SlideShare a Scribd company logo
ACEEE Int. J. on Communication, Vol. 02, No. 02, July 2011



   Intelligent Approach for Seamless Mobility in Multi
                  Network Environment
                                          Manoj Sharma1, Dr. R.K. Khola2
                                    1
                                      Research Scholar, Faculty of Engineering & Technology
                                  Maharishi Dayanand University, Rohtak, Haryana, India-124001
                                                        neelmanoj@gmail.com
                              2
                                Professor, Department of Electronics & Communication Engineering.
                                P.D.M College of Engineering, Bahadurgarh, Haryana, India-124507
                                                    manoj_brcm@yahoo.com

Abstract: Seamless interoperability between two dissimilar                network selection is imperative. In order to provide an effective
networks requires handoff from one network to the other.                  and efficient solution for network selection in a
Such handoffs are known as vertical handoffs. Vertical handoff            heterogeneous networking environment, we have proposed
introduces a shift in the approach to handoffs. It deals with
                                                                          a vertical handover decision algorithm used to determine the
handoffs between dissimilar networks, such as from an access
point to a base station or vice versa. The integration of diverse
                                                                          best access network.
but complementary cellular and wireless technologies in the
next generation of wireless communication systems requires
the design of intelligent vertical handoff decision algorithms
to enable mobile users to seamlessly switch network access
and experience uninterrupted service continuity anywhere
and anytime. This paper provides a vertical handoff decision
algorithm that enables wireless access network selection at a
mobile terminal. Example shows that our proposed vertical
handover algorithm is able to determine the best access
network.

Index Terms: Vertical Handover, Base Stations, Signal
Strength, Unused Bandwidth, Handover Decision Vector.

                      I. INTRODUCTION                                                Fig 1: Heterogeneous Wireless Environment

    Along with the development of the mobile technologies                              II. SURVEY OF RELATED WORKS
as well as the rapid growing number of mobile users, the all-
IP backbone which provides the possibility to integrate                        Related work on vertical handoff has been presented in
heterogeneous access networks and technologies becomes                    recent research literature. Several papers have addressed
the development trend in wireless communications,                         designing architecture for hybrid networks, such as the
supporting ubiquitous communications and seamless mobile                  application-layer session initiation protocol (SIP) [2], the
computing. In a fourth generation (4G) environment, a mobile              hierarchical mobility management architecture proposed in
node equipped with multiple interfaces can handover                       [3], and the P-handoff protocol [4]. However, these papers
seamlessly between heterogeneous networks to guarantee                    focused on architecture design and did not address the
the continuity of an ongoing application session such as                  handoff decision point or the vertical handoff performance
voice over IP (VoIP) and online gaming. In order to make                  issues. W. Zhang, in [5], proposes that the vertical handoff
seamless handover possible, future network devices should                 decision is formulated as a fuzzy multiple attribute decision-
be capable to roam freely across various access technologies              making (MADM) problem. Fuzzy logic is used to represent
such as wireless local area networks (WLANs), WiMAX                       the imprecise information of some attributes of the networks
networks, cellular systems, etc [1]. An illustration of a wireless        and the preferences of the user. In [6], Pramod Goyal, and S.
Internet roaming scenario across heterogeneous access                     K. Saxena proposes the Dynamic Decision Model, for
networks that involve a personal area network (PAN), a local              performing the vertical handoffs to the “Best” interface at
area network (LAN), a wide area network (WAN), and a cellular             the “best” time moment, successfully and efficiently. They
system is shown in Fig. 1. However, supporting seamless                   proposed Dynamic Decision Model for VHO which adopts a
roaming among heterogeneous networks is a crucial but                     three phase approach comprising Priority phase, Normal
challenging task, for different access networks having                    phase and Decision phase. Lorenza Giupponi and Jordi Pérez-
different unique networking characteristics such as mobility,             Romero in [7] propose an innovative mechanism to perform
quality-of-service (QoS), and security requirements Thus,                 joint radio resource management (JRRM) based on neuron-
existing handover schemes may not be applicable to a                      fuzzy in heterogeneous radio access networks. The proposed
pervasive heterogeneous network. A novel approach for                     fuzzy neural JRRM algorithm is able to jointly manage the
                                                                          common available radio resources operating in two steps.
                                                                     43
© 2011 ACEEE
DOI: 01.IJCOM.02.02.6
ACEEE Int. J. on Communication, Vol. 02, No. 02, July 2011


