This document summarizes a research paper that proposes implementing a database lookup method for location management in a mobile WiMAX network to reduce handover delay and improve bandwidth utilization and throughput. The paper introduces using location management areas (LMAs) within multicast and broadcast service (MBS) zones to minimize handover delay. Existing methods use paging groups to track user locations, increasing bandwidth usage and delay. The proposed method eliminates paging groups and instead stores user location data in a database accessed by an authentication, authorization, and accounting (AAA) server. Simulation results using the OPNET tool show the proposed method reduces handover delay and increases throughput compared to existing methods.
LTE QOS DYNAMIC RESOURCE BLOCK ALLOCATION WITH POWER SOURCE LIMITATION AND QU...IJCNCJournal
3GPP has defined the long term evolution (LTE) for 3G radio access in order to maintain the future
competitiveness for 3G technology, the system provides the capability of supporting a mixture of services
with different quality of service (QoS) requirements. This paper proposes a new cross-layer scheduling
algorithm to satisfy better QoS parameters for real time applications. The proposed algorithm takes care of
allocating resource blocks (RBs) with different modulation and coding schemes (MCS) according to target
bit error rate (BER), user equipment supportable MCS, queue stability constraints and available transmit
power constraints. The proposed algorithm has been valued, compared with an earlier allocation algorithm
in terms of service rate and packet delay and showed better performance regards the real time
applications.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Handover Behaviour of Transparent Relay in WiMAX NetworksIDES Editor
The knowledge on handover behaviour in WiMAX
network is essential for network management and planning
in order to achieve optimum system throughput. In this paper
we have analysed the handover behaviour of transparent relay
in several configurations for the IEEE 802.16j Mobile Multihop
Relay (MMR) WiMAX network. The simulation was
performed using NCTUns tool and adopted the hard handover
mechanism for three different relay network topologies with
varying mobile station speeds. The result shows the handover
for internal network is faster than the external network and
by appropriate relay deployment the system throughput can
be increased up to 14.39%.
Engineering Research Publication
Best International Journals, High Impact Journals,
International Journal of Engineering & Technical Research
ISSN : 2321-0869 (O) 2454-4698 (P)
www.erpublication.org
LTE QOS DYNAMIC RESOURCE BLOCK ALLOCATION WITH POWER SOURCE LIMITATION AND QU...IJCNCJournal
3GPP has defined the long term evolution (LTE) for 3G radio access in order to maintain the future
competitiveness for 3G technology, the system provides the capability of supporting a mixture of services
with different quality of service (QoS) requirements. This paper proposes a new cross-layer scheduling
algorithm to satisfy better QoS parameters for real time applications. The proposed algorithm takes care of
allocating resource blocks (RBs) with different modulation and coding schemes (MCS) according to target
bit error rate (BER), user equipment supportable MCS, queue stability constraints and available transmit
power constraints. The proposed algorithm has been valued, compared with an earlier allocation algorithm
in terms of service rate and packet delay and showed better performance regards the real time
applications.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Handover Behaviour of Transparent Relay in WiMAX NetworksIDES Editor
The knowledge on handover behaviour in WiMAX
network is essential for network management and planning
in order to achieve optimum system throughput. In this paper
we have analysed the handover behaviour of transparent relay
in several configurations for the IEEE 802.16j Mobile Multihop
Relay (MMR) WiMAX network. The simulation was
performed using NCTUns tool and adopted the hard handover
mechanism for three different relay network topologies with
varying mobile station speeds. The result shows the handover
for internal network is faster than the external network and
by appropriate relay deployment the system throughput can
be increased up to 14.39%.
Engineering Research Publication
Best International Journals, High Impact Journals,
International Journal of Engineering & Technical Research
ISSN : 2321-0869 (O) 2454-4698 (P)
www.erpublication.org
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
The Impact of Signal Strength over Routing Protocols in Wireless NetworksDr. Amarjeet Singh
In ad hoc routing protocols the source node
may need an intermediate nodes to transmit the packets into
the destination if the destination is not within transmission
range of the source. This paper studies the impact of signal
strength of nodes over ad hoc routing protocols and explains
an important effect of signal strength on ad hoc routing
protocols in four different directions including the routes and
the nodes. As a result the study give an important
improvement in ad hoc routing protocols when using signal
strength compared to other ad hoc routing protocols without
considering signal strength.
Channel Allocation and Routing in Wireless Mesh Networks: A survey and qualit...ijwmn
In order to avoid transmission's collisions and improve network performances in wireless mesh networks (WMNs), a reliable and efficient medium access control (MAC) protocol and a good channel allocation are needed. Allowing multiple channels use in the same network is often presented as a possible way to improve the network capacity. As IEEE 802.11, IEEE 802.15 and IEEE 802.16 standards provide more than one channel, thus a trivial way to improve the network performances is to allow transmission on multiple channels in each network node. A lot of research work have been conducted in the area of multi-channel allocation in order to improve the aggregate bandwidth of the hole network. In this paper, we focus our attention on the proposals for solving the channel allocation problem for Multi-Transceiver per node in the backbone level using the IEEE 802.11s technology. We classify these proposals into three categories. The first one consists on channel allocation proposals done at the MAC level independently to the other layers. The second one consists on a channel allocation approaches done by a modified MAC collaborating with upper layers. Finally, the third category concerns channel allocation methods implemented in a new layer resulting from a common-layer design between MAC and Network layer. For each category, the existing multi-channel protocols and their channel allocation approaches are identified. A qualitative comparison is conducted according to the advantages that they present, the limitations and problems they are facing, and the performances they are claiming to offer.
SECONDARY USER UNDERCOVER COOPERATIVE DYNAMIC ACCESS PROTOCOL FOR OVERLAY CO...ijmnct
A secondary cooperative overlay dynamic spectrum access protocol in cognitive radio networks is proposed, allowing secondary users to access the primary system using full power without causing harmful interference to primary users. Moreover, an enhancement in the primary system will be achieved as a result of secondary relaying of primary messages. A detailed description of the protocol is given and illustrated with network scenarios.
SECONDARY USER UNDERCOVER COOPERATIVE DYNAMIC ACCESS PROTOCOL FOR OVERLAY COG...ijmnct
A secondary cooperative overlay dynamic spectrum access protocol in cognitive radio networks is proposed, allowing secondary users to access the primary system using full power without causing harmful
interference to primary users. Moreover, an enhancement in the primary system will be achieved as a result of secondary relaying of primary messages. A detailed description of the protocol is given and illustrated with network scenarios.
