The document discusses the development of an automatic testing tool called CI GUI Tool for integrating test cases continuously into a Femto Gateway. The tool is aimed at achieving continuous integration of test cases using an Agile model instead of the conventional Waterfall model. The tool takes test cases from a Jira repository as input and integrates them automatically into the Femto Gateway and Functionality Tester to check for functionality. Continuous integration helps detect bugs early and allows developers to quickly revert code to a bug-free state.
The document discusses two network protocols, GTP and PMIP, that help mobile operators support IP mobility across heterogeneous radio access networks to maintain session continuity. GTP was originally developed for GPRS networks while PMIP is a more recent IETF standard. The document focuses on the technical and economic attributes of GTP and PMIP-based mobility solutions for optimizing interworking between Wi-Fi and other mobile networks in 3G and EPC environments. Operators must choose between these protocols based on their goals and the standards supported by clients.
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Future Technologies and Testing for Fixed Mobile Convergence,SAE and LTE in C...Going LTE
This white paper discusses future technologies for fixed-mobile convergence including LTE and SAE. It defines fixed-mobile convergence as providing consistent services via any fixed or mobile access point. The paper describes the motivation for convergence including mobility and consistent services. It outlines the LTE/SAE introduction and technologies including the evolved packet core and all-IP architecture. Key aspects of LTE such as physical layer channels and protocols are also summarized. The purpose is to support an integrated network through the IP Multimedia Subsystem for high-speed mobile experiences comparable to fixed broadband.
This document compares the next-generation mobile broadband technologies LTE and WiMAX. It describes their quality of service (QoS) structures and how they are designed to support current and future QoS needs to sustain various application requirements. The document provides details on LTE and WiMAX standards, architectures, and QoS support through different bearer types and service flows.
Next generation tech trend for global critical communication standardYi-Hsueh Tsai
Today commercial cellular networks and dedicated public safety systems are two separate technology families for providing terrestrial wide-area wireless communications. With NPSTC, TCCA and ETSI Technical Committee TETRA supporting LTE there is now a clear global consensus that it will be the global standard for next generation broadband public safety networks. In order to provide the best service to both communities, they are establishing common technical standards offers advantages to both communities. Work underway in Release 12 of 3GPP LTE standards will enhance LTE to meet public safety application requirements. The public safety community gets access to the economic and technical advantages generated by the scale of commercial cellular networks, and the commercial cellular community gets the opportunity to address parts of the public safety market as well as gaining enhancements to their systems that have interesting applications to consumers and businesses. Developing the ecosystem also requires each country and user community to develop the right government policy, commercial environment and spectrum plan. Those plans and works are undertaken outside 3GPP’s technical standards area.
The document provides an overview of Long Term Evolution (LTE), the leading 4G mobile broadband technology. It discusses the key drivers behind the evolution to 4G including increasing user demands for speed and bandwidth. It then summarizes the evolution of wireless technologies from 1G to 4G LTE. Key features of LTE that make it superior include peak download speeds of 300Mbps, low latency, support for flexible bandwidths and large cell sizes. The document outlines the LTE network architecture consisting of the radio access network with eNodeBs and the core network known as the Evolved Packet Core. It describes the functions of various core network nodes like the MME, HSS, S-GW and P-GW.
5G RAN - Split of Functions between Central and Distributed UnitEiko Seidel
R3-161285 from 3GPP TSG RAN WG3 Meeting #92 in Nanjing, China, 23 - 27 May 2016
Source: Deutsche Telekom, Orange, T-Mobile US, Telstra, SK Telecom
See: www.3gpp.org
The document shares some practical considerations from an operator viewpoint with the aim to aid the discussions to find reasonable functional split options between central and distributed unit for the NR.
This document discusses the evolution of TETRA technology towards a 4G broadband standard called TETRA 3. It proposes that TETRA 3 should be based on LTE but refined for mission critical use with features like secure encryption, high availability, and support for group communications. The document outlines requirements for TETRA 3 such as harmonized broadband spectrum of at least 2x5 MHz, reuse of LTE infrastructure interfaces, new encryption algorithms, and a standardized control room API. It argues that TETRA 3 needs to support migration from existing TETRA 1 and TETRA 2 networks and should be globally harmonized while allowing interworking with other professional mobile radio standards.
The document discusses two network protocols, GTP and PMIP, that help mobile operators support IP mobility across heterogeneous radio access networks to maintain session continuity. GTP was originally developed for GPRS networks while PMIP is a more recent IETF standard. The document focuses on the technical and economic attributes of GTP and PMIP-based mobility solutions for optimizing interworking between Wi-Fi and other mobile networks in 3G and EPC environments. Operators must choose between these protocols based on their goals and the standards supported by clients.
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Future Technologies and Testing for Fixed Mobile Convergence,SAE and LTE in C...Going LTE
This white paper discusses future technologies for fixed-mobile convergence including LTE and SAE. It defines fixed-mobile convergence as providing consistent services via any fixed or mobile access point. The paper describes the motivation for convergence including mobility and consistent services. It outlines the LTE/SAE introduction and technologies including the evolved packet core and all-IP architecture. Key aspects of LTE such as physical layer channels and protocols are also summarized. The purpose is to support an integrated network through the IP Multimedia Subsystem for high-speed mobile experiences comparable to fixed broadband.
This document compares the next-generation mobile broadband technologies LTE and WiMAX. It describes their quality of service (QoS) structures and how they are designed to support current and future QoS needs to sustain various application requirements. The document provides details on LTE and WiMAX standards, architectures, and QoS support through different bearer types and service flows.
Next generation tech trend for global critical communication standardYi-Hsueh Tsai
Today commercial cellular networks and dedicated public safety systems are two separate technology families for providing terrestrial wide-area wireless communications. With NPSTC, TCCA and ETSI Technical Committee TETRA supporting LTE there is now a clear global consensus that it will be the global standard for next generation broadband public safety networks. In order to provide the best service to both communities, they are establishing common technical standards offers advantages to both communities. Work underway in Release 12 of 3GPP LTE standards will enhance LTE to meet public safety application requirements. The public safety community gets access to the economic and technical advantages generated by the scale of commercial cellular networks, and the commercial cellular community gets the opportunity to address parts of the public safety market as well as gaining enhancements to their systems that have interesting applications to consumers and businesses. Developing the ecosystem also requires each country and user community to develop the right government policy, commercial environment and spectrum plan. Those plans and works are undertaken outside 3GPP’s technical standards area.
The document provides an overview of Long Term Evolution (LTE), the leading 4G mobile broadband technology. It discusses the key drivers behind the evolution to 4G including increasing user demands for speed and bandwidth. It then summarizes the evolution of wireless technologies from 1G to 4G LTE. Key features of LTE that make it superior include peak download speeds of 300Mbps, low latency, support for flexible bandwidths and large cell sizes. The document outlines the LTE network architecture consisting of the radio access network with eNodeBs and the core network known as the Evolved Packet Core. It describes the functions of various core network nodes like the MME, HSS, S-GW and P-GW.
5G RAN - Split of Functions between Central and Distributed UnitEiko Seidel
R3-161285 from 3GPP TSG RAN WG3 Meeting #92 in Nanjing, China, 23 - 27 May 2016
Source: Deutsche Telekom, Orange, T-Mobile US, Telstra, SK Telecom
See: www.3gpp.org
The document shares some practical considerations from an operator viewpoint with the aim to aid the discussions to find reasonable functional split options between central and distributed unit for the NR.
This document discusses the evolution of TETRA technology towards a 4G broadband standard called TETRA 3. It proposes that TETRA 3 should be based on LTE but refined for mission critical use with features like secure encryption, high availability, and support for group communications. The document outlines requirements for TETRA 3 such as harmonized broadband spectrum of at least 2x5 MHz, reuse of LTE infrastructure interfaces, new encryption algorithms, and a standardized control room API. It argues that TETRA 3 needs to support migration from existing TETRA 1 and TETRA 2 networks and should be globally harmonized while allowing interworking with other professional mobile radio standards.
Questionnaires on heterogeneous network, including the femtocellArief Gunawan
This questionnaire is proposed by IMT WG and Convergence WG. One of the objectives of IMT WG is to study service and technology related aspects of the future development of IMT-2000 and IMT-Advanced as well as the requirements and needs of the developing countries.
Mobile Broadband traffic has explosive development in the last several years. The rapid growth in traffic volumes calls for great increase of network capacity, and extension of the coverage of high-data-rate, i.e. enhancement of cell-edge throughput. When the required network capacity is high or coverage enhancement is necessary, the low power nodes (LPNs) could be deployed in the existing network, which then is characterized as heterogeneous network (HetNet). The category of the low power nodes can be Remote radio head (RRH), Micro eNB, Pico eNB (i.e., Hotzone), Home eNB (i.e. Femto), and Relay nodes. Different kinds of nodes can have different transmission power and be deployed for different scenarios.
The key characteristic of “heterogeneous deployment networks” is to introduce low power nodes with heterogeneous coverage laid over the macro coverage. Cell splitting gains and therefore significant capacity improvements can be achieved in a cost-effective manner by deploying network nodes within the low power and the local-area range. HetNet is a promising way to significantly increase the network capacity.
Supplementary information can be found in http://www.3gpp.org/ftp/specs/archive/36_series/36.814/
Regarding the Femtocell questionnaire, one of the objectives of the Convergence Working Group is to study and identify current, emerging and future issues of radio communication that are affected by the convergence of ICT, including fixed-mobile convergence, where the study may include technical, regulatory and business model issues.
A femtocell is a small, low cost, low power access point, enabling to access to a network operated wireless network, located in user or private premises. In term of spectrum, The femtocell shares the licensed wireless spectrum with the macrocell. The femtocell is connected to the operator’s network through an IP broadband backhaul connection such as fiber, DSL or cable.
Femto Forum uses Femtocell Access Point (FAP) terminology for the femtocell base station while 3GPP uses Home Node B (HNB) for 3G femtocell and Home eNodeB (HeNB) for LTE Femtocell.
Several FAPs are connected to the FAP Gateway (FGW) or H(e)NB Gateway which is a mobile operator’s equipment (usually physically located on mobile operator premises) through which the FAP gets access to mobile operator’s core network.
In the previous meetings, convergence working group has developed following documents:
a. Report on the Regulatory Aspect of Fixed Mobile Convergence (doc. AWF-7/OUT-07 and adopted as APT/AWF/REP-09)
b. Draft “Report of the Standardization Progress of Fixed Mobile Convergence” (doc. AWF-8/TMP-03): (continued)
c. Draft report of “FMC Business Model” (doc. AWF-8/TMP-01): (continued)
One of the solutions for fixed-mobile convergence scenario is by utilizing Femtocell, where the femto access point is installed in the customer’s house, covers a very small radius and it is connected to the mobile operator infrastructure via residential DSL or cable broadband connections.
Operators in some countries have deployed this femtocell-based solution. However, in some other countries it is not developed yet or still under study.
In this regard, at the 9th meeting of AWF, it was agreed that WG-IMT and Convergence WG could prepare a Questionnaire on HetNet and Femtocell in Asia Pacific and subsequently be sent to all APT members for their input. It is envisioned that the responses to the Questionnaire would be considered by AWF in the study of HetNet and Femtocell, which may provide useful information to APT members and facilitate the following research. Furthermore, the questionnaire results can be used to imp
This document discusses LTE for critical communications, including drivers, benefits and challenges. It provides an overview of LTE architecture and features/benefits. Key applications for LTE in critical communications are situational awareness applications like video streaming and monitoring/interventional applications like patient telemetry. Critical issues include availability of suitable spectrum, adapting LTE to meet reliability/security needs, and justifying costs through viable business cases and models. Voice services are seen as unsuitable for LTE at this time due to mission critical requirements like resilience and secure point-to-multipoint capability.