The first step selects a suitable combination of cells built
around the three available Radio Access Technology (RAT),
while the second step chooses the most appropriate RAT to
which a user should be attached. The proposed algorithm
allows implementing different operator policies as well as
technical and subjective criteria, such as the operator and
user preferences when performing the RAT selection by
means of appropriate inference rules and a multiple decision
mechanism. In [8] Liu Xia, et. al proposes a novel vertical
handoff decision algorithm for overlay wireless networks
consisting of cellular and wireless local area networks
(WLANs). The target network is selected using a fuzzy logic-
based normalized quantitative decision algorithm. Rami Tawil,
et. al in [9] proposes a Trusted Distributed Vertical Handover
Decision (T-DVHD) scheme for the fourth generation wireless
networks. The main goals of the T-DVHD are to decrease the
processing delay and to make a trust handoff decision in a
heterogeneous wireless environment. In [10] Imed Lassoued,
et. al proposes a novel methodology to evaluate the
performance of vertical handoff mechanisms. They proposed
a framework that allows to simulate realistic scenarios and to
evaluate the entire vertical handoff mechanisms in a coherent                      Fig 2: Proposed Algorithm Flow Chart
manner. The proposed methodology takes into account the
users preferences, the applications requirements, the mobile                 IV. MEMBERSHIP FUNCTIONS & WEIGHT
terminal context and the operator constraints. In [11] Ben-                       VECTORS OF CANDIDATE B.S’S.
Jye Chang and Jun-Fu Chen propose a cross-layer-based                     Heterogeneous access through multiple networks is the
polynomial regression predictive RSS approach with the                current trend in the new generation of mobile devices.
Markov decision process (MDP) based optimal network                   Managing the complexity of different access schemes,
selection for handoff in heterogeneous wireless networks              amount of bandwidth and cell coverage in multiple-interface
was proposed. The proposed approach consists of a two-                devices is becoming a critical aspect to face. Namely, with
phase procedure. In the first phase, a predictive RSS based           multiple-mode mobile devices it is necessary to provide
on the polynomial regression with a hysteresis algorithm is           seamless mobility support not only during changes of cells
proposed to predict whether a mobile node moves closer to             of the same access network, but also during movement
or away from the monitored wireless network. In the second            between access technologies. So we need vertical handover
phase, the handoff cost is determined based on the MDP                to use the best characteristic of any technology at one time
analysis. The candidate network with the lowest handoff cost          and another at any other time. This handover decision should
is selected as the optimal handoff network.                           be intelligent enough to take the decision spontaneously.
                                                                      The three input parameters for each of the BS’s which we
               III. PROPOSED ALGORITHM                                have considered are:
                                                                      A) The Signal Strength which gives us indication about the
     In this section we will introduce a new handoff decision
                                                                      signal strength.
strategy. The proposed handoff decision strategy deals with
                                                                      B) Unused bandwidth will gives us the indication about the
network destination selection. In fig. 2 we show the flow
                                                                      available bandwidth of the network.
chart of proposed vertical handover decision system. The
                                                                      C) Cost will give us the information about the cost of the
member ship values for different parameters from different
                                                                      services used.
Base Stations are collected. Weight factor for different
                                                                      Figure 3, 4 and 5 shows the membership functions for these
parameters is calculated. On the basis of Weight factor and
                                                                      above said input parameters. Each input parameter has three
membership values the value the vertical handover decision
                                                                      variables.
{F.H.D} is calculated for each B.S. Now F[max.] –F [Max.]-1
is calculated. If the difference is greater than FTH than the
B.S with highest value is selected as target B.S. And if the
difference is less than FTH then there is no need of handoff
and the user will remains in current B.S.




                                                                            Fig 3: Member Ship Function for the Input Variable
                                                                                            Signal Strength
                                                                 44
© 2011 ACEEE
DOI: 01.IJCOM.02.02. 6
ACEEE Int. J. on Communication, Vol. 02, No. 02, July 2011


                                                                        where i is the standard deviation of the membership
                                                                        functions µ1,1, µ1,2, ————————————, µ1,n and is given by

                                                                                                                     2
                                                                              1 n          1 n      
                                                                        i       i, k  n i, k 
                                                                             n 1 k 1       k 1   
                                                                                                                                 (4)

                                                                        For the ith BS (1 d” i d” n), its membership degree vector are
                                                                        given as

       Fig 4: Member Ship Function for the Input Variable Cost                       1, i 
                                                                              i   , i
                                                                                                                               (5)
                                                                                     , i 
                                                                                           
                                                                        Now the handover decision for the ith Base station BSi is
                                                                        given by
                                                                        Fi=Wµ                                             (6)
                                                                        or it can be given as
                                                                        Fi  w1 i  w 2 i  w3 i                        (7)
                                                                        The handover decision vector can be given as
      Fig 5: Member Ship Function for the Input Variable Unused         F   F1, F2, F3, Fn                                ( )
                            Bandwidth
Table 1 shows the membership degrees for each of the base               With the handover decision vector F, the final vertical
stations. In this table the first subscript denotes the input           handover decision can be achieved with the following
parameter and the second subscript denotes the BS.                      procedure and if it satisfied both the given conditions. For
                                                                        the ith base station BSi to be selected it should satisfied
                               T ABLE 1
        MEMBERSHIP DEGREES AND HANDOVER D ECISION FOR EACH B.S          {1} Fi  max.  F 1, F 2, F 3,    Fn  ;


                                                                        {2} Fi  Fj  FTH ,
                                                                        Where
                                                                        Fj  max .{F 1, F 2, F 3      Fi  1, Fi  1,     Fn}
                                                                              is the threshold handover decision value. It is used to
                                                                        avoid unnecessary vertical handovers. Then BSi is the final
                                                                        base station BSi chosen for handover.