Efficient Load Balancing Routing in Wireless Mesh Networksijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Improving data transmission in the vanet using multi criteria decision making...ijfcstjournal
In vehicular ad
-
hoc networks the packets are sent using multi
-
hop methods and the receiving limit of a
message is gradually extended, but the exponential increment of the number of nodes re
-
broadcasting a
message results in broadcast storm problem in data
broadcasting in this case. Some characteristics like
high speed of nodes, rapid topological changes and repetitive discontinuities have made it difficult
to
design an efficient broadcasting protocol for these networks.
We have offered a novel fuzzy method
based on multi
-
criteria decision
-
making (MCDM) for prioritizing the
vehicles in selection of the most proper neighbor to broadcast data in this paper. With using this f
uzzy
method, the most proper vehicles participate in data broadcasting. The results of
simulation using NS show
that because of selecting the neighboring vehicles with high priority in data broadcasting, the spee
d of
sending the packs is increased and the network load is considerably decreased. This method also
considerably decreases broadca
sting traffic.
RESOURCE ALLOCATION ALGORITHMS FOR QOS OPTIMIZATION IN MOBILE WIMAX NETWORKSijwmn
WiMAX is based on the standard IEEE 802.16e-2009 for wireless access in Metropolitan Area Networks. It
is one of the solutions for 4G IP based wireless technology. WiMAX utilizes Orthogonal Frequency
Division Multiple Access which also supports Multicast and Broadcast Service with appropriate
Modulation and Coding Scheme. Presently, Scheduling and Resource allocation algorithm in Opportunistic
Layered Multicasting provides multicasting of layered video over mobile WiMAX to ensure better QoS.
Initially, the knowledge based allocation of subcarriers is used for scheduling. In addition, to reduce the
burst overhead, delay and jitter, SWIM (Swapping Min-Max) algorithm is utilized. Another promising
technology that can greatly improve the system performance by exploring the broadcasting nature of
wireless channels and the cooperation among multiple users is the Cooperative Multicast Scheduling
(CMS) technique. The simulation results show, Swapping Min-Max performs better with lesser number of
bursts, Zero jitter and with optimal throughput. The results with Cooperative Multicast Scheduling show
the enhanced throughput for each member in the Multicasting Scenario.
Modified q aware scheduling algorithm for improved fairness in 802.16 j networksIJCNCJournal
Deployment of Multi-hop Relays in WiMax based Cellu
lar Networks is considered as a cost effective
solution to increase the Coverage area of Base Stat
ion and also to improve the Network Capacity with h
igh
quality short links. Scheduling became a challengin
g task in these Multi-hop Relay Wireless Cellular
Networks of IEEE 802.16j standard. H. Chen, X. Xie
and H. Wu proposed a Q-aware Scheduling
Algorithm in which back-pressure flow control mecha
nism is used to reflect current Q size of the Relay
s
and considered high back-pressure links to include
in Concurrent Transmission Scenarios, to maximize t
he
throughput. This focus on high back-pressure links,
leads to starvation of Mobile Stations having low
back-
pressure links, resulting unfairness in some cases.
To remedy this situation, a Fair Link Inclusion (F
LI)
mechanism is applied in Greedy Algorithm of Q-aware
Scheduling Algorithm. Simulation results show that
Modified Q-aware Scheduling Algorithm with FLI mech
anism has reasonable improvement in fairness and
maintaining steady throughput when compared with ex
isting algorithms.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...IJNSA Journal
With the rapid growth of wireless communication infras,,tructure over the recent few years, new
challenges has been posed on the system and analysis on wireless adhoc networking. Implementation of
MIMO communication in such type of network is enhancing the packet transmission capabilities. There
are different techniques for cooperative transmission and broadcasting packet in MIMO equipped
Mobile Adhoc Network. We have employed a model network in the OPNET environment and propose a
new scheduling algorithm based on investigating the different broadcasting algorithm. The new
broadcasting algorithm improves the packet transmission rate of the network based on energy
performance of the network and minimizes the BER for different transmission mode which is illustrated
in this paper. The simulations are done in MATLAB and OPNET environment and the simulated result
for the packet transmission rate are collected and shown in the tabular form. Also simulate the network
for generating a comparative statement for each mobile node. And performance analysis is also done for
the model network. The main focus is to minimize BER and improve information efficiency of the
network.
In order enhance the network efficiency of Mobile ad hoc Networks (MANETs), an Power Unbiased Cooperative Media Access Control(PUC-MAC) protocol in MANETs was planned during this paper. It adopted the most effective partnership choice statement to select the cooperative node with higher channel condition, higher passing rate and additional balanced power consumption. Simulation results showed that PUC-MAC outperforms EC-MAC,Cooperative MAC (CoopMAC) and IEEE 802.11 Distributed Coordination perform (DCF) in terms of the packet release quantitative relation, network outturn and network lifespan beneath 2 distinct channel noise levels, particularly beneath the worst channel condition.
10 Insightful Quotes On Designing A Better Customer ExperienceYuan Wang
In an ever-changing landscape of one digital disruption after another, companies and organisations are looking for new ways to understand their target markets and engage them better. Increasingly they invest in user experience (UX) and customer experience design (CX) capabilities by working with a specialist UX agency or developing their own UX lab. Some UX practitioners are touting leaner and faster ways of developing customer-centric products and services, via methodologies such as guerilla research, rapid prototyping and Agile UX. Others seek innovation and fulfilment by spending more time in research, being more inclusive, and designing for social goods.
Experience is more than just an interface. It is a relationship, as well as a series of touch points between your brand and your customer. Here are our top 10 highlights and takeaways from the recent UX Australia conference to help you transform your customer experience design.
For full article, continue reading at https://yump.com.au/10-ways-supercharge-customer-experience-design/
http://inarocket.com
Learn BEM fundamentals as fast as possible. What is BEM (Block, element, modifier), BEM syntax, how it works with a real example, etc.
How to Build a Dynamic Social Media PlanPost Planner
Stop guessing and wasting your time on networks and strategies that don’t work!
Join Rebekah Radice and Katie Lance to learn how to optimize your social networks, the best kept secrets for hot content, top time management tools, and much more!