This document discusses performance testing for Voice over LTE (VoLTE) networks. It outlines challenges in ensuring high quality VoLTE service and describes key aspects of the network that require testing, including the radio access network, evolved packet core, and IMS core. Specific tests are recommended to evaluate quality of service for VoLTE by analyzing call establishment, quality, handover performance, and more. Large-scale emulation is suggested to simulate real-world user and traffic conditions for comprehensive VoLTE performance testing.
This document provides an overview of the Evolved Packet Core (EPC) network. It discusses the background and objectives of developing the EPC. The EPC architecture includes the Mobility Management Entity (MME), Serving Gateway (SGW), Packet Data Network Gateway (PDN-GW), and Home Subscriber Server (HSS). It also describes how the EPC interconnects with 2G, 3G, and CDMA networks. Major services like data, voice, and messaging are supported. Key functions of the EPC include authentication, policy and charging control, packet routing, mobility management, and IP address allocation.
The document discusses Intelligent Networks (IN). It provides an overview of IN architecture, standards, services, and key concepts like the IN Conceptual Model and Signaling System No. 7 (SS7). The IN Conceptual Model divides the IN architecture into four planes - service plane, global functional plane, distributed functional plane, and physical plane.
Lte mtc - optimizing lte advanced for machine-type communicationsSatya Harish
LTE MTC optimizes LTE Advanced to better support machine-to-machine communications by increasing battery life, reducing device complexity, and enhancing coverage while co-existing with existing mobile broadband services. These optimizations are part of the upcoming Release 13 of the 3GPP standard and will benefit the growing market of connected devices and machines.
This document discusses deploying an IP/MPLS communications network for smart grids. It describes how traditional utility networks use TDM which has limitations for new smart grid applications requiring IP. The document outlines requirements for smart grid networks including bandwidth, security, reliability and manageability. It then describes Nokia's IP/MPLS network solution using products like routers, switches, and a management platform. The network provides migration from TDM, supports legacy and new applications, and enables utilities to improve operational efficiency.
This document discusses enabling reliable transport of teleprotection traffic over IP/MPLS networks for power utilities. It explains that legacy mission-critical applications like teleprotection require stringent transport and differential protection requires symmetric delay. It describes how Nokia IP/MPLS networks can meet these requirements through features like Circuit Emulation Service and Asymmetric Delay Control to attain symmetric delay for teleprotection even over packet networks. It provides examples of Nokia IP/MPLS networks being tested and deployed for teleprotection applications.
LTE femtocells are low-power cellular access points that provide improved 4G coverage and capacity indoors and at hotspots. They connect to the mobile network via broadband and use the same standardized interfaces as macrocells. Femtocells are well-suited for use in homes, businesses and public places to enhance signal strength and deliver premium services to users. While offering benefits, femtocell deployment requires consideration of spectrum allocation, interference management, backhauling and synchronization.
SPEECH QUALITY EVALUATION BASED CODEC FOR VOIP OVER 802.11P ijwmn
Voice over Internet Protocol (VoIP) may provide good services through Vehicular ad hoc networks
(VANETs) platform by providing services to many application scenarios range from safety to comfort.
However, VANETs networks introduce many challenges for supporting voice with QoS requirements. In
this paper, our study is based on Inter-Vehicle voice streaming rely on multi-hop fashion. For this task, a
performance evaluation of various audio CODECs will be analyzed by mean of simulations.
Furthermore, we test the impact of network environment on QoS metrics. To achieve good results,
CODECs behaviour is tested by using mobility information obtained from vehicular traffic generator. The
mobility model is based on the real road maps of an urban environment. Focusing on inter-vehicular
voice traffic quality, we provide simulations results in terms of both user level (MOS) metrics and
network level (such as Losses). According to this performance evaluation, we show that G.723.1 CODEC
worked well in the urban VANET environment.
This document summarizes a mechanism for achieving software compatibility and interoperability between network elements in an open interface, multi-vendor 3G cellular network environment where the network elements may be running unaligned software releases. It describes a capability exchange process where network elements negotiate their supported features and functionality over open interfaces to determine the greatest common capabilities that can be supported between the elements. The capability exchange allows elements running different software releases to still communicate as long as they support the agreed upon common capabilities.
This document discusses various communication network types used in substations, including their applications, benefits, and design considerations. It covers leased services, fiber optic cables, pilot wire systems, and microwave networks. The key points are:
- Communication networks in substations are increasingly using Ethernet and packet-based networks over copper or legacy time-domain systems due to higher data rates and lower costs.
- Performance criteria for circuits include bandwidth needs, latency, outage tolerance, and restoration times.
- Common leased circuit options are POTS, four-wire AC/digital, frame relay, DS-1, and cellular. Fiber access is increasingly provided over copper.
- Pilot wire systems using copper are being
This document summarizes a seminar report on 4G cellular networks using WiMAX technology. The report discusses WiMAX network architectures, standards, features and modulation schemes. It analyzes WiMAX network performance by simulating handovers between WiMAX, UMTS and WiFi networks. The simulation results show that a WiMAX-WiMAX environment provides significantly higher throughput, lower end-to-end delay and jitter compared to heterogeneous handovers between different network types.
This document discusses communications network requirements for substation automation. It describes how utilities are adopting IP and Ethernet-based intelligent electronic devices (IEDs) to improve grid performance and efficiency. This requires new communications network infrastructures within substations and between substations and control centers to handle increased traffic. The document outlines architectures that segment intra-substation and wide area network communications according to standards like IEC 61850. It also provides an example case study of a smart substation project in France where Nokia is implementing digital substations for grid improvements.
The document discusses key concepts related to Next Generation Networks (NGN). It describes the NGN reference architecture which includes a transfer network to carry information flows, a network control for establishing links, and service control related to the final service provided to users. It also discusses NGN services, quality of service parameters, mobility, nomadism, presence management, resource control, identification and authentication, metering and monitoring, and security issues in NGN. Finally, it provides examples of NGN soft switch architecture and BSNL's migration strategy to NGN.
Effective and Secure Scheme for Video Multicasting using Real Time Transport ...IRJET Journal
This document summarizes a research paper that proposes an effective and secure scheme for video multicasting using the Real-Time Transport Protocol (RTP). The system allows users to stream video over a local area network in real-time. It uses RTP to transport video data and the Advanced Encryption Standard (AES) to encrypt the data for security. The system was tested on a local network with a server transmitting video to multiple client systems. Testing showed the system could efficiently multicast high-quality video streams over long distances using LAN cables while maintaining bandwidth efficiency and quality of service compared to unicast transmission.
NGN Technologies is one of India’s Best Consulting Company, providing comprehensive, sophisticated, and yet intuitive range of Staffing Solutions, Software Training, Software Solutions for Telecom and IT Domains, Website Design and Development not only in INDIA but worldwide.
As Telecommunications specialists, we have an unrivalled ability to deliver a unique syllabus, focused on Telecommunications, Voice, Data, Systems Support and key emerging technologies. Our World-leading curriculum includes different TELECOM TRAINING ROADMAPS, unique courses and seminars, and Bespoke training. Our Course Curriculum and TRAINING ROADMAPS provide authoritative training in:
1. LTE / 4G, UMTS / 3G, GSM, GPRS, EDGE
2. Telecommunications, Convergence, Billing, IPv6, IPv4, Mobile IP, Voice over IP (SIP, IMS, H.323, Megaco, MGCP)
3. Specialized courses on C/C++/Java/C#, .NET and Telecom software Development on Linux and Windows
4. OSS / BSS, Cloud Computing (SAAS, IAAS, PAAS), SOA, SDP
This document provides an overview of Pakistan Telecommunication Company Limited's telecommunications network. It discusses the company's vision and products, including its next generation network, switching system, and ring topology which allows calls to reroute if one side of the network goes down. It also describes the service switching points that initially handle calls and use SS7 protocols for call setup, as well as the different types of workstations used to monitor the network.
This document summarizes key aspects of practical LTE network design and deployment. It describes the end-to-end LTE network architecture including the evolved NodeB (eNB), Evolved Packet Core (EPC), and interfaces. It then analyzes LTE coverage and link budgets for different deployment scenarios. Dimensioning and design considerations are discussed including throughput, capacity, and quality of service (QoS). Latency is analyzed and compared to HSPA+. The document provides guidance on commercial LTE network planning and implementation.
This document analyzes the level of fluoride in drinking water samples from five villages in Ambikapur, Sarguja District, Chhattisgarh, India. The study aims to determine the amount of fluoride to avoid health issues like dental and skeletal fluorosis. High fluoride levels can weaken bones and cause tooth discoloration. The area has a subtropical climate with hot summers and monsoon rainfall. Groundwater is an important source and occurs in shallow weathered rocks and deeper fractured areas. Samples will be analyzed to ensure fluoride levels are in the optimal range for oral health and avoid excessive intake that can impact health.
Identify Defects in Gears Using Digital Image ProcessingIJERD Editor
International Journal of Engineering Research and Development is an international premier peer reviewed open access engineering and technology journal promoting the discovery, innovation, advancement and dissemination of basic and transitional knowledge in engineering, technology and related disciplines.
This document compares the performance of an LQR controller and PD controller for stabilizing a double inverted pendulum system. It first describes the nonlinear dynamics of a double inverted pendulum and derives its equations of motion. It then linearizes the system around the equilibrium point to obtain a state space model. Next, it analyzes the stability, controllability and observability of the linearized system. Finally, it implements both an LQR controller and PD controller in MATLAB/Simulink to control the double inverted pendulum and compare their performance with respect to the pendulum angles and cart position.
Questionnaires on heterogeneous network, including the femtocellArief Gunawan
This questionnaire is proposed by IMT WG and Convergence WG. One of the objectives of IMT WG is to study service and technology related aspects of the future development of IMT-2000 and IMT-Advanced as well as the requirements and needs of the developing countries.
Mobile Broadband traffic has explosive development in the last several years. The rapid growth in traffic volumes calls for great increase of network capacity, and extension of the coverage of high-data-rate, i.e. enhancement of cell-edge throughput. When the required network capacity is high or coverage enhancement is necessary, the low power nodes (LPNs) could be deployed in the existing network, which then is characterized as heterogeneous network (HetNet). The category of the low power nodes can be Remote radio head (RRH), Micro eNB, Pico eNB (i.e., Hotzone), Home eNB (i.e. Femto), and Relay nodes. Different kinds of nodes can have different transmission power and be deployed for different scenarios.
The key characteristic of “heterogeneous deployment networks” is to introduce low power nodes with heterogeneous coverage laid over the macro coverage. Cell splitting gains and therefore significant capacity improvements can be achieved in a cost-effective manner by deploying network nodes within the low power and the local-area range. HetNet is a promising way to significantly increase the network capacity.
Supplementary information can be found in http://www.3gpp.org/ftp/specs/archive/36_series/36.814/
Regarding the Femtocell questionnaire, one of the objectives of the Convergence Working Group is to study and identify current, emerging and future issues of radio communication that are affected by the convergence of ICT, including fixed-mobile convergence, where the study may include technical, regulatory and business model issues.
A femtocell is a small, low cost, low power access point, enabling to access to a network operated wireless network, located in user or private premises. In term of spectrum, The femtocell shares the licensed wireless spectrum with the macrocell. The femtocell is connected to the operator’s network through an IP broadband backhaul connection such as fiber, DSL or cable.
Femto Forum uses Femtocell Access Point (FAP) terminology for the femtocell base station while 3GPP uses Home Node B (HNB) for 3G femtocell and Home eNodeB (HeNB) for LTE Femtocell.