                                                                                      V. RESULTS AND DISCUSSION
                                                                            In this model we have considered 4 base stations BS1,
                                                                        BS2, BS3 and BS4. Table 2 shows the membership functions of
The weight vector for 3 membership degrees can be given as              the 4 base stations for their 3 input parameters.
  W= (w1, w2, w3)                                (1)
                                                                                                     T ABLE 2
                                 i
                                                                            MEMBERSHIP DEGREE VALUES AND HANDOVER DECISION FOR EACH BS
            wi           3
and                   
                      i1
                                     i                   (2)



                                        
                                  
                         3 , 3 , 3 
or     W= (w , w , w )=                                     (3)
              1   2   3


                        
                          i i i 
                         i1 i 1 i 1
                                         
                                         

                                                                   45
© 2011 ACEEE
DOI: 01.IJCOM.02.02. 6
ACEEE Int. J. on Communication, Vol. 02, No. 02, July 2011


From these values of the membership function for each
parameter the value of handover decision is calculated. For
example consider the case B.S 2 the membership values for
the parameters Signal Strength, Cost and Unused Bandwidth
are .9, .2, and .8 respectively. From theses membership values
the weight vector is calculated for each of the input parameters
with the help of equation (2), equation (3) and equation (4).
After calculating weight vector for each of the input parameter
we can now find the handover decision is for each base
station. From the table 2 we can see these values are .53, .69,
.11, and .47 for BS1, BS2, BS3 and BS4 respectively. From these
values the maximum value F [max.] is .69 and F [max.]-1 is .53 and
now we have to find that the difference between these two                  Fig 7: Surface Curves between Signal Strength, Unused Bandwidth
                                                                                            and Output Handover Decision
values should be equals to or greater than FTH , where is
the threshold handover decision value and is used to avoid
unnecessary handoff. The difference of these two values is
.16 and we assume that this value is greater than and so now
the BS2 is selected for handover. And if the difference is less
than then the mobile will remains in its current BS and there
will be no handoff. Table 3 shows the membership functions
of the 4 base stations for their 3 input parameters for different
scenario. In this case the difference between F [max.] and F
[max.]-1
         is less than so in this case there will be no handoff and
the mobile will remain in its current BS. Figure no. 6, 7 and 8
shows the surface curves between various input parameter
and output handoff decision.
                             T ABLE 3
    MEMBERSHIP DEGREE VALUES AND HANDOVER DECISION FOR EACH BS            Fig 8: Surface Curves between Cost, Unused Bandwidth and Output
                                                                                                 Handover Decision

                                                                                                  CONCLUSION
                                                                              In this paper we have presented we have presented an
                                                                          intelligent vertical handover algorithm in heterogeneous
                                                                          wireless networks. Our proposed vertical handover algorithm
                                                                          considers some network parameters including signal strength,
                                                                          cost and unused bandwidth. The handover decision is based
                                                                          on the weight vector for each of the input parameter and
                                                                          membership function of each parameter. We can also plan to
                                                                          choose different factors as the input parameters to see if
                                                                          these changes can affect the service quality in wireless
                                                                          system. We can also plan to use neural method to intelligently
                                                                          decide the weights and satisfy the dynamic network
                                                                          conditions in the future work.




  Fig 6: Surface Curves between Signal Strength, Cost and Output
                        Handover Decision




                                                                     46
© 2011 ACEEE
DOI: 01.IJCOM.02.02. 6
ACEEE Int. J. on Communication, Vol. 02, No. 02, July 2011


                         REFERENCES                                       [6] Pramod Goyal, and S. K. Saxena, “A Dynamic Decision Model
                                                                          For Vertical Handoffs Across Heterogeneous Wireless Networks”
[1] Draft IEEE Standard for Local and Metropolitan Area Networks:         proceedings of World Academy of Science, Engineering &
Media Independent Handover Services. IEEE P802.21/D01.00.                 Technology Vol. 31 July 2008, pp 677-682.
March 2006. Available from IEEE.                                          [7] Lorenza Giupponi, Jordi Pérez-Romero, “A Novel Approach
[2] W.Wu, N.Banerjee, K. Basu, and S. K. Das, “SIP-Based Vertical         for Joint Radio Resource Management Based On Fuzzy Neural
Handoff between WWANs and WLANs,” IEEE Wireless                           Methodology” IEEE Transactions on Vehicular Technology, Vol.
Communications, vol. 12, no. 3, pp. 66–72, 2005.                          57, No. 3, May 2008. pp 1789-1805.
[3] H. Badis and K. Al-Agha, “Fast and Efficient Vertical Handoffs        [8] Liu Xia, Ling-ge Jiang and Chen He, “A Novel Fuzzy Logic
In Wireless Overlay Networks,” in Proceedings of IEEE                     Vertical Handoff Algorithm with Aid of Differential Prediction and
International Symposium on Personal, Indoor and Mobile Radio              Pre-Decision Method” Proceedings of IEEE International
Communications (PIMRC ’04), vol. 3, pp. 1968–1972, Barcelona,             Conference on Communications ICC’ 07 pp 5665-5670.
Spain, September 2004.                                                    [9] Rami Tawil, Jacques Demerjian, Guy Pujolle, “ A Trusted
[4] J. Tourrilhes and C. Carter, “P-Handoff: A Protocol for Fine-         Handoff Decision Scheme For The Next Generation Wireless
Grained Peer-To-Peer Vertical Handoff,” in Proceedings of the 13th        Networks” International Journal of Computer Science and Network
IEEE International Symposium on Personal, Indoor, and Mobile              Security, VOL.8 No.6, June 2008 pp.174-182.
Radio Communications (PIMRC ’02), vol. 2, pp. 966– 971, Lisbon,           [10] Imed Lassoued, Jean-Marie Bonnin, Zied Ben Hamouda and
Portugal, September 2002.                                                 Abdelfettah Belghith, “A Methodology For Evaluating Vertical
[5] W. Zhang, “Handover Decision Using Fuzzy MADM In                      Handoff Decision Mechanisms” proceedings of IEEE Seventh
Heterogeneous Networks,” in Proc. IEEE WCNC, Atlanta, GA, Mar.            International Conference on Networking, 2008, ICN 2008, pp 377-
2004, pp. 653–658.                                                        384.
                                                                          [11] Ben-Jye Chang and Jun-Fu Chen, “Cross-Layer-Based
                                                                          Adaptive Vertical Handoff with Predictive RSS in Heterogeneous
                                                                          Wireless Networks” IEEE Transactions on Vehicular Technology
                                                                          Vol. 57, No. 6, November 2008, pp 3679-3692.