Watch the replay here: bit.ly/socialmedia-plan
Content personalisation is becoming more prevalent. A site, it's content and/or it's products, change dynamically according to the specific needs of the user. SEO needs to ensure we do not fall behind of this trend.
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldabaux singapore
How can we take UX and Data Storytelling out of the tech context and use them to change the way government behaves?
Showcasing the truth is the highest goal of data storytelling. Because the design of a chart can affect the interpretation of data in a major way, one must wield visual tools with care and deliberation. Using quantitative facts to evoke an emotional response is best achieved with the combination of UX and data storytelling.
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
By David F. Larcker, Stephen A. Miles, and Brian Tayan
Stanford Closer Look Series
Overview:
Shareholders pay considerable attention to the choice of executive selected as the new CEO whenever a change in leadership takes place. However, without an inside look at the leading candidates to assume the CEO role, it is difficult for shareholders to tell whether the board has made the correct choice. In this Closer Look, we examine CEO succession events among the largest 100 companies over a ten-year period to determine what happens to the executives who were not selected (i.e., the “succession losers”) and how they perform relative to those who were selected (the “succession winners”).
We ask:
• Are the executives selected for the CEO role really better than those passed over?
• What are the implications for understanding the labor market for executive talent?
• Are differences in performance due to operating conditions or quality of available talent?
• Are boards better at identifying CEO talent than other research generally suggests?
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
The Impact of Signal Strength over Routing Protocols in Wireless NetworksDr. Amarjeet Singh
In ad hoc routing protocols the source node
may need an intermediate nodes to transmit the packets into
the destination if the destination is not within transmission
range of the source. This paper studies the impact of signal
strength of nodes over ad hoc routing protocols and explains
an important effect of signal strength on ad hoc routing
protocols in four different directions including the routes and
the nodes. As a result the study give an important
improvement in ad hoc routing protocols when using signal
strength compared to other ad hoc routing protocols without
considering signal strength.
Channel Allocation and Routing in Wireless Mesh Networks: A survey and qualit...ijwmn
In order to avoid transmission's collisions and improve network performances in wireless mesh networks (WMNs), a reliable and efficient medium access control (MAC) protocol and a good channel allocation are needed. Allowing multiple channels use in the same network is often presented as a possible way to improve the network capacity. As IEEE 802.11, IEEE 802.15 and IEEE 802.16 standards provide more than one channel, thus a trivial way to improve the network performances is to allow transmission on multiple channels in each network node. A lot of research work have been conducted in the area of multi-channel allocation in order to improve the aggregate bandwidth of the hole network. In this paper, we focus our attention on the proposals for solving the channel allocation problem for Multi-Transceiver per node in the backbone level using the IEEE 802.11s technology. We classify these proposals into three categories. The first one consists on channel allocation proposals done at the MAC level independently to the other layers. The second one consists on a channel allocation approaches done by a modified MAC collaborating with upper layers. Finally, the third category concerns channel allocation methods implemented in a new layer resulting from a common-layer design between MAC and Network layer. For each category, the existing multi-channel protocols and their channel allocation approaches are identified. A qualitative comparison is conducted according to the advantages that they present, the limitations and problems they are facing, and the performances they are claiming to offer.
SECONDARY USER UNDERCOVER COOPERATIVE DYNAMIC ACCESS PROTOCOL FOR OVERLAY CO...ijmnct
A secondary cooperative overlay dynamic spectrum access protocol in cognitive radio networks is proposed, allowing secondary users to access the primary system using full power without causing harmful interference to primary users. Moreover, an enhancement in the primary system will be achieved as a result of secondary relaying of primary messages. A detailed description of the protocol is given and illustrated with network scenarios.
SECONDARY USER UNDERCOVER COOPERATIVE DYNAMIC ACCESS PROTOCOL FOR OVERLAY COG...ijmnct
A secondary cooperative overlay dynamic spectrum access protocol in cognitive radio networks is proposed, allowing secondary users to access the primary system using full power without causing harmful
interference to primary users. Moreover, an enhancement in the primary system will be achieved as a result of secondary relaying of primary messages. A detailed description of the protocol is given and illustrated with network scenarios.
Efficient Load Balancing Routing in Wireless Mesh Networksijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Improving data transmission in the vanet using multi criteria decision making...ijfcstjournal
In vehicular ad
-
hoc networks the packets are sent using multi
-
hop methods and the receiving limit of a
message is gradually extended, but the exponential increment of the number of nodes re
-
broadcasting a
message results in broadcast storm problem in data
broadcasting in this case. Some characteristics like
high speed of nodes, rapid topological changes and repetitive discontinuities have made it difficult
to
design an efficient broadcasting protocol for these networks.
We have offered a novel fuzzy method
based on multi
-
criteria decision
-
making (MCDM) for prioritizing the
vehicles in selection of the most proper neighbor to broadcast data in this paper. With using this f
uzzy
method, the most proper vehicles participate in data broadcasting. The results of
simulation using NS show
that because of selecting the neighboring vehicles with high priority in data broadcasting, the spee
d of
sending the packs is increased and the network load is considerably decreased. This method also
considerably decreases broadca
sting traffic.
RESOURCE ALLOCATION ALGORITHMS FOR QOS OPTIMIZATION IN MOBILE WIMAX NETWORKSijwmn
WiMAX is based on the standard IEEE 802.16e-2009 for wireless access in Metropolitan Area Networks. It
is one of the solutions for 4G IP based wireless technology. WiMAX utilizes Orthogonal Frequency
Division Multiple Access which also supports Multicast and Broadcast Service with appropriate
Modulation and Coding Scheme. Presently, Scheduling and Resource allocation algorithm in Opportunistic
Layered Multicasting provides multicasting of layered video over mobile WiMAX to ensure better QoS.
Initially, the knowledge based allocation of subcarriers is used for scheduling. In addition, to reduce the
burst overhead, delay and jitter, SWIM (Swapping Min-Max) algorithm is utilized. Another promising
technology that can greatly improve the system performance by exploring the broadcasting nature of
wireless channels and the cooperation among multiple users is the Cooperative Multicast Scheduling
(CMS) technique. The simulation results show, Swapping Min-Max performs better with lesser number of
bursts, Zero jitter and with optimal throughput. The results with Cooperative Multicast Scheduling show
the enhanced throughput for each member in the Multicasting Scenario.
