Writing Topics. Sports Persuasive Speech Topic
Michele Thomas
 
006 Examples Of Introductory Paragraphs For Expository Essays ...
006 Examples Of Introductory Paragraphs For Expository Essays ...006 Examples Of Introductory Paragraphs For Expository Essays ...
006 Examples Of Introductory Paragraphs For Expository Essays ...
Michele Thomas
 

More from Michele Thomas (20)

Cara Menulis Angka Dengan Kata Dalam Bahasa Inggris L
Cara Menulis Angka Dengan Kata Dalam Bahasa Inggris LCara Menulis Angka Dengan Kata Dalam Bahasa Inggris L
Cara Menulis Angka Dengan Kata Dalam Bahasa Inggris L
 
Critical Essay Short Persuasive Text Examples
Critical Essay Short Persuasive Text ExamplesCritical Essay Short Persuasive Text Examples
Critical Essay Short Persuasive Text Examples
 
Samanthability - College Essay Writing Tips - Sama
Samanthability - College Essay Writing Tips - SamaSamanthability - College Essay Writing Tips - Sama
Samanthability - College Essay Writing Tips - Sama
 
Prompt Assignment Help In The UK From Top Service WritingSquirrell
Prompt Assignment Help In The UK From Top Service WritingSquirrellPrompt Assignment Help In The UK From Top Service WritingSquirrell
Prompt Assignment Help In The UK From Top Service WritingSquirrell
 
1 Buy Essays Papers. Pay F
1 Buy Essays Papers. Pay F1 Buy Essays Papers. Pay F
1 Buy Essays Papers. Pay F
 
Example Of Essay About Life Experience
Example Of Essay About Life ExperienceExample Of Essay About Life Experience
Example Of Essay About Life Experience
 
Pay For Essay Online Affordable Prices 247 Support - EssayVikings.Com
Pay For Essay Online Affordable Prices 247 Support - EssayVikings.ComPay For Essay Online Affordable Prices 247 Support - EssayVikings.Com
Pay For Essay Online Affordable Prices 247 Support - EssayVikings.Com
 
Business Paper Essay On High School Experience
Business Paper Essay On High School ExperienceBusiness Paper Essay On High School Experience
Business Paper Essay On High School Experience
 
Frog Writing Papers - Spring Writing Activiti
Frog Writing Papers - Spring Writing ActivitiFrog Writing Papers - Spring Writing Activiti
Frog Writing Papers - Spring Writing Activiti
 
Thesis Statement Practice Worksheet B
Thesis Statement Practice Worksheet BThesis Statement Practice Worksheet B
Thesis Statement Practice Worksheet B
 
Example Of Position Paper Outline Position Paper D
Example Of Position Paper Outline Position Paper DExample Of Position Paper Outline Position Paper D
Example Of Position Paper Outline Position Paper D
 
Benefits Of Professional Paper Writing Service By Su
Benefits Of Professional Paper Writing Service By SuBenefits Of Professional Paper Writing Service By Su
Benefits Of Professional Paper Writing Service By Su
 
Thesis Statement Examples For Explanatory Essay - T
Thesis Statement Examples For Explanatory Essay - TThesis Statement Examples For Explanatory Essay - T
Thesis Statement Examples For Explanatory Essay - T
 
Research Report Sample Template (8) - TEMPLATE
Research Report Sample Template (8) - TEMPLATEResearch Report Sample Template (8) - TEMPLATE
Research Report Sample Template (8) - TEMPLATE
 
Free Printable Writing Paper Templates Page 23
Free Printable Writing Paper Templates Page 23Free Printable Writing Paper Templates Page 23
Free Printable Writing Paper Templates Page 23
 
013 How To Write Good Biographical Essay Biogra
013 How To Write Good Biographical Essay Biogra013 How To Write Good Biographical Essay Biogra
013 How To Write Good Biographical Essay Biogra
 