                                                                     47
© 2011 ACEEE
DOI: 01.IJCOM.02.02. 6

More Related Content

What's hot

A framework for data traffic in cognitive radio net works using trusted token...
A framework for data traffic in cognitive radio net works using trusted token...A framework for data traffic in cognitive radio net works using trusted token...
A framework for data traffic in cognitive radio net works using trusted token...
eSAT Publishing House
 
A framework for data traffic in cognitive radio net works using trusted token...
A framework for data traffic in cognitive radio net works using trusted token...A framework for data traffic in cognitive radio net works using trusted token...
A framework for data traffic in cognitive radio net works using trusted token...
eSAT Journals
 
Multi User Detection in CDMA System Using Linear and Non Linear Detector
Multi User Detection in CDMA System Using Linear and Non Linear DetectorMulti User Detection in CDMA System Using Linear and Non Linear Detector
Multi User Detection in CDMA System Using Linear and Non Linear Detector
Waqas Tariq
 
DYNAMIC HYBRID CHANNEL (WMN) FOR BANDWIDTH GUARANTEES IN AD_HOC NETWORKS
DYNAMIC HYBRID CHANNEL (WMN) FOR BANDWIDTH GUARANTEES IN AD_HOC NETWORKSDYNAMIC HYBRID CHANNEL (WMN) FOR BANDWIDTH GUARANTEES IN AD_HOC NETWORKS
DYNAMIC HYBRID CHANNEL (WMN) FOR BANDWIDTH GUARANTEES IN AD_HOC NETWORKS
pharmaindexing
 
A vertical handover decision approaches in next generation wireless networks ...
A vertical handover decision approaches in next generation wireless networks ...A vertical handover decision approaches in next generation wireless networks ...
A vertical handover decision approaches in next generation wireless networks ...
ijmnct
 
J1102026164
J1102026164J1102026164
J1102026164
IOSR Journals
 
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
pijans
 
A small vessel detection using a co-located multi-frequency FMCW MIMO radar
A small vessel detection using a co-located multi-frequency FMCW MIMO radar A small vessel detection using a co-located multi-frequency FMCW MIMO radar
A small vessel detection using a co-located multi-frequency FMCW MIMO radar
IJECEIAES
 
A novel optimal small cells deployment for next-generation cellular networks
A novel optimal small cells deployment for next-generation cellular networks A novel optimal small cells deployment for next-generation cellular networks
A novel optimal small cells deployment for next-generation cellular networks
IJECEIAES
 
A Novel Handoff Necessity Estimation Approach Based on Travelling Distance
A Novel Handoff Necessity Estimation Approach Based on Travelling DistanceA Novel Handoff Necessity Estimation Approach Based on Travelling Distance
A Novel Handoff Necessity Estimation Approach Based on Travelling Distance
IJAAS Team
 
Performance evaluation of maximal ratio receiver combining diversity with pri...
Performance evaluation of maximal ratio receiver combining diversity with pri...Performance evaluation of maximal ratio receiver combining diversity with pri...
Performance evaluation of maximal ratio receiver combining diversity with pri...
Alexander Decker
 
11.performance evaluation of maximal ratio receiver combining diversity with ...
11.performance evaluation of maximal ratio receiver combining diversity with ...11.performance evaluation of maximal ratio receiver combining diversity with ...
11.performance evaluation of maximal ratio receiver combining diversity with ...Alexander Decker
 
Secure data storage over distributed nodes in network through broadcast techn...
Secure data storage over distributed nodes in network through broadcast techn...Secure data storage over distributed nodes in network through broadcast techn...
Secure data storage over distributed nodes in network through broadcast techn...
eSAT Publishing House
 
Multi-Criteria Handoff Decision Algorithms In Wireless Networks
Multi-Criteria Handoff Decision Algorithms In Wireless NetworksMulti-Criteria Handoff Decision Algorithms In Wireless Networks
Multi-Criteria Handoff Decision Algorithms In Wireless Networks
iosrjce
 
Performance analysis of massive multiple input multiple output for high speed...
Performance analysis of massive multiple input multiple output for high speed...Performance analysis of massive multiple input multiple output for high speed...
Performance analysis of massive multiple input multiple output for high speed...
IJECEIAES
 
Multi hop wireless-networks
Multi hop wireless-networksMulti hop wireless-networks
Multi hop wireless-networksambitlick
 
Throughput optimization in
Throughput optimization inThroughput optimization in
Throughput optimization in
ingenioustech
 
ANALYSIS AND STUDY OF MATHEMATICAL MODELS FOR RWA PROBLEM IN OPTICAL NETWORKS
ANALYSIS AND STUDY OF MATHEMATICAL MODELS FOR RWA PROBLEM IN OPTICAL NETWORKSANALYSIS AND STUDY OF MATHEMATICAL MODELS FOR RWA PROBLEM IN OPTICAL NETWORKS
ANALYSIS AND STUDY OF MATHEMATICAL MODELS FOR RWA PROBLEM IN OPTICAL NETWORKS
IJEEE
 
Teletraffic Analysis of Overflowed Traffic with Voice only in Multilayer 3G W...
Teletraffic Analysis of Overflowed Traffic with Voice only in Multilayer 3G W...Teletraffic Analysis of Overflowed Traffic with Voice only in Multilayer 3G W...
Teletraffic Analysis of Overflowed Traffic with Voice only in Multilayer 3G W...
IRJET Journal
 

What's hot (19)

A framework for data traffic in cognitive radio net works using trusted token...
A framework for data traffic in cognitive radio net works using trusted token...A framework for data traffic in cognitive radio net works using trusted token...
A framework for data traffic in cognitive radio net works using trusted token...
 