Several FAPs are connected to the FAP Gateway (FGW) or H(e)NB Gateway which is a mobile operator’s equipment (usually physically located on mobile operator premises) through which the FAP gets access to mobile operator’s core network.
In the previous meetings, convergence working group has developed following documents:
a. Report on the Regulatory Aspect of Fixed Mobile Convergence (doc. AWF-7/OUT-07 and adopted as APT/AWF/REP-09)
b. Draft “Report of the Standardization Progress of Fixed Mobile Convergence” (doc. AWF-8/TMP-03): (continued)
c. Draft report of “FMC Business Model” (doc. AWF-8/TMP-01): (continued)
One of the solutions for fixed-mobile convergence scenario is by utilizing Femtocell, where the femto access point is installed in the customer’s house, covers a very small radius and it is connected to the mobile operator infrastructure via residential DSL or cable broadband connections.
Operators in some countries have deployed this femtocell-based solution. However, in some other countries it is not developed yet or still under study.
In this regard, at the 9th meeting of AWF, it was agreed that WG-IMT and Convergence WG could prepare a Questionnaire on HetNet and Femtocell in Asia Pacific and subsequently be sent to all APT members for their input. It is envisioned that the responses to the Questionnaire would be considered by AWF in the study of HetNet and Femtocell, which may provide useful information to APT members and facilitate the following research. Furthermore, the questionnaire results can be used to imp
This document discusses LTE for critical communications, including drivers, benefits and challenges. It provides an overview of LTE architecture and features/benefits. Key applications for LTE in critical communications are situational awareness applications like video streaming and monitoring/interventional applications like patient telemetry. Critical issues include availability of suitable spectrum, adapting LTE to meet reliability/security needs, and justifying costs through viable business cases and models. Voice services are seen as unsuitable for LTE at this time due to mission critical requirements like resilience and secure point-to-multipoint capability.
This document discusses performance testing for Voice over LTE (VoLTE) networks. It outlines challenges in ensuring high quality VoLTE service and describes key aspects of the network that require testing, including the radio access network, evolved packet core, and IMS core. Specific tests are recommended to evaluate quality of service for VoLTE by analyzing call establishment, quality, handover performance, and more. Large-scale emulation is suggested to simulate real-world user and traffic conditions for comprehensive VoLTE performance testing.
This document provides an overview of the Evolved Packet Core (EPC) network. It discusses the background and objectives of developing the EPC. The EPC architecture includes the Mobility Management Entity (MME), Serving Gateway (SGW), Packet Data Network Gateway (PDN-GW), and Home Subscriber Server (HSS). It also describes how the EPC interconnects with 2G, 3G, and CDMA networks. Major services like data, voice, and messaging are supported. Key functions of the EPC include authentication, policy and charging control, packet routing, mobility management, and IP address allocation.
The document discusses Intelligent Networks (IN). It provides an overview of IN architecture, standards, services, and key concepts like the IN Conceptual Model and Signaling System No. 7 (SS7). The IN Conceptual Model divides the IN architecture into four planes - service plane, global functional plane, distributed functional plane, and physical plane.
Lte mtc - optimizing lte advanced for machine-type communicationsSatya Harish
LTE MTC optimizes LTE Advanced to better support machine-to-machine communications by increasing battery life, reducing device complexity, and enhancing coverage while co-existing with existing mobile broadband services. These optimizations are part of the upcoming Release 13 of the 3GPP standard and will benefit the growing market of connected devices and machines.
This document discusses deploying an IP/MPLS communications network for smart grids. It describes how traditional utility networks use TDM which has limitations for new smart grid applications requiring IP. The document outlines requirements for smart grid networks including bandwidth, security, reliability and manageability. It then describes Nokia's IP/MPLS network solution using products like routers, switches, and a management platform. The network provides migration from TDM, supports legacy and new applications, and enables utilities to improve operational efficiency.
This document discusses enabling reliable transport of teleprotection traffic over IP/MPLS networks for power utilities. It explains that legacy mission-critical applications like teleprotection require stringent transport and differential protection requires symmetric delay. It describes how Nokia IP/MPLS networks can meet these requirements through features like Circuit Emulation Service and Asymmetric Delay Control to attain symmetric delay for teleprotection even over packet networks. It provides examples of Nokia IP/MPLS networks being tested and deployed for teleprotection applications.
LTE femtocells are low-power cellular access points that provide improved 4G coverage and capacity indoors and at hotspots. They connect to the mobile network via broadband and use the same standardized interfaces as macrocells. Femtocells are well-suited for use in homes, businesses and public places to enhance signal strength and deliver premium services to users. While offering benefits, femtocell deployment requires consideration of spectrum allocation, interference management, backhauling and synchronization.
SPEECH QUALITY EVALUATION BASED CODEC FOR VOIP OVER 802.11P ijwmn
Voice over Internet Protocol (VoIP) may provide good services through Vehicular ad hoc networks
(VANETs) platform by providing services to many application scenarios range from safety to comfort.
However, VANETs networks introduce many challenges for supporting voice with QoS requirements. In
this paper, our study is based on Inter-Vehicle voice streaming rely on multi-hop fashion. For this task, a
performance evaluation of various audio CODECs will be analyzed by mean of simulations.
Furthermore, we test the impact of network environment on QoS metrics. To achieve good results,
CODECs behaviour is tested by using mobility information obtained from vehicular traffic generator. The
mobility model is based on the real road maps of an urban environment. Focusing on inter-vehicular
voice traffic quality, we provide simulations results in terms of both user level (MOS) metrics and
network level (such as Losses). According to this performance evaluation, we show that G.723.1 CODEC
worked well in the urban VANET environment.
This document summarizes a mechanism for achieving software compatibility and interoperability between network elements in an open interface, multi-vendor 3G cellular network environment where the network elements may be running unaligned software releases. It describes a capability exchange process where network elements negotiate their supported features and functionality over open interfaces to determine the greatest common capabilities that can be supported between the elements. The capability exchange allows elements running different software releases to still communicate as long as they support the agreed upon common capabilities.
This document discusses various communication network types used in substations, including their applications, benefits, and design considerations. It covers leased services, fiber optic cables, pilot wire systems, and microwave networks. The key points are:
- Communication networks in substations are increasingly using Ethernet and packet-based networks over copper or legacy time-domain systems due to higher data rates and lower costs.
- Performance criteria for circuits include bandwidth needs, latency, outage tolerance, and restoration times.
- Common leased circuit options are POTS, four-wire AC/digital, frame relay, DS-1, and cellular. Fiber access is increasingly provided over copper.
- Pilot wire systems using copper are being
This document summarizes a seminar report on 4G cellular networks using WiMAX technology. The report discusses WiMAX network architectures, standards, features and modulation schemes. It analyzes WiMAX network performance by simulating handovers between WiMAX, UMTS and WiFi networks. The simulation results show that a WiMAX-WiMAX environment provides significantly higher throughput, lower end-to-end delay and jitter compared to heterogeneous handovers between different network types.
This document discusses communications network requirements for substation automation. It describes how utilities are adopting IP and Ethernet-based intelligent electronic devices (IEDs) to improve grid performance and efficiency. This requires new communications network infrastructures within substations and between substations and control centers to handle increased traffic. The document outlines architectures that segment intra-substation and wide area network communications according to standards like IEC 61850. It also provides an example case study of a smart substation project in France where Nokia is implementing digital substations for grid improvements.
The document discusses key concepts related to Next Generation Networks (NGN). It describes the NGN reference architecture which includes a transfer network to carry information flows, a network control for establishing links, and service control related to the final service provided to users. It also discusses NGN services, quality of service parameters, mobility, nomadism, presence management, resource control, identification and authentication, metering and monitoring, and security issues in NGN. Finally, it provides examples of NGN soft switch architecture and BSNL's migration strategy to NGN.
Effective and Secure Scheme for Video Multicasting using Real Time Transport ...IRJET Journal
This document summarizes a research paper that proposes an effective and secure scheme for video multicasting using the Real-Time Transport Protocol (RTP). The system allows users to stream video over a local area network in real-time. It uses RTP to transport video data and the Advanced Encryption Standard (AES) to encrypt the data for security. The system was tested on a local network with a server transmitting video to multiple client systems. Testing showed the system could efficiently multicast high-quality video streams over long distances using LAN cables while maintaining bandwidth efficiency and quality of service compared to unicast transmission.
NGN Technologies is one of India’s Best Consulting Company, providing comprehensive, sophisticated, and yet intuitive range of Staffing Solutions, Software Training, Software Solutions for Telecom and IT Domains, Website Design and Development not only in INDIA but worldwide.
As Telecommunications specialists, we have an unrivalled ability to deliver a unique syllabus, focused on Telecommunications, Voice, Data, Systems Support and key emerging technologies. Our World-leading curriculum includes different TELECOM TRAINING ROADMAPS, unique courses and seminars, and Bespoke training. Our Course Curriculum and TRAINING ROADMAPS provide authoritative training in:
1. LTE / 4G, UMTS / 3G, GSM, GPRS, EDGE
2. Telecommunications, Convergence, Billing, IPv6, IPv4, Mobile IP, Voice over IP (SIP, IMS, H.323, Megaco, MGCP)
3. Specialized courses on C/C++/Java/C#, .NET and Telecom software Development on Linux and Windows
4. OSS / BSS, Cloud Computing (SAAS, IAAS, PAAS), SOA, SDP
This document provides an overview of Pakistan Telecommunication Company Limited's telecommunications network. It discusses the company's vision and products, including its next generation network, switching system, and ring topology which allows calls to reroute if one side of the network goes down. It also describes the service switching points that initially handle calls and use SS7 protocols for call setup, as well as the different types of workstations used to monitor the network.
This document summarizes key aspects of practical LTE network design and deployment. It describes the end-to-end LTE network architecture including the evolved NodeB (eNB), Evolved Packet Core (EPC), and interfaces. It then analyzes LTE coverage and link budgets for different deployment scenarios. Dimensioning and design considerations are discussed including throughput, capacity, and quality of service (QoS). Latency is analyzed and compared to HSPA+. The document provides guidance on commercial LTE network planning and implementation.
This document analyzes the level of fluoride in drinking water samples from five villages in Ambikapur, Sarguja District, Chhattisgarh, India. The study aims to determine the amount of fluoride to avoid health issues like dental and skeletal fluorosis. High fluoride levels can weaken bones and cause tooth discoloration. The area has a subtropical climate with hot summers and monsoon rainfall. Groundwater is an important source and occurs in shallow weathered rocks and deeper fractured areas. Samples will be analyzed to ensure fluoride levels are in the optimal range for oral health and avoid excessive intake that can impact health.
Identify Defects in Gears Using Digital Image ProcessingIJERD Editor
International Journal of Engineering Research and Development is an international premier peer reviewed open access engineering and technology journal promoting the discovery, innovation, advancement and dissemination of basic and transitional knowledge in engineering, technology and related disciplines.
This document compares the performance of an LQR controller and PD controller for stabilizing a double inverted pendulum system. It first describes the nonlinear dynamics of a double inverted pendulum and derives its equations of motion. It then linearizes the system around the equilibrium point to obtain a state space model. Next, it analyzes the stability, controllability and observability of the linearized system. Finally, it implements both an LQR controller and PD controller in MATLAB/Simulink to control the double inverted pendulum and compare their performance with respect to the pendulum angles and cart position.