Modified q aware scheduling algorithm for improved fairness in 802.16 j networksIJCNCJournal
Deployment of Multi-hop Relays in WiMax based Cellu
lar Networks is considered as a cost effective
solution to increase the Coverage area of Base Stat
ion and also to improve the Network Capacity with h
igh
quality short links. Scheduling became a challengin
g task in these Multi-hop Relay Wireless Cellular
Networks of IEEE 802.16j standard. H. Chen, X. Xie
and H. Wu proposed a Q-aware Scheduling
Algorithm in which back-pressure flow control mecha
nism is used to reflect current Q size of the Relay
s
and considered high back-pressure links to include
in Concurrent Transmission Scenarios, to maximize t
he
throughput. This focus on high back-pressure links,
leads to starvation of Mobile Stations having low
back-
pressure links, resulting unfairness in some cases.
To remedy this situation, a Fair Link Inclusion (F
LI)
mechanism is applied in Greedy Algorithm of Q-aware
Scheduling Algorithm. Simulation results show that
Modified Q-aware Scheduling Algorithm with FLI mech
anism has reasonable improvement in fairness and
maintaining steady throughput when compared with ex
isting algorithms.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...IJNSA Journal
With the rapid growth of wireless communication infras,,tructure over the recent few years, new
challenges has been posed on the system and analysis on wireless adhoc networking. Implementation of
MIMO communication in such type of network is enhancing the packet transmission capabilities. There
are different techniques for cooperative transmission and broadcasting packet in MIMO equipped
Mobile Adhoc Network. We have employed a model network in the OPNET environment and propose a
new scheduling algorithm based on investigating the different broadcasting algorithm. The new
broadcasting algorithm improves the packet transmission rate of the network based on energy
performance of the network and minimizes the BER for different transmission mode which is illustrated
in this paper. The simulations are done in MATLAB and OPNET environment and the simulated result
for the packet transmission rate are collected and shown in the tabular form. Also simulate the network
for generating a comparative statement for each mobile node. And performance analysis is also done for
the model network. The main focus is to minimize BER and improve information efficiency of the
network.
In order enhance the network efficiency of Mobile ad hoc Networks (MANETs), an Power Unbiased Cooperative Media Access Control(PUC-MAC) protocol in MANETs was planned during this paper. It adopted the most effective partnership choice statement to select the cooperative node with higher channel condition, higher passing rate and additional balanced power consumption. Simulation results showed that PUC-MAC outperforms EC-MAC,Cooperative MAC (CoopMAC) and IEEE 802.11 Distributed Coordination perform (DCF) in terms of the packet release quantitative relation, network outturn and network lifespan beneath 2 distinct channel noise levels, particularly beneath the worst channel condition.
10 Insightful Quotes On Designing A Better Customer ExperienceYuan Wang
In an ever-changing landscape of one digital disruption after another, companies and organisations are looking for new ways to understand their target markets and engage them better. Increasingly they invest in user experience (UX) and customer experience design (CX) capabilities by working with a specialist UX agency or developing their own UX lab. Some UX practitioners are touting leaner and faster ways of developing customer-centric products and services, via methodologies such as guerilla research, rapid prototyping and Agile UX. Others seek innovation and fulfilment by spending more time in research, being more inclusive, and designing for social goods.
Experience is more than just an interface. It is a relationship, as well as a series of touch points between your brand and your customer. Here are our top 10 highlights and takeaways from the recent UX Australia conference to help you transform your customer experience design.
For full article, continue reading at https://yump.com.au/10-ways-supercharge-customer-experience-design/
http://inarocket.com
Learn BEM fundamentals as fast as possible. What is BEM (Block, element, modifier), BEM syntax, how it works with a real example, etc.
How to Build a Dynamic Social Media PlanPost Planner
Stop guessing and wasting your time on networks and strategies that don’t work!
Join Rebekah Radice and Katie Lance to learn how to optimize your social networks, the best kept secrets for hot content, top time management tools, and much more!
Watch the replay here: bit.ly/socialmedia-plan
Content personalisation is becoming more prevalent. A site, it's content and/or it's products, change dynamically according to the specific needs of the user. SEO needs to ensure we do not fall behind of this trend.
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldabaux singapore
How can we take UX and Data Storytelling out of the tech context and use them to change the way government behaves?
Showcasing the truth is the highest goal of data storytelling. Because the design of a chart can affect the interpretation of data in a major way, one must wield visual tools with care and deliberation. Using quantitative facts to evoke an emotional response is best achieved with the combination of UX and data storytelling.
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
By David F. Larcker, Stephen A. Miles, and Brian Tayan
Stanford Closer Look Series
Overview:
Shareholders pay considerable attention to the choice of executive selected as the new CEO whenever a change in leadership takes place. However, without an inside look at the leading candidates to assume the CEO role, it is difficult for shareholders to tell whether the board has made the correct choice. In this Closer Look, we examine CEO succession events among the largest 100 companies over a ten-year period to determine what happens to the executives who were not selected (i.e., the “succession losers”) and how they perform relative to those who were selected (the “succession winners”).
We ask:
• Are the executives selected for the CEO role really better than those passed over?
• What are the implications for understanding the labor market for executive talent?
• Are differences in performance due to operating conditions or quality of available talent?
• Are boards better at identifying CEO talent than other research generally suggests?
Reducing handoff delay by adaptive threshold tuning and location updates in m...ijistjournal
In wireless networks data are sent and received with impressive speed and ease. Mobile WiMAX is a broadband wireless solution that enables coverage of mobile and fixed broadband networks with flexible network architecture. Devised as a truly broadband access solution, the WiMAX technology offers promising features in terms of high bandwidth, extended coverage area and low cost. Despite having many advantages, WiMAX faces major research issues like QoS based bandwidth allocation, Roaming, Internetworking with other technologies, security and handoff. Handoff occurs when a mobile user goes from one cell to another without interruption of ongoing session. Many approaches have been proposed for reducing handoff delay. In this paper, we propose a new approach by which a critical area, an area far away from serving base station but still inside the coverage of serving base station, is found. And then overlapping area between serving base stations and neighboring base station are found and tabulated. According to the size of overlapping area, different weights are assigned where handoff threshold is changed adaptively to reduce handoff delay.