A framework for data traffic in cognitive radio net works using trusted token...
A framework for data traffic in cognitive radio net works using trusted token...A framework for data traffic in cognitive radio net works using trusted token...
A framework for data traffic in cognitive radio net works using trusted token...
 
Multi User Detection in CDMA System Using Linear and Non Linear Detector
Multi User Detection in CDMA System Using Linear and Non Linear DetectorMulti User Detection in CDMA System Using Linear and Non Linear Detector
Multi User Detection in CDMA System Using Linear and Non Linear Detector
 
DYNAMIC HYBRID CHANNEL (WMN) FOR BANDWIDTH GUARANTEES IN AD_HOC NETWORKS
DYNAMIC HYBRID CHANNEL (WMN) FOR BANDWIDTH GUARANTEES IN AD_HOC NETWORKSDYNAMIC HYBRID CHANNEL (WMN) FOR BANDWIDTH GUARANTEES IN AD_HOC NETWORKS
DYNAMIC HYBRID CHANNEL (WMN) FOR BANDWIDTH GUARANTEES IN AD_HOC NETWORKS
 
A vertical handover decision approaches in next generation wireless networks ...
A vertical handover decision approaches in next generation wireless networks ...A vertical handover decision approaches in next generation wireless networks ...
A vertical handover decision approaches in next generation wireless networks ...
 
J1102026164
J1102026164J1102026164
J1102026164
 
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
 
A small vessel detection using a co-located multi-frequency FMCW MIMO radar
A small vessel detection using a co-located multi-frequency FMCW MIMO radar A small vessel detection using a co-located multi-frequency FMCW MIMO radar
A small vessel detection using a co-located multi-frequency FMCW MIMO radar
 
A novel optimal small cells deployment for next-generation cellular networks
A novel optimal small cells deployment for next-generation cellular networks A novel optimal small cells deployment for next-generation cellular networks
A novel optimal small cells deployment for next-generation cellular networks
 
A Novel Handoff Necessity Estimation Approach Based on Travelling Distance
A Novel Handoff Necessity Estimation Approach Based on Travelling DistanceA Novel Handoff Necessity Estimation Approach Based on Travelling Distance
A Novel Handoff Necessity Estimation Approach Based on Travelling Distance
 
Performance evaluation of maximal ratio receiver combining diversity with pri...
Performance evaluation of maximal ratio receiver combining diversity with pri...Performance evaluation of maximal ratio receiver combining diversity with pri...
Performance evaluation of maximal ratio receiver combining diversity with pri...
 
11.performance evaluation of maximal ratio receiver combining diversity with ...
11.performance evaluation of maximal ratio receiver combining diversity with ...11.performance evaluation of maximal ratio receiver combining diversity with ...
11.performance evaluation of maximal ratio receiver combining diversity with ...
 
Secure data storage over distributed nodes in network through broadcast techn...
Secure data storage over distributed nodes in network through broadcast techn...Secure data storage over distributed nodes in network through broadcast techn...
Secure data storage over distributed nodes in network through broadcast techn...
 
Multi-Criteria Handoff Decision Algorithms In Wireless Networks
Multi-Criteria Handoff Decision Algorithms In Wireless NetworksMulti-Criteria Handoff Decision Algorithms In Wireless Networks
Multi-Criteria Handoff Decision Algorithms In Wireless Networks
 
Performance analysis of massive multiple input multiple output for high speed...
Performance analysis of massive multiple input multiple output for high speed...Performance analysis of massive multiple input multiple output for high speed...
Performance analysis of massive multiple input multiple output for high speed...
 
Multi hop wireless-networks
Multi hop wireless-networksMulti hop wireless-networks
Multi hop wireless-networks
 
Throughput optimization in
Throughput optimization inThroughput optimization in
Throughput optimization in
 
ANALYSIS AND STUDY OF MATHEMATICAL MODELS FOR RWA PROBLEM IN OPTICAL NETWORKS
ANALYSIS AND STUDY OF MATHEMATICAL MODELS FOR RWA PROBLEM IN OPTICAL NETWORKSANALYSIS AND STUDY OF MATHEMATICAL MODELS FOR RWA PROBLEM IN OPTICAL NETWORKS
ANALYSIS AND STUDY OF MATHEMATICAL MODELS FOR RWA PROBLEM IN OPTICAL NETWORKS
 
Teletraffic Analysis of Overflowed Traffic with Voice only in Multilayer 3G W...
Teletraffic Analysis of Overflowed Traffic with Voice only in Multilayer 3G W...Teletraffic Analysis of Overflowed Traffic with Voice only in Multilayer 3G W...
Teletraffic Analysis of Overflowed Traffic with Voice only in Multilayer 3G W...
 