How To Write An Assignment Introduction Sample. How To Struct
How To Write An Assignment Introduction Sample. How To StructHow To Write An Assignment Introduction Sample. How To Struct
How To Write An Assignment Introduction Sample. How To Struct
 
Manual For Writers Of Research Papers Resear
Manual For Writers Of Research Papers  ResearManual For Writers Of Research Papers  Resear
Manual For Writers Of Research Papers Resear
 
Sports Writing Topics. Sports Persuasive Speech Topic
Sports Writing Topics. Sports Persuasive Speech TopicSports Writing Topics. Sports Persuasive Speech Topic
Sports Writing Topics. Sports Persuasive Speech Topic
 
006 Examples Of Introductory Paragraphs For Expository Essays ...
006 Examples Of Introductory Paragraphs For Expository Essays ...006 Examples Of Introductory Paragraphs For Expository Essays ...
006 Examples Of Introductory Paragraphs For Expository Essays ...
 

Recently uploaded

Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
Mohammed Sikander
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 

Recently uploaded (20)

Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 

A Review Paper On Viral Mobile Communications System

  • 1. IJSRST15152 | Received: 30 October 2015 |Accepted: 11 November 2015 | November-December-2015 [(1)5: 12-16] © 2015 IJSRST | Volume 1 | Issue 5 | Print ISSN: 2395-6011 | Online ISSN: 2395-602X Themed Section: Science and Technology 12 A Review paper on Viral Mobile Communications System Dr. Deepak Singh Yadav*, Rajesh Kumar Pandey Department of Computer Science & Engineering, Sachdeva Institute of Technology, Mathura, Uttar Pradesh, India ABSTRACT In this paper a research has been done to overview the viral mobile communication technology. In the modern era the GSM technology is obsolete and a new concept of viral mobile communication in the form of 3G as well as 4G CDMA in spite of GSM for the point-to-point information transportation when the network is stabilised through the research and analysis in the field of viral mobile communication. Due to this research and analysis a new perception with new conception for a new model of the viral mobile technology will be formed. Keywords: Cross Entropy, Hard handover, Soft Handover, Viral Mobile Communication. I. INTRODUCTION Along with the development of 3G and 4G mobile communication system, neither TD-SCDMA (Time Division Synchronous code division multiple access) nor WCDMA (Wide Band Code Division Multiple access) and CDMA2000 (is also known as multi-carrier code division multiple access) can satisfy the mobile service provider and mobile subscriber (MS) with their performance [1,2], which will make new standard and technology develop constantly, supporting the system performance more mature and perfect [3]. The theory of viral mobile communication (VMC) will apply itself to solve the problem of point-to-point information transportation of MS in network [4,5,6], trying to make the MS get rid of the participation and support of the upper equipments, more making vast MS achieving point-to-point information transportation and switch[7,8]. This study introduces the viral communication theory into mobile communication system of 3G and 4G and analyses the corresponding performance. This new technique explores the enabling principles wireless communicators and will demonstrate their fundamental ability to scale and automatically configure themselves through a diverse set of applications including live voice, secure transmission, low power/ high-availability signaling, and sensors with a sense of place. This paper is divided into eight parts. Starting with introduction (Section-I), next section covers the conception of viral mobile communication (Section-II). Moving ahead, viral architecture requirement is discussed (Section-III). After that design principles of viral architecture are discussed (Section-IV), the model of viral mobile communication are discussed (Section- V), the process of MSA soft handover communication are discussed (Section-VI), link capacity equation of the viral mobile communication network are discussed (Section - VII). Finally, conclusions summarize the last section (Section-VIII). II. METHODS AND MATERIAL A. The Conception of Viral Mobile Communication The definition of viral mobile communication (VMC) is to apply the theory of viral communication to 3G and 4G mobile communication system without direct support of upper equipment, devoting itself to realize point-to-point information transportation and switch of MS. Its characteristics are shown below: a. Mutual independency b. Scalability c. Share resources d. Rapid reproduction