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...IJERD Editor
This document presents a mathematical model for determining survival probabilities of aldosterone-producing adenoma due to stress. It considers two non-cumulative damage shock models where biological systems are subject to random shocks that can cause damage. The initial shock process is split into three independent Poisson processes based on the distribution of small, intermediate, and large damage. Probabilities of survival are determined for each damage interval. The model also considers how administration of low-salt and high-salt diets cause shock effects in terms of aldosterone levels and the resulting damage to biological systems in the form of blood pressure. The study of patient data revealed that higher stress levels can cause permanent damage.
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
call for paper 2012, hard copy of journal, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...IJERD Editor
1. The document summarizes research on synthesizing an infrared transparent glass based on descriptions in an ancient Indian text called AMSHUBODHINI. Raw materials were mixed in ratios specified in the text and melted to produce a non-hygroscopic greenish-yellow calcium glass.
2. Characterization of the glass found it to be transparent in the infrared wavelength range of 5000 to 1200 cm-1, comparable to calcium fluoride glass. Unlike other infrared transparent materials which are hygroscopic, this glass was found to be non-hygroscopic.
3. The research successfully produced an infrared transparent glass from ancient text specifications. The glass has potential infrared applications and advantages over other materials due to its
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...IJERD Editor
The document proposes three types of network intrusion detection to analyze intrusion detection methods:
1. Type 1 detection positively detects an intrusion in network packets within a time period.
2. Type 2 detection detects symptoms of an intrusion in network packets, requiring further analysis.
3. Type 3 detection does not detect any intrusion in network packets within a time period.
The types are meant to comprehensively categorize all possible outcomes of a local landline network intrusion detection system analyzing network traffic over a specific time interval, such as a 24-hour period.
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...IJERD Editor
This document summarizes a study on the effect of heat treatment on the microstructure and mechanical properties of medium carbon steel. Two grades of steel were tested, one with copper and one without. Samples underwent various heat treatments including annealing, normalizing, quenching, and tempering at different temperatures. Hardness, ultimate tensile strength, and ductility were then measured. Results showed that steel with copper had higher hardness and strength but lower ductility. Hardness and strength decreased with increasing tempering temperature, while ductility increased. The study provides data on the mechanical properties and microstructure of heat treated medium carbon steel.
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...IJERD Editor
The document discusses optimization and production of polyethersulfone ultrafiltration flat sheet membranes using lithium chloride as an additive. Polyethersulfone membranes were prepared using various concentrations of lithium chloride (1-5wt%) in the casting solution. Membranes produced with 2wt% lithium chloride had the lowest molecular weight cutoff. Higher lithium chloride concentrations beyond 2wt% resulted in increased molecular weight cutoff. Pure water permeability was highest for membranes with 5wt% lithium chloride due to lithium chloride's nucleophilic properties in the solvent.
This document describes an LTE network simulator and emulator software that was developed for educational purposes. The simulator models the main components of an LTE network, including the UE, eNodeB, MME, HSS, S-GW and P-GW. It allows users to simulate LTE call flows by running signaling messages between nodes either continuously or step-by-step. The emulator generates real signaling packets that are captured and analyzed using Wireshark, creating an immersive simulation environment for learning about LTE networks. The software provides a useful tool for teaching the latest 4G mobile communication technology.
A VNF modeling approach for verification purposesIJECEIAES
Network Function Virtualization (NFV) architectures are emerging to increase networks flexibility. However, this renewed scenario poses new challenges, because virtualized networks, need to be carefully verified before being actually deployed in production environments in order to preserve network coherency (e.g., absence of forwarding loops, preservation of security on network traffic, etc.). Nowadays, model checking tools, SAT solvers, and Theorem Provers are available for formal verification of such properties in virtualized networks. Unfortunately, most of those verification tools accept input descriptions written in specification languages that are difficult to use for people not experienced in formal methods. Also, in order to enable the use of formal verification tools in real scenarios, vendors of Virtual Network Functions (VNFs) should provide abstract mathematical models of their functions, coded in the specific input languages of the verification tools. This process is error-prone, time-consuming, and often outside the VNF developers’ expertise. This paper presents a framework that we designed for automatically extracting verification models starting from a Java-based representation of a given VNF. It comprises a Java library of classes to define VNFs in a more developer-friendly way, and a tool to translate VNF definitions into formal verification models of different verification tools.
A proposed model develops a low-cost PLC-based GSM control module that integrates mobile applications and home/industrial automation technologies. The model uses a programmable logic controller connected to a microcontroller to control devices via SMS messages sent over the GSM network from a mobile phone. The microcontroller encodes and decodes SMS messages using AT commands to interface with the PLC and control connected devices remotely.
A Proposed Cost Effective Prototype Model for PLC Based GSM Remote Control in...IOSR Journals
The document proposes a cost effective prototype model for a PLC-based GSM remote control system for home and industrial automation. The model integrates mobile application platforms with automation technologies using a low-cost PLC-based GSM control module. It discusses using a Siemens S7-1200 PLC, encoding/decoding SMS messages, wireless industrial communication standards, mobile SCADA systems, and programming PLCs using ladder logic. The goal is to develop an efficient system for remotely monitoring and controlling devices via cellular networks or the internet from a mobile phone.
NETKIT is a software component-based approach to programmable networks. It uses a lightweight component model to provide a uniform programming approach across all layers of the network. NETKIT implements a component model with interfaces, receptacles, bindings, and capsules. It also includes reflective meta-models to allow inspection and reconfiguration of components. Examples using NETKIT demonstrate simple network topologies and exploring ARP behavior.
This document discusses over-the-air programming (OAP) in wireless sensor networks. It provides an overview of OAP, explaining that it is necessary for reprogramming sensor nodes remotely after deployment. It describes some common OAP protocols used in wireless sensor networks and discusses key aspects of OAP, including receiving code wirelessly and storing it for installation upon reboot.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
The document discusses integrating Wi-Fi networks into the mobile packet core to enable seamless connectivity across cellular and Wi-Fi networks. It describes two approaches: untrusted Wi-Fi access which uses IPsec tunnels but places a burden on devices, and trusted Wi-Fi access which uses the 802.1x authentication protocol to authenticate devices on Wi-Fi networks in a simpler way. Trusted Wi-Fi access involves a new network element called the Trusted WLAN Access Gateway (TWAG) that interfaces between Wi-Fi networks and the mobile packet core. The document outlines the key standards and technologies needed to make this heterogeneous network vision a reality.
Handover management scheme in LTE FEMTOCELL networksijcsit
This document discusses handover management in LTE femtocell networks. It presents the architecture of LTE femtocell networks and investigates different handover scenarios, particularly macrocell to femtocell handover which is difficult due to the large number of candidate femtocells. The document proposes using the HeNB Policy Function entity to optimize handover decision making by selecting the target femtocell based on constraints to make the optimal decision and reduce unnecessary handovers. An analytical model is also presented to evaluate handover signalling costs.
Dr. Wagdy Anis Aziz has over 17 years of experience in mobile core networks and roaming. He has a Ph.D. in design and analysis of IP Multimedia Subsystem (IMS) and has published several papers in this area. Currently he is a senior manager of core network support at Mobinil in Egypt, where he has led many expansion and upgrade projects involving vendors such as Nokia, Huawei, and Ericsson. His research interests include 5G, IoT, cloud computing, and network security.
Towards achieving-high-performance-in-5g-mobile-packet-cores-user-plane-functionEiko Seidel
White Paper Intel SK Telekom
This paper presents the architecture for a user plane function (UPF) in the mobile packet core (MPC) targeting 5G deployments.
Zigbee sensor network integrated with 4 g for iot applicationsgoodgood
This document discusses integrating Zigbee wireless sensor networks with 4G technology. It proposes a system where Zigbee sensor nodes in multiple PANs (personal area networks) transmit real-time multimedia data through a processing controller unit connected to a WiMAX base station. This allows data to be transmitted over long distances through the 4G network in a secure manner. The document analyzes the performance of this integrated system by simulating video conferencing, voice, and data applications. The results show low packet delay, jitter, and end-to-end delay, indicating the system can support high-quality multimedia transmission over long distances with minimal delays.
Crypto Mark Scheme for Fast Pollution Detection and Resistance over NetworkingIRJET Journal
The document proposes a new scheme called HOPVOTE to efficiently detect pollution attacks in networks. HOPVOTE is a packet HOP_VOTE technique that attaches an encrypted key to each packet to verify its integrity at each hop. It aims to rapidly identify polluters and misbehaving data/routes. The scheme uses keybit verification and cache-based recovery to identify and block nodes that drop or modify data, and recovers polluted data for retransmission. Simulation results show the scheme can effectively detect pollution attacks with low overhead. Future work will analyze routing performance under common network applications and flows.
The document discusses several network configuration protocols:
- NETCONF uses XML and RPC to install, manipulate, and delete configurations on network devices. It operates over SSH.
- YANG is a data modeling language used to define configuration and state data for NETCONF in XML format.
- RESTCONF provides RESTful operations on NETCONF datastores containing YANG data, using HTTP.
Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...IAEME Publication
This document discusses dynamic cluster-based adaptive gateway discovery mechanisms for integrating mobile ad hoc networks (MANETs) with the Internet. It begins by introducing the problem and outlines existing solutions. It then proposes a new architecture using dynamic clusters and mobile gateways. Key points of the proposed approach include dynamically adjusting the TTL value and periodicity of gateway advertisements based on network characteristics. The paper evaluates the approach through simulations in NS-2, finding it increases reliability and performance metrics like delivery ratio and delay. In conclusion, dynamic cluster-based gateways help provide reliable Internet access for MANET nodes with varying mobility.
Security Testing of Network Protocol ImplementationIRJET Journal
This document discusses security testing methods for network protocol implementations. It proposes a new framework called FuSeBMC that uses a combination of fuzzing and symbolic execution to detect security vulnerabilities. FuSeBMC generates test input packets using fuzzing to guide symbolic execution, allowing it to achieve higher code coverage than using the techniques individually. The document evaluates FuSeBMC on a vulnerable FTP server, finding it can detect vulnerabilities faster than other tools like ESBMC, KLEE, and Map2Check. FuSeBMC provides an effective approach for security testing of network protocol implementations.
This document discusses softswitches, which are central devices that connect phone calls entirely through software running on computer systems, replacing physical switchboards. It provides background on softswitches and their advantages over hardware switches, noting they can reduce costs, improve services, and facilitate migration to IP networks. Key elements of a softswitch architecture are described, including media gateways and call agents. Benefits of softswitch architecture for wireless networks are outlined, such as enabling distributed switching to reduce costs compared to centralized hardware switches.
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksIJERD Editor
Distributed Denial of Service (DDoS) Attacks became a massive threat to the Internet. Traditional
Architecture of internet is vulnerable to the attacks like DDoS. Attacker primarily acquire his army of Zombies,
then that army will be instructed by the Attacker that when to start an attack and on whom the attack should be
done. In this paper, different techniques which are used to perform DDoS Attacks, Tools that were used to
perform Attacks and Countermeasures in order to detect the attackers and eliminate the Bandwidth Distributed
Denial of Service attacks (B-DDoS) are reviewed. DDoS Attacks were done by using various Flooding
techniques which are used in DDoS attack.