Reducing handoff delay by adaptive thresholdijistjournal
In wireless networks data are sent and received with impressive speed and ease. Mobile WiMAX is a
broadband wireless solution that enables coverage of mobile and fixed broadband networks with flexible
network architecture. Devised as a truly broadband access solution, the WiMAX technology offers
promising features in terms of high bandwidth, extended coverage area and low cost. Despite having
many advantages, WiMAX faces major research issues like QoS based bandwidth allocation, Roaming,
Internetworking with other technologies, security and handoff. Handoff occurs when a mobile user goes
from one cell to another without interruption of ongoing session. Many approaches have been proposed
for reducing handoff delay. In this paper, we propose a new approach by which a critical area, an area
far away from serving base station but still inside the coverage of serving base station, is found. And then
overlapping area between serving base stations and neighboring base station are found and tabulated.
According to the size of overlapping area, different weights are assigned where handoff threshold is
changed adaptively to reduce handoff delay.
MULTI-HOP BANDWIDTH MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKSIJMIT JOURNAL
An admission control scheme should play the role of a coordinator for flows in a data communication network, to provide the guarantees as the medium is shared. The nodes of a wired network can monitor the medium to know the available bandwidth at any point of time. But, in wireless ad hoc networks, a node must consume the bandwidth of neighboring nodes, during a communication. Hence, the consumption of bandwidth by a flow and the availability of resources to any wireless node strictly depend upon the neighboring nodes within its transmission range. We present a scalable and efficient admission control scheme, Multi-hop Bandwidth Management Protocol (MBMP), to support the QoS requirements
in multi-hop ad hoc networks. We simulate several options to design MBMP and compare the performances of these options through mathematical analysis and simulation results, and compare its effectiveness with the existing admission control schemes through extensive simulations.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Mobility Management Scheme for Mobile Communication Systems. A Reviewiosrjce
An intelligent mobility management scheme for mobile communication systems was studied. From
the result obtained, it was discovered that mobile to mobile call setup times showed a better performance as
compared to fixed network to mobile call setup and mobile to fixed call setup times. Moreover, increasing the
number of location areas within the switch does not affect inter-MSC handover and location updates since the
size of the switch coverage area remains the same. And when the location areas within the switch is increased,
intra-MSC location updates and handover also increases. Finally, user mobility directly affects the signaling
traffic for handover, location management, radio resource allocation and routing.
The advancement in mobile technology and wireless network increase the using of mobile device in database
driven application, these application require high reliability and availability due to nature inheritance of
mobile environment, transaction is the center component in database systems, In this paper we present
useful work done in mobile transaction, we show the mobile database environment and overview a lot of
proposed model of mobile transaction and show many techniques used to enhance transaction execution.
Quality of Service in bandwidth adapted hybrid UMTS/WLAN interworking networkTELKOMNIKA JOURNAL
Integration of Universal Mobile Telecommunications System (UMTS) and Wireless Local Area Network (WLAN) result in ubiquitous connection for end users. In the integrated network, ensuring the quality of service to users and enhancing capacity of network are prominent issues. Bandwidth adaptation technique is one of the solutions to overcome these issues. Bandwidth adaptation based on per flow and per class schemes were proposed for loosely coupled interworking network. In this paper, hybrid coupled UMTS and WLAN interworking network is analyzed with bandwidth adaptation based on per flow and per class schemes and the performances have been compared. Simulation result shows that the proposed hybrid coupled interworking network with bandwidth adaptation based on per class scheme performs better with enhanced quality of service and network capacity.
Performance Analysis of WiMAX Networks with Relay Stationidescitation
IEEE 802.16 is a Broadband Wireless Access (BWA)
network and thus it is considered to be an alternative solution
to wired broadband technologies. Relay station plays a
promising role of extending the range of Base station for long
distances in WiMAX networks. Relay station is suitable to
areas with limited infrastructure such as rural, hilly and lakes,
where it is difficult to install many Base stations with each
having wired connections and it is also suitable to those phases
where obstacles made the coverage limited. The Relay station
is placed in the network connectivity from Base stations and
extends the coverage of a single Base station. In this paper the
performance analysis of WiMAX technology including Relay
station has been done. This paper also focuses on increasing
number of nodes and distance from base station to the
performance of WiMAX networks.
Secure and Service-Oriented Network Control Framework for WiMAX Networks
IEEE 802.16 supports both TDD ( time-division duplex) and FDD (frequency-division duplex)
Multihop communication is needed for deployment of wimax network. Because of multihop
Security is issues associated with wimax network
Issue is how to support different services and applications in WiMAX networks
Constellation Shared Multiple Access - A Noma Scheme for Increased User Capac...IJCNCJournal
While the legacy cyclic prefix orthogonal frequency division multiple access is retained as the preferred multiple access scheme for 5G enhanced mobile broadband the research is now focussed on the multiple access schemes for massive machine type communication (mMTC) and ultra-reliable low latency communication .Though orthogonal multiple access schemes provide simple reception, they limit number of simultaneous user equipment as against the primary requirement of mMTC. On the other hand, the various non-orthogonal multiple access schemes which have been proposed so far as the likely solution, need complex successive interference cancellation receivers. So a simplified scheme named constellation shared multiple access is proposed here which substantially increases the number of simultaneous users to be served within a single resource block (RB) in LTE or 5G New Radio, thus aiding the massive connectivity requirement of mMTC. This is achieved by differentiating among the users in constellation domain. Moreover, the simple architecture compatible with 5G eMBB makes it a strong contender multiple access contender for 5G mMTC.
CONSTELLATION SHARED MULTIPLE ACCESS - A NOMA SCHEME FOR INCREASED USER CAPAC...IJCNCJournal
While the legacy cyclic prefix orthogonal frequency division multiple access is retained as the preferred
multiple access scheme for 5G enhanced mobile broadband the research is now focussed on the multiple
access schemes for massive machine type communication (mMTC) and ultra-reliable low latency
communication .Though orthogonal multiple access schemes provide simple reception, they limit number
of simultaneous user equipment as against the primary requirement of mMTC. On the other hand, the
various non-orthogonal multiple access schemes which have been proposed so far as the likely solution,
need complex successive interference cancellation receivers. So a simplified scheme named constellation
shared multiple access is proposed here which substantially increases the number of simultaneous users to
be served within a single resource block (RB) in LTE or 5G New Radio, thus aiding the massive
connectivity requirement of mMTC. This is achieved by differentiating among the users in constellation
domain. Moreover, the simple architecture compatible with 5G eMBB makes it a strong contender multiple
access contender for 5G mMTC.
LINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORKijwmn
Relay technology promises appreciable network throughput and coverage enhancement which is required
for high speed wireless cellular systems to function to their optimum. This paper is focused on analysing
the link performance of a relay-based WiMAX network under varying conditions. Comparison is made
between relay and direct link communication in terms of BER (Bit Error Rate), spectral efficiency and
capacity. Effect of multipath fading and user speed on performance are investigated as well. The entire
study involves a hypothetical view as well as MATLAB simulations to predict the benefit of relay
deployment. This is aimed at solving pertinent issues such as coverage holes and cell edge problems which
are associated with traditional non-relay based cellular networks.
Similar to Implementing database lookup method in mobile wimax for location management area based mbs zone (20)
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Enhancing Performance with Globus and the Science DMZGlobus
ESnet has led the way in helping national facilities—and many other institutions in the research community—configure Science DMZs and troubleshoot network issues to maximize data transfer performance. In this talk we will present a summary of approaches and tips for getting the most out of your network infrastructure using Globus Connect Server.
The Metaverse and AI: how can decision-makers harness the Metaverse for their...Jen Stirrup
The Metaverse is popularized in science fiction, and now it is becoming closer to being a part of our daily lives through the use of social media and shopping companies. How can businesses survive in a world where Artificial Intelligence is becoming the present as well as the future of technology, and how does the Metaverse fit into business strategy when futurist ideas are developing into reality at accelerated rates? How do we do this when our data isn't up to scratch? How can we move towards success with our data so we are set up for the Metaverse when it arrives?
How can you help your company evolve, adapt, and succeed using Artificial Intelligence and the Metaverse to stay ahead of the competition? What are the potential issues, complications, and benefits that these technologies could bring to us and our organizations? In this session, Jen Stirrup will explain how to start thinking about these technologies as an organisation.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Implementing database lookup method in mobile wimax for location management area based mbs zone
1. International Journal of Distributed and Parallel Systems (IJDPS) Vol.5, No.1/2/3, May 2014
DOI : 10.5121/ijdps.2014.5304 39
IMPLEMENTING DATABASE LOOKUP METHOD IN
MOBILE WIMAX FOR LOCATION MANAGEMENT
AREA BASED MBS ZONE
S.Sivaranjani1
, T.S.Supriya2
and Dr.B.Sridevi3
1
Department of ECE, Theni Kammavar Sangam College of Technology, Theni
2
Department of ECE, SCAD Institute of Technology, Tirupur
3
Department of ECE, Velammal College of Engineering & Technology, Madurai
ABSTRACT
The mobile WiMAX plays a vital role in accessing the delay sensitive audio, video streaming and mobile
IPTV. To minimize the handover delay, a Location Management Area (LMA) based Multicast and
Broadcast Service (MBS) zone is established. The handover delay is increased based on the size of the MBS
zone. In this paper, Location Management Area is easily identified by using Database Lookup Method to
obtain efficient bandwidth utilization along with reduced handover delay and increased throughput. The
handover delay and throughput is calculated by implementing this scenario in OPNET tool.
KEYWORDS
MBS zone, LMA, Paging Group, Database Lookup Method, Handover Delay.
1. INTRODUCTION
The most popular Internet Access technology for Metropolitan Area Networks (MAN) is
WiMAX (Worldwide Interoperability for Microwave Access), because WiMAX supports all
Internet Protocol core network architecture [6]. In WiMAX, recent research is going on in the
area of Broadband access which plays a vital role in mobile services. There should be a handover
delay in these sectors. Mostly, the handover delays are reduced in previous researches, although
it’s not more efficient at the user’s point of view, so the motivation is to reduce the bandwidth
usage and handover delay [15]. WiMAX is an emerging 4G technology, which can provide
wireless broadband access at the data rate of 70 Mbps over 50 kilometers to both home and
business customers. WiMAX is cost effective and offers higher data rates than other wireless
networks. It supports both fixed and mobile applications. WiMAX is easier to deploy as
compared to other networks and has flexible network architectures. One of the major challenges
concerning the performance of Mobile WiMAX is seamless handover. The handover in an MBS
session involves a delay, due to the link-level messages, which are exchanged during the mobile
WiMAX handover and due to the MBS signaling messages [4]. Whenever a Mobile Station with
an ongoing MBS session switches to a new Base Station, the former delay occurs, irrespective of
its MBS zone or LMA. The latter delay only occurs when an MS moves from one MBS zone to
another. MBS handovers can be classified into intra-MBS-zone handover and inter-MBS-zone
2. International Journal of Distributed and Parallel Systems (IJDPS) Vol.5, No.1/2/3, May 2014
40
handover. Handover occurs within an MBS zone is mentioned as intra-MBS-zone handover and
inter-MBS-zone handover takes place between different MBS zones.
2. RELATED WORKS
The standard Internet Protocol (IP) multicast protocols are employed by Universal Mobile
Telecommunications System (UMTS) multicast architecture [9]. A multicast mechanism for
UMTS has been proposed [10] establishes a multicast tunnel throughout the UMTS network,
which allows multicast packets to be transferred on shared links towards the multiple
destinations. For one-to-many packet-delivery services in the UMTS, the tradeoffs between the
broadcast, multiple-unicast, and multicast approaches have been investigated [11]. However the
MBS zone creation will also waste the bandwidth of the wired-backhaul network, but we focus on
the wireless link so the bandwidth is also reduced. It is assumed that the standard UMTS mobility
mechanisms, handles the mobility. On the other hand [12], a routing list can be introduced into
the nodes of the UMTS to support resource-efficient multicast transmissions, which are combined
with a reassessment of the mobility management mechanism and handover types in the UMTS.
Unless handover-delay issues are taken into Account, however, multicast-service continuity still
cannot be assured. There is some ongoing research on the support of real-time services such as
video streaming (IP television) and voice over IP in mobile WiMAX [13], [14]. The hard
handovers by IEEE 802.16e make seamless mobility with imperceptible interruption of service
difficult to achieve in Mobile WiMAX. The aim of [2] is reducing both bandwidth usage and
service disruption. Some previous studies have addressed the issues of network planning for
wireless multicast and broadcast services. So they used paging method which reduces the service
disruption, but in this case the handover delay and the bandwidth are not much efficient. In this
paper, the Database Lookup method is introduced which is implemented in AAA server. By this
the bandwidth and handover delay is reduced and throughput is increased.