  • 2. International Journal of Scientific Research in Science and Technology (www.ijsrst.com) 13 New technologies allow us to make wired and wireless devices that are ad hoc, incrementally installed and populous almost without limit. They need no backbone or infrastructure in order to work as an alternative, they use neighbours to bootstrap both bit delivery and geo location. This re-distributes privileges of communications from a vertically integrated provider to the end-user or end-device and segregates bit delivery from services. Communications can become something you do rather than something you acquire. This is very important issue in economic and social cases that include telephony, media distribution, safety and rising markets. The key idea is communications devices that work with no central backbone and scale almost without bound. They are based on reinterpreting the basic principles of wireless in the glow of efficiently viable digital radios that can expand spectrum capacity even as they use it. This obvious challenge is resolved by real-time RF processing that collaboratively distributes signals and reduces the power required at each node. As with the PC, this fundamental shift in architecture, moves communications intelligence from the core of a network to the ends, and builds upon a viral architecture that enables infinite growth and very much reduced costs of improvement. Our study boundary entails conception of infrastructure free, scalable networks that preserve operating power, interoperate with existing systems, adapt to new radio techniques as they appear, and minimize the cost of functional evolution. This is practicable in the near term. We will demonstrate it through sample applications in domains as diverse as sensor nets and personal telephony. Viral communication architecture is one where elements are independent, scalable and where each new element adds capacity to the system, so that it can be adopted incrementally from a small base and gains accelerating value with scale. B. Viral Architecture Requirements We use the term viral architecture to mean a system that is adopted “virally”. Viral adoption refers to a system architecture that can be adopted incrementally, and gains momentum as it scales. The growth behaviour of such a system can be called viral growth. Although many systems are fairly scalable, many are not viral, because they require a critical mass of adoption before any benefit is achieved [9]. Figure 1: Basic architecture of viral system Ad hoc network is a decentralized type of wireless network. The network is said to be ad hoc because it does not really pre-existing infrastructure. Scalability of a network is defined as the capability of a process, to handle growing amounts of work in a graceful manner or its ability to be distended to accommodate that growth. For example, it can refer to the capability of a system to increase total throughput under an increased load when resources (typically hardware) are added. Each new element of a viral architecture must not reduce the capabilities of those that were there before to gain momentum, each new element must create more value from connecting into the system than from operating alone (Fig.1). That is, each adoption is a “win-win” decision the existing elements gain a little more benefit from the new element, and each new element has a stronger value proposition for joining the system. Momentum results from this process, because a reluctant adopter will eventually be attracted to adopt when the scale reaches his cost/benefit trade-off even when the architecture still has small reach. C. Design Principles of Viral Architecture There are two primary design principles that lead to a viral architecture scalability and independence [10]. The first states that viral systems have to be able to grow almost without bound, and the second requires that its elements operate autonomously, without connection to a central authority. In fundamental nature, one should be able to freely add elements and they should work without connection to a backbone. This works for
  • 3. International Journal of Scientific Research in Science and Technology (www.ijsrst.com) 14 automobiles as long as there are sufficient infrastructures, and we will show that it can work for communications and that the roadways are fundamentally infinite.  