The main purpose of this paper is to design an architecture which can reduce the Bandwidth
Distributed Denial of service Attack and make the victim site or server available for the normal users by
eliminating the zombie machines. Our Primary focus of this paper is to dispute how normal machines are
turning into zombies (Bots), how attack is been initiated, DDoS attack procedure and how an organization can
save their server from being a DDoS victim. In order to present this we implemented a simulated environment
with Cisco switches, Routers, Firewall, some virtual machines and some Attack tools to display a real DDoS
attack. By using Time scheduling, Resource Limiting, System log, Access Control List and some Modular
policy Framework we stopped the attack and identified the Attacker (Bot) machines
Hearing loss is one of the most common human impairments. It is estimated that by year 2015 more
than 700 million people will suffer mild deafness. Most can be helped by hearing aid devices depending on the
severity of their hearing loss. This paper describes the implementation and characterization details of a dual
channel transmitter front end (TFE) for digital hearing aid (DHA) applications that use novel micro
electromechanical- systems (MEMS) audio transducers and ultra-low power-scalable analog-to-digital
converters (ADCs), which enable a very-low form factor, energy-efficient implementation for next-generation
DHA. The contribution of the design is the implementation of the dual channel MEMS microphones and powerscalable
ADC system.
Influence of tensile behaviour of slab on the structural Behaviour of shear c...IJERD Editor
-A composite beam is composed of a steel beam and a slab connected by means of shear connectors
like studs installed on the top flange of the steel beam to form a structure behaving monolithically. This study
analyzes the effects of the tensile behavior of the slab on the structural behavior of the shear connection like slip
stiffness and maximum shear force in composite beams subjected to hogging moment. The results show that the
shear studs located in the crack-concentration zones due to large hogging moments sustain significantly smaller
shear force and slip stiffness than the other zones. Moreover, the reduction of the slip stiffness in the shear
connection appears also to be closely related to the change in the tensile strain of rebar according to the increase
of the load. Further experimental and analytical studies shall be conducted considering variables such as the
reinforcement ratio and the arrangement of shear connectors to achieve efficient design of the shear connection
in composite beams subjected to hogging moment.
Gold prospecting using Remote Sensing ‘A case study of Sudan’IJERD Editor
Gold has been extracted from northeast Africa for more than 5000 years, and this may be the first
place where the metal was extracted. The Arabian-Nubian Shield (ANS) is an exposure of Precambrian
crystalline rocks on the flanks of the Red Sea. The crystalline rocks are mostly Neoproterozoic in age. ANS
includes the nations of Israel, Jordan. Egypt, Saudi Arabia, Sudan, Eritrea, Ethiopia, Yemen, and Somalia.
Arabian Nubian Shield Consists of juvenile continental crest that formed between 900 550 Ma, when intra
oceanic arc welded together along ophiolite decorated arc. Primary Au mineralization probably developed in
association with the growth of intra oceanic arc and evolution of back arc. Multiple episodes of deformation
have obscured the primary metallogenic setting, but at least some of the deposits preserve evidence that they
originate as sea floor massive sulphide deposits.
The Red Sea Hills Region is a vast span of rugged, harsh and inhospitable sector of the Earth with
inimical moon-like terrain, nevertheless since ancient times it is famed to be an abode of gold and was a major
source of wealth for the Pharaohs of ancient Egypt. The Pharaohs old workings have been periodically
rediscovered through time. Recent endeavours by the Geological Research Authority of Sudan led to the
discovery of a score of occurrences with gold and massive sulphide mineralizations. In the nineties of the
previous century the Geological Research Authority of Sudan (GRAS) in cooperation with BRGM utilized
satellite data of Landsat TM using spectral ratio technique to map possible mineralized zones in the Red Sea
Hills of Sudan. The outcome of the study mapped a gossan type gold mineralization. Band ratio technique was
applied to Arbaat area and a signature of alteration zone was detected. The alteration zones are commonly
associated with mineralization. The alteration zones are commonly associated with mineralization. A filed check
confirmed the existence of stock work of gold bearing quartz in the alteration zone. Another type of gold
mineralization that was discovered using remote sensing is the gold associated with metachert in the Atmur
Desert.
Reducing Corrosion Rate by Welding DesignIJERD Editor
This document summarizes a study on reducing corrosion rates in steel through welding design. The researchers tested different welding groove designs (X, V, 1/2X, 1/2V) and preheating temperatures (400°C, 500°C, 600°C) on ferritic malleable iron samples. Testing found that X and V groove designs with 500°C and 600°C preheating had corrosion rates of 0.5-0.69% weight loss after 14 days, compared to 0.57-0.76% for 400°C preheating. Higher preheating reduced residual stresses which decreased corrosion. Residual stresses were 1.7 MPa for optimal X groove and 600°C
Router 1X3 – RTL Design and VerificationIJERD Editor
Routing is the process of moving a packet of data from source to destination and enables messages
to pass from one computer to another and eventually reach the target machine. A router is a networking device
that forwards data packets between computer networks. It is connected to two or more data lines from different
networks (as opposed to a network switch, which connects data lines from one single network). This paper,
mainly emphasizes upon the study of router device, it‟s top level architecture, and how various sub-modules of
router i.e. Register, FIFO, FSM and Synchronizer are synthesized, and simulated and finally connected to its top
module.
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...IJERD Editor
This paper presents a component within the flexible ac-transmission system (FACTS) family, called
distributed power-flow controller (DPFC). The DPFC is derived from the unified power-flow controller (UPFC)
with an eliminated common dc link. The DPFC has the same control capabilities as the UPFC, which comprise
the adjustment of the line impedance, the transmission angle, and the bus voltage. The active power exchange
between the shunt and series converters, which is through the common dc link in the UPFC, is now through the
transmission lines at the third-harmonic frequency. DPFC multiple small-size single-phase converters which
reduces the cost of equipment, no voltage isolation between phases, increases redundancy and there by
reliability increases. The principle and analysis of the DPFC are presented in this paper and the corresponding
simulation results that are carried out on a scaled prototype are also shown.
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRIJERD Editor
Power quality has been an issue that is becoming increasingly pivotal in industrial electricity
consumers point of view in recent times. Modern industries employ Sensitive power electronic equipments,
control devices and non-linear loads as part of automated processes to increase energy efficiency and
productivity. Voltage disturbances are the most common power quality problem due to this the use of a large
numbers of sophisticated and sensitive electronic equipment in industrial systems is increased. This paper
discusses the design and simulation of dynamic voltage restorer for improvement of power quality and
reduce the harmonics distortion of sensitive loads. Power quality problem is occurring at non-standard
voltage, current and frequency. Electronic devices are very sensitive loads. In power system voltage sag,
swell, flicker and harmonics are some of the problem to the sensitive load. The compensation capability
of a DVR depends primarily on the maximum voltage injection ability and the amount of stored
energy available within the restorer. This device is connected in series with the distribution feeder at
medium voltage. A fuzzy logic control is used to produce the gate pulses for control circuit of DVR and the
circuit is simulated by using MATLAB/SIMULINK software.
Study on the Fused Deposition Modelling In Additive ManufacturingIJERD Editor
Additive manufacturing process, also popularly known as 3-D printing, is a process where a product
is created in a succession of layers. It is based on a novel materials incremental manufacturing philosophy.
Unlike conventional manufacturing processes where material is removed from a given work price to derive the
final shape of a product, 3-D printing develops the product from scratch thus obviating the necessity to cut away
materials. This prevents wastage of raw materials. Commonly used raw materials for the process are ABS
plastic, PLA and nylon. Recently the use of gold, bronze and wood has also been implemented. The complexity
factor of this process is 0% as in any object of any shape and size can be manufactured.
Spyware triggering system by particular string valueIJERD Editor
This computer programme can be used for good and bad purpose in hacking or in any general
purpose. We can say it is next step for hacking techniques such as keylogger and spyware. Once in this system if
user or hacker store particular string as a input after that software continually compare typing activity of user
with that stored string and if it is match then launch spyware programme.
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...IJERD Editor
This paper presents a blind steganalysis technique to effectively attack the JPEG steganographic
schemes i.e. Jsteg, F5, Outguess and DWT Based. The proposed method exploits the correlations between
block-DCTcoefficients from intra-block and inter-block relation and the statistical moments of characteristic
functions of the test image is selected as features. The features are extracted from the BDCT JPEG 2-array.
Support Vector Machine with cross-validation is implemented for the classification.The proposed scheme gives
improved outcome in attacking.
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
- Data over the cloud is transferred or transmitted between servers and users. Privacy of that
data is very important as it belongs to personal information. If data get hacked by the hacker, can be
used to defame a person’s social data. Sometimes delay are held during data transmission. i.e. Mobile
communication, bandwidth is low. Hence compression algorithms are proposed for fast and efficient
transmission, encryption is used for security purposes and blurring is used by providing additional
layers of security. These algorithms are hybridized for having a robust and efficient security and
transmission over cloud storage system.
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...IJERD Editor
A thorough review of existing literature indicates that the Buckley-Leverett equation only analyzes
waterflood practices directly without any adjustments on real reservoir scenarios. By doing so, quite a number
of errors are introduced into these analyses. Also, for most waterflood scenarios, a radial investigation is more
appropriate than a simplified linear system. This study investigates the adoption of the Buckley-Leverett
equation to estimate the radius invasion of the displacing fluid during waterflooding. The model is also adopted
for a Microbial flood and a comparative analysis is conducted for both waterflooding and microbial flooding.
Results shown from the analysis doesn’t only records a success in determining the radial distance of the leading
edge of water during the flooding process, but also gives a clearer understanding of the applicability of
microbes to enhance oil production through in-situ production of bio-products like bio surfactans, biogenic
gases, bio acids etc.
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraIJERD Editor
- Gesture gaming is a method by which users having a laptop/pc/x-box play games using natural or
bodily gestures. This paper presents a way of playing free flash games on the internet using an ordinary webcam
with the help of open source technologies. Emphasis in human activity recognition is given on the pose
estimation and the consistency in the pose of the player. These are estimated with the help of an ordinary web
camera having different resolutions from VGA to 20mps. Our work involved giving a 10 second documentary to
the user on how to play a particular game using gestures and what are the various kinds of gestures that can be
performed in front of the system. The initial inputs of the RGB values for the gesture component is obtained by
instructing the user to place his component in a red box in about 10 seconds after the short documentary before
the game is finished. Later the system opens the concerned game on the internet on popular flash game sites like
miniclip, games arcade, GameStop etc and loads the game clicking at various places and brings the state to a
place where the user is to perform only gestures to start playing the game. At any point of time the user can call
off the game by hitting the esc key and the program will release all of the controls and return to the desktop. It
was noted that the results obtained using an ordinary webcam matched that of the Kinect and the users could
relive the gaming experience of the free flash games on the net. Therefore effective in game advertising could
also be achieved thus resulting in a disruptive growth to the advertising firms.
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...IJERD Editor
-LLC resonant frequency converter is basically a combo of series as well as parallel resonant ckt. For
LCC resonant converter it is associated with a disadvantage that, though it has two resonant frequencies, the
lower resonant frequency is in ZCS region[5]. For this application, we are not able to design the converter
working at this resonant frequency. LLC resonant converter existed for a very long time but because of
unknown characteristic of this converter it was used as a series resonant converter with basically a passive
(resistive) load. . Here, it was designed to operate in switching frequency higher than resonant frequency of the
series resonant tank of Lr and Cr converter acts very similar to Series Resonant Converter. The benefit of LLC
resonant converter is narrow switching frequency range with light load[6] . Basically, the control ckt plays a
very imp. role and hence 555 Timer used here provides a perfect square wave as the control ckt provides no
slew rate which makes the square wave really strong and impenetrable. The dead band circuit provides the
exclusive dead band in micro seconds so as to avoid the simultaneous firing of two pairs of IGBT’s where one
pair switches off and the other on for a slightest period of time. Hence, the isolator ckt here is associated with
each and every ckt used because it acts as a driver and an isolation to each of the IGBT is provided with one
exclusive transformer supply[3]. The IGBT’s are fired using the appropriate signal using the previous boards
and hence at last a high frequency rectifier ckt with a filtering capacitor is used to get an exact dc
waveform .The basic goal of this particular analysis is to observe the wave forms and characteristics of
converters with differently positioned passive elements in the form of tank circuits.