3. MBS ZONE
Figure 1. LMA in MBS Zone
3. International Journal of Distributed and Parallel Systems (IJDPS) Vol.5, No.1/2/3, May 2014
41
A WiMAX network basically consists of Mobile Stations, Base Stations, and gateways with an
authentication, authorization, and accounting server [5]. The group of Base Stations is named as
LMA’s within an MBS zone. The LMA contains a group of base stations and mobile stations.
The MBS zones are controlled by the MBSC (Multicast and Broadcast Service Controller) which
has a direct link to the AAA server in that the Database Lookup LMA is implemented, as shown
in Figure 1. The MBS zones can be deployed, once the MBS-zone sizes are determined by a
network operator [3]. Every Base Station in an MBS zone has a shared multicast connection for
the same multicast transmission. Therefore, a Mobile Station to create a new connection during
handovers between Base Stations in the same MBS zone is not needed, which reduces the
handover delay and bandwidth usage. The service disruptions are reduced by increasing the size
of the MBS zones for a given level of mobility; hence the wireless-link bandwidth will be wasted
in the sense that every Base Station broadcasts the same MBS packets, in the same MBS zone
regardless of the presence of a user. This will also result in increased probability of blocking a
new MBS session.
3. EXISTING METHOD FOR MBS ZONE
In Existing method, they have proposed an MBS architecture based on Location Management
Areas (LMAs), which is a set of geographically adjacent BSs within the MBS zone [2]. The
Paging Group (PG) in Figure 2 is used to track the Location of Mobile Stations.
Figure 2. Paging Controller to Tract MS Location
With an LMA-based MBS, intra-MBS-zone handovers are again classified into intra-LMA
handovers, which result from a movement of the Base Station within the same LMA, and inter-
4. International Journal of Distributed and Parallel Systems (IJDPS) Vol.5, No.1/2/3, May 2014
42
LMA handovers between Base Stations in different LMA’s [3]. Figure 3 shows the signalling
messages required for inter-LMA handovers. LMA containing current mobile users of a specific
MBS session is called as active LMA’s with a remainder called as inactive LMA’s, with respect
to the session. In Figure 3, the Paging Controller (PC) updates location information about an
MBS user within the zone. The Paging Controller, which controls the paging group, informs the
MBSC of the new location of the users. If the MS has shifted into an inactive LMA, multicast-
distribution tree update must be done. If the LMA is active, the time required for location update
and location update notification does not contribute to the handover delay, which only consists of
the time required to finish IEEE802.16e MAC layer handover. The delay involved in an intra-
LMA handover is equivalent to the intra-MBS-zone handover.
Figure 3. Signalling Messages in LMA Handover
4. PROPOSED WORK FOR MBS ZONE
The drawback in the existing work is the usage of Paging Group for Multicast and Broadcast
Services, which consumes increased bandwidth along with the delay. In this paper the Database
Lookup Method (DLM) is introduced which already contains all the information about the mobile
5. International Journal of Distributed and Parallel Systems (IJDPS) Vol.5, No.1/2/3, May 2014
43
users of the particular area which serves under the respective AAA server. When the handover
occurs, it is not necessary to spend time in PG to collect the data of the subscribers. Directly, the
location updating can be done during MAC layer handover. So that the handover delay is reduced
and bandwidth utilization is decreased with increased throughput. In the proposed work, the MS
location is determined from a static database in the AAA server.
Once the network receives a location request, it identifies the cell ID of the BS serving the MS
and looks up the geolocation of that BS [5]. This provides the reduced handover delay with
efficient bandwidth usage.
The Figure 4 explains about the complete operation of this paper. In this figure, the operation is
between the MS, SBS (Serving Base Station), TBS (Target Base Station), MBSC, AAA (with
DLM). At First, the MS sends a IEEE802.16e MAC layer handover configuration to the TBS, the
TBS sends an MBS joint request to MBS Controller, which sends an MBS authorization request
to the AAA server. After the response from the AAA to the MBSC, if the user is valid then only
the MBSC sends a request to TBS and the TBS sends a DSA (Dynamic Service Addition) request
to MS. The MS sends a DSA response to the TBS only when the user is authorized and the DSA
acknowledgment is sent to the MS [8]. A Response is sent to MBSC from TBS. After the
resource reservation step, the location is updated to the AAA server from TBS. Then the location
update notification is sent to the TBS from the AAA server. Then normal process such as security
key exchange, MBS updating process, MBS data transmission is preceded.
6. International Journal of Distributed and Parallel Systems (IJDPS) Vol.5, No.1/2/3, May 2014
44
Figure 4. Database Lookup Method implemented in AAA Server
The Database Lookup Method [5] for implementing LMA based MBS zone should enhance the
throughput of the network by the elimination of Paging Group and thus the handover delay is also
reduced efficiently. The bandwidth utilization is also effectively used in the removal of paging
controller.
7. International Journal of Distributed and Parallel Systems (IJDPS) Vol.5, No.1/2/3, May 2014
45
Table 1. Algorithm for Proposed LMA Based MBS Zone
5. SIMULATION RESULTS
OPNET simulator is a tool to simulate the behavior and performance of any type of network [7].
The main difference with other simulators lies in its power and versatility. This simulator makes
possible working with the OSI model, from layer 7 to the modification of the most essential
physical parameters [1]. The proposed work is implemented using this OPNET tool and the
results are obtained.
The Figure 5 is the scenario of existing work (LMA based MBS zone) in opnet simulator. It has
paging controller to track the MS location and the paging group is also created by grouping of
nearby Base Stations. The increased throughput and the reduced overall delay are calculated as in
Figure 6.
8. International Journal of Distributed and Parallel Systems (IJDPS) Vol.5, No.1/2/3, May 2014
46
Figure 5. LMA Based MBS Zone in Existing Scenario
Figure 6. WiMAX delay and Throughput for Existing Scenario
As in Figure 7, the handover delay for a particular node (node 6 and 22) is calculated while the
LMA handover takes place. The handover delay is calculated as 0.025 seconds, which is
9. International Journal of Distributed and Parallel Systems (IJDPS) Vol.5, No.1/2/3, May 2014
47
maintained constantly in node 6. But, in node 22 the handover delay is increased from 0.020
seconds to 0.024 seconds.