Scalability From the point of view of a single handed radio receiver, capacity in bits per second is limited primarily by bandwidth of signals coming into its antenna. Signals whose frequencies overlap cannot be easily distinguished, hence the notion of interference. When the bulk of information services were broadcast services and radios where expensive, this view of spectrum made intelligence. However, from the perspective of electromagnetic propagation in space, information capacity is unlimited. The limit is defined by the processes of detection, not the space itself. The technology of the receivers and the computational architecture of the radio system, not the physics of the space, are the limits to communications capacity. There are a number of methods in common use that prove this point. Space division multiplexing, for example, as used in microwave and satellite links, re- uses the spectrum by restricting either the direction of emission or requiring directivity in the receiving antenna. License is granted to a place, not a merely a band. The fundamental nature of scalable wireless networks is cooperation, a generalization of the phased array. Sheppard’s packet repeater network design works because each node forwards packets of information on behalf of each other node. Since the power needed to reach an adjacent node is reduced by a factor equal or greater to the square of the distance, the total amount of energy used to carry a bit from source to destination is reduced. And since the energy radiates over a narrower region, the total amount of information that can be simultaneously travelling in the network increases as the nodes in the network get denser. In effect, each node is a “tower” for all of the nodes that are nearby the “cells” are defined by who wishes to communicate with whom rather than the topography or zoning requirements of the place. Secondary concerns are that a viral system be future proof and adaptable. In automobiles, the presence of either new cars or new routes does not obsolesce existing ones. A communications device should work indefinitely no matter what other communicators enter the environment and no matter how the underlying communications technology evolves.  Independence The second criterion for a viral system is independence of operation. While this is almost understood by impression of the manner by which they scale, it is a requirement for decentralized growth. It is dictated by the applications we require independence in order to extend communications to cases for which an account or registration process simply does not apply. But more important, “de-centrality” includes a range of autonomous, distributed devices as diverse as remote controls for home entertainment equipment, portable and wearable health monitoring equipment, things placed in the physical world such as security cameras, burglar alarms, environmental sensors, thermostats, and consumer equipment such as digital cameras, personal recorders, and so onward. It is unreasonable to expect that a radio-operated TV remote control would require an account with the local cellular operator or that one would need permission to download the photo from a digital camera. Independence results from the use of a collaborative scheme for spectrum use. The principle is that each participant in a communication has the full capability of the network. Routing, relaying, and signal regeneration are alive in each device. The notion is not radical and is implicit in ad-hoc networks. There, the general definition is that each node is a router. We likewise include routing in the devices, but we extend that notion to the radio layer itself and use the RF signal itself as a routing control parameter. Rather than complicate the design, this allows viral elements to literally sneak a signal around corners or through gaps in the local spectral flux. D. The Model of Viral Mobile Communication There are two kinds of call process of MS in CDMA mobile communication system: one is hard handover that MS only communicate with one base station(BS),which means the connection of MS and BS is broken off firstly and connected successively. The call process is shown in figure 2(MSC is the mobile switch
  • 4. International Journal of Scientific Research in Science and Technology (www.ijsrst.com) 15 center) ; the other is soft handover that the MS communicate with two or more BSs, which means the connection of MS and BSs is connected firstly and broken off successively. The call process is shown in figure 3; the corresponding zone of two segments of arc is soft handover zone. Reason of handover failure will be minimize if we consider viral mobile communication network the process of information transportation among the MSs is shown in fig 4, In the general communication processes shown in fig 2 and fig 3, MSs carry through corresponding call under certain condition viral mobile communication is needed; the algorithm of the information transportation process is given below [11]. Figure 2: Hard handover call process Figure 3: Soft handover call process 1. Assume that Base Station (BS) is microcell. Figure 4: Viral Communication Process 2. Define BSi and MSi, where i=1, 2, 3, 4; 3. The information transportation between MS1 and MS3 can be completed by MS2 indirectly or can be completed by MS4 indirectly. 