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...IJERD Editor
LLC resonant frequency converter is basically a combo of series as well as parallel resonant ckt. For
LCC resonant converter it is associated with a disadvantage that, though it has two resonant frequencies, the
lower resonant frequency is in ZCS region [5]. For this application, we are not able to design the converter
working at this resonant frequency. LLC resonant converter existed for a very long time but because of
unknown characteristic of this converter it was used as a series resonant converter with basically a passive
(resistive) load. . Here, it was designed to operate in switching frequency higher than resonant frequency of the
series resonant tank of Lr and Cr converter acts very similar to Series Resonant Converter. The benefit of LLC
resonant converter is narrow switching frequency range with light load[6] . Basically, the control ckt plays a
very imp. role and hence 555 Timer used here provides a perfect square wave as the control ckt provides no
slew rate which makes the square wave really strong and impenetrable. The dead band circuit provides the
exclusive dead band in micro seconds so as to avoid the simultaneous firing of two pairs of IGBT’s where one
pair switches off and the other on for a slightest period of time. Hence, the isolator ckt here is associated with
each and every ckt used because it acts as a driver and an isolation to each of the IGBT is provided with one
exclusive transformer supply[3]. The IGBT’s are fired using the appropriate signal using the previous boards
and hence at last a high frequency rectifier ckt with a filtering capacitor is used to get an exact dc
waveform .The basic goal of this particular analysis is to observe the wave forms and characteristics of
converters with differently positioned passive elements in the form of tank circuits. The supported simulation
is done through PSIM 6.0 software tool
Amateurs Radio operator, also known as HAM communicates with other HAMs through Radio
waves. Wireless communication in which Moon is used as natural satellite is called Moon-bounce or EME
(Earth -Moon-Earth) technique. Long distance communication (DXing) using Very High Frequency (VHF)
operated amateur HAM radio was difficult. Even with the modest setup having good transceiver, power
amplifier and high gain antenna with high directivity, VHF DXing is possible. Generally 2X11 YAGI antenna
along with rotor to set horizontal and vertical angle is used. Moon tracking software gives exact location,
visibility of Moon at both the stations and other vital data to acquire real time position of moon.
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...IJERD Editor
Simple Sequence Repeats (SSR), also known as Microsatellites, have been extensively used as
molecular markers due to their abundance and high degree of polymorphism. The nucleotide sequences of
polymorphic forms of the same gene should be 99.9% identical. So, Microsatellites extraction from the Gene is
crucial. However, Microsatellites repeat count is compared, if they differ largely, he has some disorder. The Y
chromosome likely contains 50 to 60 genes that provide instructions for making proteins. Because only males
have the Y chromosome, the genes on this chromosome tend to be involved in male sex determination and
development. Several Microsatellite Extractors exist and they fail to extract microsatellites on large data sets of
giga bytes and tera bytes in size. The proposed tool “MS-Extractor: An Innovative Approach to extract
Microsatellites on „Y‟ Chromosome” can extract both Perfect as well as Imperfect Microsatellites from large
data sets of human genome „Y‟. The proposed system uses string matching with sliding window approach to
locate Microsatellites and extracts them.
Importance of Measurements in Smart GridIJERD Editor
- The need to get reliable supply, independence from fossil fuels, and capability to provide clean
energy at a fixed and lower cost, the existing power grid structure is transforming into Smart Grid. The
development of a smart energy distribution grid is a current goal of many nations. A Smart Grid should have
new capabilities such as self-healing, high reliability, energy management, and real-time pricing. This new era
of smart future grid will lead to major changes in existing technologies at generation, transmission and
distribution levels. The incorporation of renewable energy resources and distribution generators in the existing
grid will increase the complexity, optimization problems and instability of the system. This will lead to a
paradigm shift in the instrumentation and control requirements for Smart Grids for high quality, stable and
reliable electricity supply of power. The monitoring of the grid system state and stability relies on the
availability of reliable measurement of data. In this paper the measurement areas that highlight new
measurement challenges, development of the Smart Meters and the critical parameters of electric energy to be
monitored for improving the reliability of power systems has been discussed.
Study of Macro level Properties of SCC using GGBS and Lime stone powderIJERD Editor
The document summarizes a study on the use of ground granulated blast furnace slag (GGBS) and limestone powder to replace cement in self-compacting concrete (SCC). Tests were conducted on SCC mixes with 0-50% replacement of cement with GGBS and 0-20% replacement with limestone powder. The results showed that replacing 30% of cement with GGBS and 15% with limestone powder produced SCC with the highest compressive strength of 46MPa, meeting fresh property requirements. The study concluded that this ternary blend of cement, GGBS and limestone powder can improve SCC properties while reducing costs.
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Final ank Satta Matka Dpbos Final ank Satta Matta Matka 143 Kalyan Matka Guessing Final Matka Final ank Today Matka 420 Satta Batta Satta 143 Kalyan Chart Main Bazar Chart vip Matka Guessing Dpboss 143 Guessing Kalyan night
Industrial Tech SW: Category Renewal and CreationChristian Dahlen
Every industrial revolution has created a new set of categories and a new set of players.
Multiple new technologies have emerged, but Samsara and C3.ai are only two companies which have gone public so far.
Manufacturing startups constitute the largest pipeline share of unicorns and IPO candidates in the SF Bay Area, and software startups dominate in Germany.
[To download this presentation, visit:
https://www.oeconsulting.com.sg/training-presentations]
This presentation is a curated compilation of PowerPoint diagrams and templates designed to illustrate 20 different digital transformation frameworks and models. These frameworks are based on recent industry trends and best practices, ensuring that the content remains relevant and up-to-date.
Key highlights include Microsoft's Digital Transformation Framework, which focuses on driving innovation and efficiency, and McKinsey's Ten Guiding Principles, which provide strategic insights for successful digital transformation. Additionally, Forrester's framework emphasizes enhancing customer experiences and modernizing IT infrastructure, while IDC's MaturityScape helps assess and develop organizational digital maturity. MIT's framework explores cutting-edge strategies for achieving digital success.
These materials are perfect for enhancing your business or classroom presentations, offering visual aids to supplement your insights. Please note that while comprehensive, these slides are intended as supplementary resources and may not be complete for standalone instructional purposes.
Frameworks/Models included:
Microsoft’s Digital Transformation Framework
McKinsey’s Ten Guiding Principles of Digital Transformation
Forrester’s Digital Transformation Framework
IDC’s Digital Transformation MaturityScape
MIT’s Digital Transformation Framework
Gartner’s Digital Transformation Framework
Accenture’s Digital Strategy & Enterprise Frameworks
Deloitte’s Digital Industrial Transformation Framework
Capgemini’s Digital Transformation Framework
PwC’s Digital Transformation Framework
Cisco’s Digital Transformation Framework
Cognizant’s Digital Transformation Framework
DXC Technology’s Digital Transformation Framework
The BCG Strategy Palette
McKinsey’s Digital Transformation Framework
Digital Transformation Compass
Four Levels of Digital Maturity
Design Thinking Framework
Business Model Canvas
Customer Journey Map
SATTA MATKA SATTA FAST RESULT KALYAN TOP MATKA RESULT KALYAN SATTA MATKA FAST RESULT MILAN RATAN RAJDHANI MAIN BAZAR MATKA FAST TIPS RESULT MATKA CHART JODI CHART PANEL CHART FREE FIX GAME SATTAMATKA ! MATKA MOBI SATTA 143 spboss.in TOP NO1 RESULT FULL RATE MATKA ONLINE GAME PLAY BY APP SPBOSS
NIMA2024 | De toegevoegde waarde van DEI en ESG in campagnes | Nathalie Lam |...BBPMedia1
Nathalie zal delen hoe DEI en ESG een fundamentele rol kunnen spelen in je merkstrategie en je de juiste aansluiting kan creëren met je doelgroep. Door middel van voorbeelden en simpele handvatten toont ze hoe dit in jouw organisatie toegepast kan worden.
SATTA MATKA DPBOSS KALYAN MATKA RESULTS KALYAN CHART KALYAN MATKA MATKA RESULT KALYAN MATKA TIPS SATTA MATKA MATKA COM MATKA PANA JODI TODAY BATTA SATKA MATKA PATTI JODI NUMBER MATKA RESULTS MATKA CHART MATKA JODI SATTA COM INDIA SATTA MATKA MATKA TIPS MATKA WAPKA ALL MATKA RESULT LIVE ONLINE MATKA RESULT KALYAN MATKA RESULT DPBOSS MATKA 143 MAIN MATKA KALYAN MATKA RESULTS KALYAN CHART
Discover timeless style with the 2022 Vintage Roman Numerals Men's Ring. Crafted from premium stainless steel, this 6mm wide ring embodies elegance and durability. Perfect as a gift, it seamlessly blends classic Roman numeral detailing with modern sophistication, making it an ideal accessory for any occasion.
https://rb.gy/usj1a2
The Steadfast and Reliable Bull: Taurus Zodiac Signmy Pandit
Explore the steadfast and reliable nature of the Taurus Zodiac Sign. Discover the personality traits, key dates, and horoscope insights that define the determined and practical Taurus, and learn how their grounded nature makes them the anchor of the zodiac.
Prescriptive analytics BA4206 Anna University PPTFreelance
Business analysis - Prescriptive analytics Introduction to Prescriptive analytics
Prescriptive Modeling
Non Linear Optimization
Demonstrating Business Performance Improvement
IMPACT Silver is a pure silver zinc producer with over $260 million in revenue since 2008 and a large 100% owned 210km Mexico land package - 2024 catalysts includes new 14% grade zinc Plomosas mine and 20,000m of fully funded exploration drilling.
1. International Journal of Engineering Research and Development
ISSN: 2278-067X, Volume 1, Issue 2 (May 2012), PP.40-48
www.ijerd.com
Continuous Integration Tool for Load Development in Femto
Gateway
Ebin.P.Eldho1, Ananthakrishnan2, K N Raja Rao3
1
M.Tech Student, Digital Communication, R.V College of Engg.
2
Technical Leader, Nokia Siemens Networks, Bangalore-45
3
Professor, R.V College of Engg., Bangalore-59
Abstract––A 3G Femtocell allows service providers to extend service coverage indoors, especially where access would
otherwise be limited or unavailable. The project deals with designing and implementing an automatic testing tool, using
Visual Studio C#. The development of tool named CI GUI Tool is aimed at achieving the continuous integration of Test
cases in Femto Gateway. The project involves analysis of manual execution of test procedures in femto gateway and
automating the same. The automatic testing tool is designed for „Agile Model‟ instead of conventional „Waterfall Model‟.
General Terms––3g, Umts, Femtocell.
Keywords––Femtocell, Femto Access Point, Femto Gateway, Continuous Integration,TR69 Protocol.
I. INTRODUCTION
In telecommunications, a femtocell is a small cellular base station, typically designed for use in a home or small
business. It is designed to extend mobile operators' coverage area and improve their capacity. A femtocell produces a
coverage range up to 30-50 meters and connects to the service provider‟s network via broadband such as DSL or cable
[1]. Current designs typically support 2 to 4 active mobile phones in a residential setting and 8 to 16 active mobile phones
in enterprise settings.
Once plugged in, the femtocell connects to the MNO's mobile network, and provides extra coverage. The user must
then declare which mobile phone numbers the femtocell must allow/ authenticate, via a web interface provided by the
MNO. When these mobile phones arrive under coverage of the femtocell, they switch over from the macro cell to the
femtocell automatically. All the communications will then automatically go through the femtocell. When the user leaves
femtocell coverage area, phone will hand over seamlessly to the macro network. Femtocells require specific hardware,
middle ware and software, which needed to be developed and tested for their functionality.