Figure 7. Handover delay for Specific node in Existing Scenario
Figure 8. Proposed LMA Based MBS Zone
10. International Journal of Distributed and Parallel Systems (IJDPS) Vol.5, No.1/2/3, May 2014
48
The proposed scenario is created as in Figure 8 in the opnet tool which has the MBS zone and
group of LMA’s. The Paging Group used to find the current position of the user is eliminated in
the proposed LMA based MBS zone [3]. Instead of that, a database lookup LMA is introduced, in
that the location of a MS is maintained in a database. The database is handled by the AAA server.
Hence the throughput is increased and the delay is minimized as compared to existing work. The
corresponding graph is shown in Figure 9.
Figure 9. Delay and Throughput in Proposed Work
11. International Journal of Distributed and Parallel Systems (IJDPS) Vol.5, No.1/2/3, May 2014
49
Figure 10. Handover delay for Specific node in Proposed Scenario
The Figure 10 explains that the handover delay is reduced from 0.025 seconds to 0.021seconds
during node 6 mobility.Thus the handover delay is minimized due to the removal of Paging
Group in MBS zone. Similarly, during node 22 mobility also the handover delay is minimized
when compared to the value in Figure 7.
6. CONCLUSION
Mobile WiMAX (IEEE802.16e) includes the MBS zone to reduce the MBS service disruption
time and handover delays, but this requires all the BSs to send the same packets in the MBS zone.
The DLM implemented in AAA server has to maintain the updating of the mobile users. By using
LMA in MBS zone, the handover delay while streaming in the MBS zones and the service
disruption time will be reduced to an extent by maintaining the Database Lookup in the AAA
Server. The service-disruption time, which is dominated by the transmission delay between the
MBSC and the Base Station. If the LMAs are small, the disruption time of the LMS is hardly
affected to all by the wireless-transmission delay. In this paper the handover delay is calculated as
0.021 seconds, which is less than the handover delay in existing scenario.
REFERENCES
[1] Prokkola, Jarmo. "Opnet-network simulator." URL http://www. telecomlab. oulu. fi/kurssit/521365A
tietoliikennetekniikan simuloinnit ja tyokalut/Opnet esittely 7 (2006).
[2] Li, Guo-Hui, et al. "Location management in cellular mobile computing systems with dynamic
hierarchical location databases." Journal of Systems and Software 69.1 (2004): 159-171.
12. International Journal of Distributed and Parallel Systems (IJDPS) Vol.5, No.1/2/3, May 2014
50
[3] Lee, Ji Hoon, et al. "Location management area (LMA)-based MBS handover in mobile WiMAX
systems." Communication Systems Software and Middleware and Workshops, 2008. COMSWARE
2008. 3rd International Conference on. IEEE, 2008.
[4] Becvar, Zdenek, and Jan Zelenka. "Handovers in the mobile WiMAX." Research in
Telecommunication technology 1 (2006): 147-50.
[5] Venkatachalam, Muthaiah, et al. "Location services in WiMAX networks." Communications
Magazine, IEEE 47.10 (2009): 92-98.
[6] WiMAX-Part, Mobile. "I: A technical overview and performance evaluation." WiMAX Forum. 2006.
[7] Vukadinovic, Vladimir, and Ljiljana Trajkovic. "Mobile Application Part protocol implementation in
OPNET.”
[8] Lin, Zih-Ci, Huai-Lei Fu, and Phone Lin. "Dynamic Channel Allocation for Wireless Zone-Based
Multicast and Broadcast Service." INFOCOM, 2011 Proceedings IEEE. IEEE, 2011.
[9] M. Hauge and O. Kure, “Multicast in 3G networks: Employment of existing IP multicast protocols in
UMTS,” in Proc. 5th ACM Int. Workshop.Wireless Mobile Multimedia, 2002, pp. 96–103.
[10] R. Rummler, Y.W. Chung, and A. H. Aghvami, “Modeling and analysis of an efficient multicast
mechanism for UMTS,” IEEE Trans. Veh. Technol., vol. 54, no. 1, pp. 350–365, Jan. 2005.
[11] A. Alexiou and C. Bouras, “Multicast in UMTS: Evaluation and recommendations,” Wireless
Commun. Mobile Comput., vol. 8, no. 4, pp. 463– 481, May 2008. LEE et al.: REDUCING
HANDOVER DELAY IN MOBILE WiMAX MULTICAST AND BROADCAST SERVICES 617
[12] A. Alexiou, D. Antonellis, and C. Bouras, “An efficient mechanism for multicast data transmission in
UMTS,” Wireless Pers. Commun., vol. 44, no. 4, pp. 455–471, Mar. 2008.
[13] S. Sengupta, M. Chatterjee, and S. Ganguly, “Improving quality of VoIP streams overWiMAX,”
IEEE Trans. Comput., vol. 57, no. 2, pp. 145–156, Feb. 2008.
[14] J. She, F. Hou, P.-H. Ho, and L.-L. Xie, “IPTV overWiMAX: Key success factors, challenges, and
solutions,” IEEE Commun. Mag., vol. 45, no. 8, pp. 87–93, Aug. 2007.
[15] W. Jiao, P. Jiang, and Y. Ma, “Fast handover scheme for real-time applications in mobile WiMAX,”
in Proc. IEEE Int. Conf. Commun., 2007.
Authors
S.Sivaranjani has received the Master of Engineering from Anna University, Chennai in
Communication Sysems. She is currently working as an Assistant professor in Theni
Kammavar Sangam College of Technology, Theni. She has attended International
Conferences and also published papers in international journal. She has research
interests in WiMAX security and Handover.
T.S.Supriya has received the Master of Engineering from Anna University, Chennai in
Communication Sysems. She is currently working as an Assistant professor in SCAD
Institute of Technology, Tirupur. Her research interests are in wireless networks and
security. She has also attended International Conferences and published paper in
international journal.
Dr.B.Sridevi, Professor of ECE Department of Velammal College of Engineering &
Technology, Madurai, obtained her B.E., degree from A.C.C.E.T Karaikudi , Madurai
Kamaraj University, Madurai and M.E. degree from Anna University, Chennai. She
has 2 years of Industrial experience, 10 years of Teaching,and Research experience.
Completed Ph.D. in Anna University, Chennai in the field of WiMAX Networks. She
have published many research papers in International journals, national and
international conferences. Her area of research includes Network Security, Wireless
Networks.