Viewers also liked

4 g
4 g4 g
Mobility management issues in 3 g & 4g network1
Mobility management issues in 3 g & 4g network1Mobility management issues in 3 g & 4g network1
Mobility management issues in 3 g & 4g network1Editor Jacotech
 
Mobile Comm. - 3G Questions 5
Mobile Comm. - 3G Questions 5Mobile Comm. - 3G Questions 5
Mobile Comm. - 3G Questions 5
Yasir Azmat
 
Handover Behaviour of Transparent Relay in WiMAX Networks
Handover Behaviour of Transparent Relay in WiMAX NetworksHandover Behaviour of Transparent Relay in WiMAX Networks
Handover Behaviour of Transparent Relay in WiMAX Networks
IDES Editor
 
Inchcape proposal
Inchcape proposalInchcape proposal
Inchcape proposalnexpoltd
 
Widyatama.lecture.applied networking.iv-week-08-multimedia+ims
Widyatama.lecture.applied networking.iv-week-08-multimedia+imsWidyatama.lecture.applied networking.iv-week-08-multimedia+ims
Widyatama.lecture.applied networking.iv-week-08-multimedia+imsDjadja Sardjana
 
4gtechnology
4gtechnology 4gtechnology
4gtechnology
Neeraj Dixit
 
An efficient vertical handoff mechanism
An efficient vertical handoff mechanismAn efficient vertical handoff mechanism
An efficient vertical handoff mechanism
Basil John
 
Switching systems lecture8 mpls
Switching  systems lecture8 mplsSwitching  systems lecture8 mpls
Switching systems lecture8 mpls
Jumaan Ally Mohamed
 
Handover wcdma gsm
Handover wcdma gsmHandover wcdma gsm
Handover wcdma gsmprothanh
 
A Comparative Analysis of Vertical Handover Decision Process Algorithms for N...
A Comparative Analysis of Vertical Handover Decision Process Algorithms for N...A Comparative Analysis of Vertical Handover Decision Process Algorithms for N...
A Comparative Analysis of Vertical Handover Decision Process Algorithms for N...
Editor IJMTER
 
3 g 4g adv_chal 041406 ver1
3 g 4g adv_chal 041406 ver13 g 4g adv_chal 041406 ver1
3 g 4g adv_chal 041406 ver1
Ramineni Hemu
 
Research Proposal # Transformation in Art Education : Multimedia as a Tools i...
Research Proposal # Transformation in Art Education : Multimedia as a Tools i...Research Proposal # Transformation in Art Education : Multimedia as a Tools i...
Research Proposal # Transformation in Art Education : Multimedia as a Tools i...kemakamal
 
Mobile video using SOA / SDP and IMS
Mobile video using SOA / SDP and IMS Mobile video using SOA / SDP and IMS
Mobile video using SOA / SDP and IMS
Claude Florin
 
Digital network lecturer4
Digital network  lecturer4Digital network  lecturer4
Digital network lecturer4
Jumaan Ally Mohamed
 
Research proposal draft copy
Research proposal draft   copyResearch proposal draft   copy
Research proposal draft copyMiraAlmirys
 
Investigation of Quick Handover Algorithm for Wireless Video Streaming App
Investigation of Quick Handover Algorithm for Wireless Video Streaming AppInvestigation of Quick Handover Algorithm for Wireless Video Streaming App
Investigation of Quick Handover Algorithm for Wireless Video Streaming App
Rajvi Jagirdar
 
Roaming and Seamless Mobility Conference
Roaming and Seamless Mobility ConferenceRoaming and Seamless Mobility Conference
Roaming and Seamless Mobility ConferenceMarcin Marszalek
 

Viewers also liked (20)

4 g
4 g4 g
4 g
 
Mobility management issues in 3 g & 4g network1
Mobility management issues in 3 g & 4g network1Mobility management issues in 3 g & 4g network1
Mobility management issues in 3 g & 4g network1
 
Mobile Comm. - 3G Questions 5
Mobile Comm. - 3G Questions 5Mobile Comm. - 3G Questions 5
Mobile Comm. - 3G Questions 5
 
Handover Behaviour of Transparent Relay in WiMAX Networks
Handover Behaviour of Transparent Relay in WiMAX NetworksHandover Behaviour of Transparent Relay in WiMAX Networks
Handover Behaviour of Transparent Relay in WiMAX Networks
 
Inchcape proposal
Inchcape proposalInchcape proposal
Inchcape proposal
 
Widyatama.lecture.applied networking.iv-week-08-multimedia+ims
Widyatama.lecture.applied networking.iv-week-08-multimedia+imsWidyatama.lecture.applied networking.iv-week-08-multimedia+ims
Widyatama.lecture.applied networking.iv-week-08-multimedia+ims
 
4gtechnology
4gtechnology 4gtechnology
4gtechnology
 
4g technology
4g technology4g technology
4g technology
 
3 g 4g adv_chal 041406 ver1
3 g 4g adv_chal 041406 ver13 g 4g adv_chal 041406 ver1
3 g 4g adv_chal 041406 ver1
 
An efficient vertical handoff mechanism
An efficient vertical handoff mechanismAn efficient vertical handoff mechanism
An efficient vertical handoff mechanism
 
Switching systems lecture8 mpls
Switching  systems lecture8 mplsSwitching  systems lecture8 mpls
Switching systems lecture8 mpls
 
Handover wcdma gsm
Handover wcdma gsmHandover wcdma gsm
Handover wcdma gsm
 
A Comparative Analysis of Vertical Handover Decision Process Algorithms for N...
A Comparative Analysis of Vertical Handover Decision Process Algorithms for N...A Comparative Analysis of Vertical Handover Decision Process Algorithms for N...
A Comparative Analysis of Vertical Handover Decision Process Algorithms for N...
 