Femtocells offer benefits for both subscribers and operators. Femtocells can be used to off-load traffic from the
macro cellular network there by reducing infrastructure cost. Thus femtocells enable the mobile operators to move from
conventional single-macro base station with high number of users into small coverage area with limited number of users
[2]. Also, Operators can ensure that their mobile services are used in the home despite the availability of competing
technologies (e.g. Wi-Fi, VOIP using Skype). The subscriber experiences better coverage, voice service and higher data
throughput [3].Although much attention is focused on UMTS, the concept is applicable to all standards,
including GSM(EDGE), CDMA2000, TDSCDMA, WiMax and LTE solutions.
II. FEMTO NETWORK COMPONENTS
The essential network elements in the femtocell solution are the femtocell itself, which consist of femto Access
Point (FAP), Femto Gateway (FGW) and Core Network. A FAP usually allow authorized users to connect to the
femtocell and to utilize services other than voice, such as text or real time multimedia streaming etc. For development
purpose in industry, we simulate the FAP‟s and Core Network. These simulated FAP‟s & Core network are together
known as Functionality Tester (FT). This simulated FT is interacting with FGW using „Load‟. It utilizes TR69 protocol
specifications for communication.
2.1 Femto Access Point
A Femto Access Point is a small wireless base station that is installed to the user premises, serving as a femtocell.
The FAP offer them the same services as if they were operating under a regular NodeB. The device is low cost and
relatively small in size and can be installed to the user‟s home or office. The operator has no exact control of the location.
The FAP is powered from the user‟s electric network using most likely an external power adapter.
40
2. Continuous Integration Tool for Load Development in Femto Gateway
2.2 Femto Gateway
The Femto Gateway is the device used to connect the FAP‟s to the network. FGW aggregate FAP‟s traffic
backhauled over fixed line broadband links such as cable modem, DSL or Optical fiber.ie, FGW functions as a
concentrator for all traffic received from the FAP. The FGW‟s main responsibility is to function as a single RNC towards
the Core Network and hide the details of different FAP‟S connected to it. Also the FGW functions as the core network
towards each FAP. In the femtocell logical architecture designed by 3GPP, the FGW is placed in the operator's premises
[4].
Fig 1: Femtocell Overview
FGW communicates with the FAP using the Iu/IP interface and with the network using the standard Iu (Iu/CS and
Iu/PS) interface [5]. The FGW has the following functions:
It provides authentication and certification to allow only data to and from authorized FAPs
The FAP-GW aggregates traffic from a large number of FAPs and provides an entry point into the operator
core network.
2.3 Core Network Elements
The core network involves all the elements used in the UMTS architecture. In addition, it involves the new network
element Operational & Management System (OMS). The Asynchronous Transfer Mode (ATM) is defined for UMTS
core transmission.
Fig 2: Femto Network Architecture
The Core Network is divided in to circuit switched and packet switched domains. Some of the circuit switched
elements are Mobile services Switching Centre (MSC), Visitor location register (VLR) and Gateway MSC. Packet
switched elements are Serving GPRS Support Node (SGSN) and Gateway GPRS Support Node (GGSN). Some network
elements, like EIR, HLR, VLR and AUC are shared by both domains.
41
3. Continuous Integration Tool for Load Development in Femto Gateway
III. CONTINUOUS INTEGRATION (CI)
We use Continuous integration to frequently integrate one's new or changed code with the existing code repository.
Continuous integration aims to improve the quality of „Load‟, by replacing the traditional practice of applying quality
control after completing all development with continuous processes of applying quality control which is implemented
frequently.
In the present contest, each of the possible interactions between the FT and FGW is a Test case. For each and every
scenario in the n/w (Circuit Switched call, Packet Switched call, hand over, authentication, node b registration etc), there
should be a corresponding test case. A „Load‟ is defined as a combination of test cases. The simulated Functionality
Tester is interacting with FGW using „Load‟.
3.1 Load Development Model
A Load development methodology is a framework that is used to structure, plan, and control the process of
developing loads. Each model has its own recognized strengths and weaknesses. One load development methodology is
not necessarily suitable for use by all projects. Depending on the model used, various process associated with the
development cycle also varies.
Presently in femto Project, we are manually integrating the test cases in to the gateway. Here the Load development
utilizes a linear and sequential approach accomplished by making use of Waterfall model. However, Load development
model required for achieve continuous integration is Agile model. Agile is a load development methodology based
on iterative and incremental development, where requirements and solutions evolve through collaboration between self-
organizing, cross-functional teams.
Agile methods break tasks into small increments with minimal planning. Here, at each step of development, the
build is checked and verified for bugs. Once a bug is found in a particular test case code, it is either fixed or passed back
to the previous teams which are responsible for fixing the bug. Then the team will fix that bug and the code is passed
down again and the test cases are tested for bugs again on its way down.
3.2 Continuous Integration Of Test Case
A test case may be defined as a set of conditions under which a tester will determine whether an application or
software system is working correctly or not. The test cases are written and modified using TTCN. Test cases will be
written for existing scenarios in a femto Gateway. These test cases are to be integrated into femto Gateway to check for
its functionality. Instead of manually integrating and analyzing each of the test cases, we can do automation of test cases.
„Jira‟ is the repository or database for managing the test cases. The test case from the jira has to be fed to the CI GUI
Tool as its input. We make use of CI to automatically integrate these testcases into the FGW & FT. Thus by developing
a CI Tool, we are to achieve the continuous integration of test cases, as well as changing the load development model
from Waterfall to Agile.
3.2.1 Advantages
1. When unit tests fail or bugs emerge, developers can try revert the code base to a bug-free state, without wasting
time for debugging.
2. Developers detect and fix integration problems continuously - avoiding last-minute chaos at release dates.
3. Early warning of broken/incompatible code.
4. Early warning of conflicting changes.
5. Immediate unit testing of all changes.
6. Constant availability of a "current" build for testing, demo, or release purposes.
7. Immediate feedback to developers on the quality functionality, or system-wide impact of code they are writing.
8. Frequent code check-in pushes developers to create modular, less complex code.
IV. FT TESTER
FT is a tool to simulate OMS, FAP and Core Network. It consists of ETS and PEU. The Executable Test Suite
(ETS) and Protocol Execution Unit (PEU) are constructed by using Telelogic TAU Tester, which includes the TTCN-3
compiler (t3cg) and other ASN tools. Test cases are written in TTCN3 language, TTCN-3 compiler (t3cg) is used to
convert them to C and GNU tools to compile into executable binaries.
The Protocol Execution Unit (PEU) runs the lower protocol layers, which act as service providers towards upper
layers in TTCN. PEU is a server and ETS is a client through which TTCN test case are executed.
42
4. Continuous Integration Tool for Load Development in Femto Gateway
4.1 TEST CASE EXECUTION
1. Establish IPsec tunnels between FT machine and FGW.
2. Start the PEU binary and then start the ETS
3. Once ETS is up, execute “list” command to see the list of test cases available to execute.
4. To run one test case execute “run <test case name>” on the ETS prompt.
5. Verdict could be PASS, FAIL, ERROR or test case execution hang.
6. ETS generates log.txt in log directory to know more on the test case execution flow.
7. Stop ETS by execution command “shutdown” on the ETS prompt.
8. Stop PEU by pressing “Enter” followed by “E”.
4.2 METHODOLOGY
1. Read all the information about the test cases from „Jira‟ database and write into an XML file.
2. Using tags, grep the necessary data from XML file and serve it as input to the CI GUI tool.
3. In CI GUI Tool, the test cases are classified according to their types.
4. The CI GUI Tool initiates the continuous integration of test cases.
5. IPsec tunnel is established. PEU is started and later ETS is started. ETS binaries are written into log.txt file.
6. CI GUI Tool retrieves the data available in the log.txt created by ETS.
7. Thus the status of test cases can be made available at CI GUI Tool.
7. The failed test cases are modified and are again continuously integrated until errors are null.
8. A continuous integration with no errors will lead to the development of a successful load.
V. RESULTS
Depending on the Priority, test cases are classified as Blocker, Critical, Major or Minor. For a successful load build,
all test cases with priority as Blocker & Critical should pass. However, a pass percent of 80 for Major and Minor test
cases is acceptable for successful Load built.
For a usual 3g femtocell currently in deployment, there are around 5000 test cases and will increase depending on
the complexity of deployment. Among this, there will be around 2000 mandatory test cases which should pass for the
successful completion of load. While we are doing manual integration of these test cases, we are to run each of these test
cases and check whether it passes or fails.
Considering that execution of a test case takes approximately 2 minutes, a total of 2000 test cases take 2000*2=4000
minutes = 2.7 days. In case of errors, we need to fix the bugs and again start the load build from the beginning. Thus it
may take days for the completion of a build.
However, using continuous integration we are continuously integrating the test cases. Here, since the process is
automated, the process of load development can be completed in very few hours. Also, in cases of an error, we can fix the
code, integrate it to the repository and continue the load build. There is no need to start the process from the beginning.
43
5. Continuous Integration Tool for Load Development in Femto Gateway
Fig 3: Sample Testcase kept in database ‘Jira’ with Priority as Major
Fig 4: Screen Shot Of Input XML file created
44
6. Continuous Integration Tool for Load Development in Femto Gateway
5.1 PEU Configuration
1. Place the tar ball in the PEU folder <root>/PEU. Eg. FGWFT_REL2.0_RIS5_DELIVERY1.0_PEU.tar
2. Untar the tar file. tar –xvf FGWFT_REL2.0_RIS5_DELIVERY1.0_PEU.tar
3. Base folder <2.5.1> is created under the PEU folder.
4. <2.5.1/TP3> the following folders are present
“axis2c-src-1.4.0”- Shared library used to send/receive messages for TR069 session.
“bin” - PEU binary is stored.
“peu” - Binary is run and configuration files are present.
“scripts“ - ini files and script to install PEU.
“Template” - Templates of the configuration files to be generated.
5.2 ETS Configuration
1. ETS tar placed in the required path
2. install.sh run from the <fgw-ft-ets> folder.
3. Provide path for „TauTester‟, „ttcn3libs‟, „logviewer‟ & „user makefile‟ as and when install script asks for
these
5.3 Pre defined Configuration Parameters
rnctesterParam.mp_SrcUdpIpAddress_iuFapCS –– Source Udp ip address for sending CS data on FAP
rnctesterParam.mp_UserPlane_StartingSrcPort_iuFapCS1 -Starting Source Port for sending CS userplane data on FAP1
rnctesterParam.mp_UserPlane_DestPort_iuFapPS1 ––Destination Port of the peer for PS U-plane data on FAP1
rnctesterParam.mp_UserPlane_DestPort_iuPS1 ––Destination Port of the peer for PS U-plane data on CN1
rnctesterParam.mp_TLA_Header_Fap ––Header is not added to TLA if value is set to 0.(for IP)
rnctesterParam.mp_TLA_Header_ps ––Header is not added to TLA if value is set to 0.(for ATM)
rnctesterParam.mp_pcFgw_cs ––Point code of FGW towards CS FAP
rnctesterParam.mp_pcFgw_ps ––Point code of FGW towards PS FAP
rnctesterParam.mp_pcFgw_cn_cs ––Point code of FGW towards CS CN
rnctesterParam.mp_pcFgw_cn_ps ––Point code of FGW towards PS CN
rnctesterParam.mp_pcFap_cs_1 ––Point code of CS FAP 1
rnctesterParam.mp_pcFap_ps_1 ––Point code of PS FAP 1
rnctesterParam.mp_pcCN_cs_1 ––Point code of CS CN 1
rnctesterParam.mp_pcCN_ps_1 ––Point code of PS CN 1
rnctesterParam.mp_VPI_UP_IU_CS_1 ––VPI of CS CN 1 with the configured alcap path id as 1
rnctesterParam.mp_VCI_UP_IU_CS_1 ––VCI of CS CN 1 with the configured alcap path id as 1
rnctesterParam.mp_SrcUdpIpAddress_iuCS1 ––Source Udp ip address for sending CS data on CS CN1
rnctesterParam.mp_SrcUdpIpAddress_iuPS1 ––Source Udp ip address for sending PS data on PS CN1
rnctesterParam.mp_transportType_iuCS1 ––Transport type on CS CN1. Either e_IP or e_ATM
rnctesterParam.mp_transportType_iuPS1 ––Transport type on PS CN1. Either e_IP or e_ATM
rnctesterParam.mp_continueOnMismatch ––When this module parameter is set to true, the BTSOM
test cases will continue on template mismatch.