4. MS1 may choose not to transport the information to corresponding BS1. 5. MS3 may choose not to transport the information to corresponding BS3. 6. Return to general communication process after the VMC finishes. E. The Process of Msa Soft Handover Communication • Soft handover is that the MSB and MSC connect to their corresponding BS1 and BS2 separately. • Construct corresponding forward and backward link. • Soft handover is the MSA connects to BS1 and BS2 together. • The soft handover communication link of MSA and MSB shows in this figure based on above assumption. Figure 5: Soft handover call process (MSA) F. Link Capacity Equation of the Viral Mobile Communication Network The viral mobile communications system is controlled under ideal power; the reverse link equation in every cell can be written as: Where Eb is the energy per bit, No is the noise spectral density, W is the CDMA bandwidth, Rbi is the service bit rate, N is the number of services,         1 0 1 Ns j j N i bi o b S S I X R W N E 
  • 5. International Journal of Scientific Research in Science and Technology (www.ijsrst.com) 16 Ns is the users/cell, I is the total interference, S is the desired signal power, ƞ is the background noise, xj is the voice activity factor, In addition assume that the signal-to-noise threshold received by BS is q,  S q  . In the viral communication network for each cell, defining the parameter of viral mobile communication network, then the link capacity equation can be resulted from formula. • In above formula, Psho is the soft handover probability of MS in microcell. • Pvmc is the probability of viral mobile communication for MS in microcell during soft handover. III. CONCLUSION Finally, I am concluding through deep thinking as this is an under developing technology and hence there is a vast field of expansion in the field of wireless communication. Due to this technology the fundamental ability to scale and auto configuration in life voice, secure transmission, low power / high- availability signaling etc. will be possible. The communication is a very giant field and yet a great exploration is to be done and this viral mobile communicate technology will enable the principle of wireless communication which the world has to see in future and these new principles will apply to the broad band 3G and 4G mobile communication for the betterment and comfort of humanity by point-to-point information system. IV. REFERENCES [1] Chang Soon Kang, Ho-Shin Cho, Dan Keun Sung, “Capacity Analysis of Spectrally Overlaid Macro/Microcellular CDMA Systems Supporting Multiple Types of Traffic”, IEEE Transactions on Vehicular Technology,Vol.52, pp.333-346,March2003. [2] Zhiqiang Zhu, Junqiang Guo, Jiang Hui, “Performance Analysis of Soft Handover Based on Link Balance in Broadband CDMA Systems”,Computer Engineering and Applications, Vol.43, pp.146-148, Aug. 2007. [3] Zhu Zhiqiang, Xu Guangyin, Guo Junqiang, “Soft Handover Algorithm Analysis of Overlaid Cellular in CDMA System Based on Speed and Direction”, Proceedings of the First International Conference on Complex Systems and Applications, pp.753-756, June 2006. [4] AndyLippman,“ViralCommunications”,http://dl.media.mit. edu/viral/viral. Pdf, 2003. [5] Aggelos Bletsas, Andrew Lippman, “Efficient Collaborative (Viral) Communication in OFDM Based LANs” http://web.media.mit.edu/~aggelos/papers/bletsas_isart03.p df,2003. [6] Aggelos Bletsas, ”Low Complexity Virtual Antenna Arrays Using Cooperative Relay Selection”,IWCMC’06, pp.461— 466 ,July 2006. [7] Aggelos Bletsas, Ashish Khisti, Moe Z. Win. Opportunistic Cooperative Diversity with Feedback and Cheap Radios. IEEE Transactions on Wireless Communications, Vol.7, pp.1823—1827, May 2008. [8] Aggelos Bletsas, Hyundong Shin, M.Z.Win, “Cooperative Communications With Outage-Optimal Opportunistic Relaying”, IEEE Transactions on Wireless Communications, Vol.6, pp.1-11, Sep. 2007. [9] Andy Lippman, “Viral Communications”, dl.media.mit.edu viral. pdf , 2003. [10] Andrew Lippman David P.Reed, “Viral Communications” Media Laboratory Research, Draft May 19th, 2003. [11] Zhiqiang Zhu, Guangyin Xu, Lin Xu, Junqiang Guo, “Performance Analysis of Viral CDMA Mobile Communication Based on Cross Entropy” IEEE- 978-1- 4244-3693-4/09, 2009. Bibliographies Rajesh Kumar Pandey was born at Raebareli (U.P.), in India. He received the B. Tech degree in Computer Science & Engineering in 2010 from Feroze Gandhi Institute of Engineering & Technology, Raebareli (U.P.), India. Presently, he is an M.Tech student in Computer Science & Engineering from Sachdeva Institute of Technology, Mathura (U.P.), India. S S I X N R W vmc N E j vmc s bi N i o b                ) 1 ( 1 vmc s sho vmc s P N P N 