3 g 4g adv_chal 041406 ver1
3 g 4g adv_chal 041406 ver13 g 4g adv_chal 041406 ver1
3 g 4g adv_chal 041406 ver1
 
Research Proposal # Transformation in Art Education : Multimedia as a Tools i...
Research Proposal # Transformation in Art Education : Multimedia as a Tools i...Research Proposal # Transformation in Art Education : Multimedia as a Tools i...
Research Proposal # Transformation in Art Education : Multimedia as a Tools i...
 
Mobile video using SOA / SDP and IMS
Mobile video using SOA / SDP and IMS Mobile video using SOA / SDP and IMS
Mobile video using SOA / SDP and IMS
 
Digital network lecturer4
Digital network  lecturer4Digital network  lecturer4
Digital network lecturer4
 
Research proposal draft copy
Research proposal draft   copyResearch proposal draft   copy
Research proposal draft copy
 
Investigation of Quick Handover Algorithm for Wireless Video Streaming App
Investigation of Quick Handover Algorithm for Wireless Video Streaming AppInvestigation of Quick Handover Algorithm for Wireless Video Streaming App
Investigation of Quick Handover Algorithm for Wireless Video Streaming App
 
Roaming and Seamless Mobility Conference
Roaming and Seamless Mobility ConferenceRoaming and Seamless Mobility Conference
Roaming and Seamless Mobility Conference
 

Similar to Intelligent Approach for Seamless Mobility in Multi Network Environment

Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation...
Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation...Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation...
Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation...
CSCJournals
 
Paper id 26201429
Paper id 26201429Paper id 26201429
Paper id 26201429
IJRAT
 
BIO-INSPIRED SEAMLESS VERTICAL HANDOVER ALGORITHM FOR VEHICULAR AD HOC NETWORKS
BIO-INSPIRED SEAMLESS VERTICAL HANDOVER ALGORITHM FOR VEHICULAR AD HOC NETWORKSBIO-INSPIRED SEAMLESS VERTICAL HANDOVER ALGORITHM FOR VEHICULAR AD HOC NETWORKS
BIO-INSPIRED SEAMLESS VERTICAL HANDOVER ALGORITHM FOR VEHICULAR AD HOC NETWORKS
ijwmn
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
inventy
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
inventy
 
HANDOVER NECESSITY ESTIMATION FOR 4G HETEROGENEOUS NETWORKS
HANDOVER NECESSITY ESTIMATION FOR 4G HETEROGENEOUS NETWORKSHANDOVER NECESSITY ESTIMATION FOR 4G HETEROGENEOUS NETWORKS
HANDOVER NECESSITY ESTIMATION FOR 4G HETEROGENEOUS NETWORKS
ijistjournal
 
HANDOVER NECESSITY ESTIMATION FOR 4G HETEROGENEOUS NETWORKS
HANDOVER NECESSITY ESTIMATION FOR 4G HETEROGENEOUS NETWORKSHANDOVER NECESSITY ESTIMATION FOR 4G HETEROGENEOUS NETWORKS
HANDOVER NECESSITY ESTIMATION FOR 4G HETEROGENEOUS NETWORKS
ijistjournal
 
Intelligent network selection using fuzzy logic for 4 g wireless networks
Intelligent network selection using fuzzy logic for 4 g wireless networksIntelligent network selection using fuzzy logic for 4 g wireless networks
Intelligent network selection using fuzzy logic for 4 g wireless networksIAEME Publication
 
71 338-347
71 338-34771 338-347
71 338-347
idescitation
 
An efficient vertical handoff mechanism for future mobile network
An efficient vertical handoff mechanism for  future mobile networkAn efficient vertical handoff mechanism for  future mobile network
An efficient vertical handoff mechanism for future mobile network
Basil John
 
7.chapter
7.chapter7.chapter
7.chapter
Basil John
 
Analysis of back propagation and radial basis function neural networks for ha...
Analysis of back propagation and radial basis function neural networks for ha...Analysis of back propagation and radial basis function neural networks for ha...
Analysis of back propagation and radial basis function neural networks for ha...
IJECEIAES
 
Characterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor networkCharacterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor network
ijwmn
 
Volume 2-issue-6-2021-2029
Volume 2-issue-6-2021-2029Volume 2-issue-6-2021-2029
Volume 2-issue-6-2021-2029Editor IJARCET
 
Volume 2-issue-6-2021-2029
Volume 2-issue-6-2021-2029Volume 2-issue-6-2021-2029
Volume 2-issue-6-2021-2029Editor IJARCET
 
An advanced handoff algoritm in mobile communication network using fuzzy deci...
An advanced handoff algoritm in mobile communication network using fuzzy deci...An advanced handoff algoritm in mobile communication network using fuzzy deci...
An advanced handoff algoritm in mobile communication network using fuzzy deci...Basil John
 
User Preference based Network Selection in Wireless Networks
User Preference based Network Selection in Wireless NetworksUser Preference based Network Selection in Wireless Networks
User Preference based Network Selection in Wireless Networks
IRJET Journal
 