5.4 Fap Side Configuration
FGWM3UAPORT_IU_FAP_PS - Used in the file m3ua_IuFap*.cfg where destination sctp port of the peer
(FGW) is defined.
FGWM3UAHOST - Used in the file m3ua_IuFap*.cfg where destination sctp IP address of peer
(FGW) is defined.
M3UAHOST_IU_FAP_PS* - Used in the file m3ua_IuFap*.cfg where source sctp IP address of host
(FAP) is defined.
M3UAIUPORT_IU_FAP_PS* - Used in the file m3ua_IuFap*.cfg where source sctp port of the host (FAP) is
defined.
OPC_IU_FAP_CS* - Originating (Own) point code of the FAP used in m3ua_IuFap*.cfg
and sccp_IuFapCS*.cfg.
OSSN_IU_FAP_CS* - Originating Sub system number used in the sccp_IuFapCS*.cfg.
45
7. Continuous Integration Tool for Load Development in Femto Gateway
OPC_IU_FAP_PS* - Originating (Own) point code of the FAP used in m3ua_IuFap*.cfg
and sccp_IuFapPS*.cfg.
OSSN_IU_FAP_PS* - Originating Sub system number used in the sccp_IuFapPS*.cfg.
DPC_IU_FAP_CS* - Destination (remote) point code of the FAP used in m3ua_IuFap*.cfg
and sccp_IuFapCS*.cfg.
DSSN_IU_FAP_CS* - Destination Sub system number used in the sccp_IuFapCS*.cfg.
DPC_IU_FAP_PS* - Destination (remote) point code of the FAP used in m3ua_IuFap*.cfg
and sccp_IuFapPS*.cfg.
DSSN_IU_FAP_PS* - Destination Sub system number used in the sccp_IuFapPS*.cfg
FAP_FGWIUPORT - Destination UDP port of the FAP (local for FGW) used in the file struct.db.
FAPIUPORT_IU_PS_1 - Local UDP port of the FAP used in the file struct.db.
FAPHOST_IU_PS_1 - Local UDP IP address of the FAP.
RTP_SRC_MULTIPLEX_PORT_IU_CS_FAP_* – RTP source multiplex port of the FAP(Local)
RTP_DST_MULTIPLEX_PORT_IU_CS_FAP_* – RTP destination multiplex port of the FGW (remote)
5.5 Core Network Configuration
FGWM3UAPORT_IU_PS* - Used in the file m3ua_IuPS*.cfg where destination sctp port of the peer
(FGW) is defined.
FGWM3UAPORT_IU_CS* - Used in the file m3ua_IuCS*.cfg where destination sctp port of the peer (FGW) is
defined.
M3UAHOST_IU_CS_* - Used in the file m3ua_IuCS*.cfg where local sctp IP address of the host is defined.
M3UAIUPORT_IU_CS* - Used in the file m3ua_IuCS*.cfg where local sctp port of the host is defined.
OPC_IU_CS_* - Originating (Own) point code of the MSC used in m3ua_IuCS*.cfg
and sccp_IuCS*.cfg.
DPC_IU_CS_* - Destination (remote) point code of the MSC used in m3ua_IuCS*.cfg
and sccp_IuCS*.cfg
OSSN_IU_CS_* - Originating Subsystem number used in the file sccp_IuCS*.cfg, m3ua_IuCS*.cfg
DSSN_IU_CS_* - Destination Subsystem number used in the file sccp_IuCS*.cfg, m3ua_IuCS*.cfg
M3UAHOST_IU_PS* - Used in the file m3ua_IuPS where host sctp IP address of the host is defined.
M3UAIUPORT_IU_PS* - Used in the file m3ua_IuPS where host SCTP port of the host is defined.
OPC_IU_PS_* - Originating (Own) point code of the SGSN used in m3ua_IuPS*.cfg
and sccp_IuPS*.cfg.
DPC_IU_PS_* - Destination (remote) point code of the MSC used in m3ua_IuPS*.cfg
and sccp_IuPS*.cfg
OSSN_IU_PS_* - Originating Subsystem number used in the file sccp_IuPS*.cfg, m3ua_IuPS*.cfg
DSSN_IU_PS_* - Destination Subsystem number used in the file sccp_IuPS*.cfg, m3ua_IuPS*.cfg
SGSNIUPORT_IU_PS* - Local UDP port of the SGSN used in the file struct.db.
CN_FGWIUPORT - Destination UDP port of the peer ( FGW) used in the file struct.db.
SGSNHOST_IU_PS_1 - Local UDP IP address of the SGSN used in the file struct.db.
46
8. Continuous Integration Tool for Load Development in Femto Gateway
Fig 5: Screen Shot Of CI GUI Tool
VI. TECHNICAL ASPECTS OF FEMTOCELLS
The capacity potential of femtocells can be verified rapidly from Shannon‟s law, which relates the wireless link
capacity (in bits per second) in a bandwidth to the SINR. The SINR is a function of the transmission powers of the
desired and interfering transmitters, path losses, and shadowing during terrestrial propagation. Path losses cause the
transmitted signal to decay as Ad–α, where A is a fixed loss, d is the distance between the transmitter and receiver, and α
is the path loss exponent. The key to increasing capacity is to enhance reception between intended transmitter-receiver
pairs by minimizing d and α . Simultaneously, additional benefits in network-wide spatial reuse can be obtained by, but
not restricted to, exploiting diversity, and employing interference cancellation, interference suppression, and interference
avoidance techniques. Femtocells enable reduced transmit power while maintaining good indoor coverage. Penetration
losses insulate the femtocell from surrounding femtocell transmissions. Assuming a fixed receive power target with a
path loss propagation model (no fading), and denoting α(β) as the outdoor (indoor) path loss exponent, overlaying an area
L2 with N femtocells results in a transmit power reduction on the order of [10(α-β) log10 L + 5 β log10 N] dB.
For example, choosing a cell dimension of L = 1000 m and N = 50 femtocells, with equal path loss exponents α = β
= 4, femtocells give a transmit power saving of nearly 34 dB. When the indoor path loss exponent is smaller, say β = 2,
the transmit power savings increase to nearly 77 dB. To summarize, the capacity benefits of femtocells are attributed to:
• Reduced distance between the femtocell and the user, which leads to higher received signal strength.
• Lowered transmit power, and mitigation of interference from neighboring macro cell and femtocell users due to
outdoor propagation and penetration losses.
As femtocells serve only around one to four users, they can devote a larger portion of their resources (transmit
power and bandwidth) to each subscriber. A macro cell, on the other hand, has a larger coverage area (500 m–1 km
radius) and a larger number of users; providing quality of service (QoS) for data users is more difficult. The first two
points illustrate the dual improvements in capacity through increased signal strength and reduced interference. The third
point shows that deploying femtocells will enable more efficient usage of precious power and frequency resources. The
assumption here is that the wired broadband operator provides sufficient QoS over the backhaul. Otherwise, backhaul
capacity limitations could reduce the indoor capacity gains provided by femtocells.
47
9. Continuous Integration Tool for Load Development in Femto Gateway
VII. FEMTOCELLS ATTRIBUTES AND FUTURE SCOPE
Femtocells use over-the-air standard protocols, to communicate with standard mobile devices. In flexible
deployment scenarios, technology specific femtocells can be deployed easily with any existing and future technologies
like GSM, LTE, WiMAX, etc [6]. Femtocells are gaining popularity because they can be used to access the radio link
where radio service through traditional macrocells coverage cannot be provided. Furthermore, femtocells provide higher
capacity by significantly minimizing the level of interference in home environments.
Femtocells create extra network capacity with restricted user access; which allows users to enjoy higher data rate
services like multimedia streams, online gaming, video and TV broadcasts. The use of femtocells will definitely save UE
battery. This is because femtocells offer much smaller distance between the UE and HNB compared to the much larger
distance typically between the UEs and macrocells. The femtocell operates in the licensed spectrum, and assures no
interference from unauthorized users, using DSL, broadband connections and optical fiber technologies as backhaul to
transport data over the Internet protocol.
Applications of femtocells are not limited to only home users. In a broader perspective, femtocells can be utilized
for a wider set of applications. One application of femtocells is to use them in corporate environments. Unlike home
installations, in offices more than one femtocell could be used depending upon the size of the organization. In this type of
arrangement the femtocell can also be connected with other IP-enabled devices such as Private Branch Exchange (PBX),
printers and LANs etc. Additionally in enterprises, handover between femtocells will be needed. Another model of
femtocell application could be to use them in aircrafts, trains or in passenger ferries. This type of femtocell deployment
can use satellite as a backhaul. From operator's point of view, significant amount of traffic can be offloaded from existing
macro cell sites after femtocell deployment. Operators in future will need a fewer number of macro cell sites in the
presence of the femtocell.
VIII. CONCLUSIONS
Femtocells have the potential to provide high quality network access to indoor users at low cost, while
simultaneously reducing the burden on the whole system. This article has identified the key benefits of femtocells, the
technological and business challenges, and research opportunities. Presently, testing of these femtocells are carried out by
manually integrating the test cases. This testing procedure has following disadvantages:
1. Time required for testing is more.
2. Full functionality test not possible due to time constraint
3. Poor reliability.
4. If the testing is to be carried out during design stage, co-ordination between teams is difficult, as the
implementation or realization of different teams could be different.
5. Man hours wasted because of (4).
The project will overcome all the lacuna of the present waterfall model of Load Development. By implementing
proposed test tool, the Load development can be done using Agile model.
IX. ACKNOWLEDGMENTS
I thank the Management of Nokia Siemens Networks, Bangalore and R.V.College of Engineering, Bangalore for
providing an opportunity and resource to carry out this experiment.
REFERENCES
[1]. Simon R. Saunders,2009, "FEMTOCELLS Opportunies and Challenges for Business And Technology", John Wiley & Sons.
[2]. F. Chiussi, D. Logothetis, I. Widjaja, and D.Kataria, 2010, “Femtocells [Guest Editorial]", IEEE Communications Magazine.
[3]. Jen Chen, Peter Rauber, Damanjit Singh, Chandru Sundarraman, Peerapol Tinnakornsrisuphap, Mehmet Yavuz, Jan 28, 2010,
Femtocells – Architecture & Network Aspects.
[4]. White Paper,Version 0.2.2,Nokia, Femto Gateway Definition.
[5]. V. Chandrasekhar and J. Andrews, September 2008, Femtocell Networks: A Survey, IEEE Communications Magazine.
[6]. Release 9, TS 22.220, 3GPP, Technical Specification Group Services and System Aspects; Service requirements for Home
Node B (HNB) and Home eNode B (HeNB).
48