MOVEMENT ASSISTED COMPONENT BASED SCALABLE FRAMEWORK FOR DISTRIBUTED WIRELESS...
MOVEMENT ASSISTED COMPONENT BASED SCALABLE FRAMEWORK FOR DISTRIBUTED WIRELESS...MOVEMENT ASSISTED COMPONENT BASED SCALABLE FRAMEWORK FOR DISTRIBUTED WIRELESS...
MOVEMENT ASSISTED COMPONENT BASED SCALABLE FRAMEWORK FOR DISTRIBUTED WIRELESS...
ijcsa
 
NEW TECHNOLOGY FOR MACHINE TO MACHINE COMMUNICATION IN SOFTNET TOWARDS 5G
NEW TECHNOLOGY FOR MACHINE TO MACHINE COMMUNICATION IN SOFTNET TOWARDS 5GNEW TECHNOLOGY FOR MACHINE TO MACHINE COMMUNICATION IN SOFTNET TOWARDS 5G
NEW TECHNOLOGY FOR MACHINE TO MACHINE COMMUNICATION IN SOFTNET TOWARDS 5G
ijwmn
 
NEW TECHNOLOGY FOR MACHINE TO MACHINE COMMUNICATION IN SOFTNET TOWARDS 5G
NEW TECHNOLOGY FOR MACHINE TO MACHINE COMMUNICATION IN SOFTNET TOWARDS 5GNEW TECHNOLOGY FOR MACHINE TO MACHINE COMMUNICATION IN SOFTNET TOWARDS 5G
NEW TECHNOLOGY FOR MACHINE TO MACHINE COMMUNICATION IN SOFTNET TOWARDS 5G
ijwmn
 

Similar to Intelligent Approach for Seamless Mobility in Multi Network Environment (20)

Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation...
Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation...Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation...
Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation...
 
Paper id 26201429
Paper id 26201429Paper id 26201429
Paper id 26201429
 
BIO-INSPIRED SEAMLESS VERTICAL HANDOVER ALGORITHM FOR VEHICULAR AD HOC NETWORKS
BIO-INSPIRED SEAMLESS VERTICAL HANDOVER ALGORITHM FOR VEHICULAR AD HOC NETWORKSBIO-INSPIRED SEAMLESS VERTICAL HANDOVER ALGORITHM FOR VEHICULAR AD HOC NETWORKS
BIO-INSPIRED SEAMLESS VERTICAL HANDOVER ALGORITHM FOR VEHICULAR AD HOC NETWORKS
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
HANDOVER NECESSITY ESTIMATION FOR 4G HETEROGENEOUS NETWORKS
HANDOVER NECESSITY ESTIMATION FOR 4G HETEROGENEOUS NETWORKSHANDOVER NECESSITY ESTIMATION FOR 4G HETEROGENEOUS NETWORKS
HANDOVER NECESSITY ESTIMATION FOR 4G HETEROGENEOUS NETWORKS
 
HANDOVER NECESSITY ESTIMATION FOR 4G HETEROGENEOUS NETWORKS
HANDOVER NECESSITY ESTIMATION FOR 4G HETEROGENEOUS NETWORKSHANDOVER NECESSITY ESTIMATION FOR 4G HETEROGENEOUS NETWORKS
HANDOVER NECESSITY ESTIMATION FOR 4G HETEROGENEOUS NETWORKS
 
Intelligent network selection using fuzzy logic for 4 g wireless networks
Intelligent network selection using fuzzy logic for 4 g wireless networksIntelligent network selection using fuzzy logic for 4 g wireless networks
Intelligent network selection using fuzzy logic for 4 g wireless networks
 
71 338-347
71 338-34771 338-347
71 338-347
 
An efficient vertical handoff mechanism for future mobile network
An efficient vertical handoff mechanism for  future mobile networkAn efficient vertical handoff mechanism for  future mobile network
An efficient vertical handoff mechanism for future mobile network
 
7.chapter
7.chapter7.chapter
7.chapter
 
Analysis of back propagation and radial basis function neural networks for ha...
Analysis of back propagation and radial basis function neural networks for ha...Analysis of back propagation and radial basis function neural networks for ha...
Analysis of back propagation and radial basis function neural networks for ha...
 
Characterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor networkCharacterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor network
 
Volume 2-issue-6-2021-2029
Volume 2-issue-6-2021-2029Volume 2-issue-6-2021-2029
Volume 2-issue-6-2021-2029
 
Volume 2-issue-6-2021-2029
Volume 2-issue-6-2021-2029Volume 2-issue-6-2021-2029
Volume 2-issue-6-2021-2029
 
An advanced handoff algoritm in mobile communication network using fuzzy deci...
An advanced handoff algoritm in mobile communication network using fuzzy deci...An advanced handoff algoritm in mobile communication network using fuzzy deci...
An advanced handoff algoritm in mobile communication network using fuzzy deci...
 
User Preference based Network Selection in Wireless Networks
User Preference based Network Selection in Wireless NetworksUser Preference based Network Selection in Wireless Networks
User Preference based Network Selection in Wireless Networks
 
MOVEMENT ASSISTED COMPONENT BASED SCALABLE FRAMEWORK FOR DISTRIBUTED WIRELESS...
MOVEMENT ASSISTED COMPONENT BASED SCALABLE FRAMEWORK FOR DISTRIBUTED WIRELESS...MOVEMENT ASSISTED COMPONENT BASED SCALABLE FRAMEWORK FOR DISTRIBUTED WIRELESS...
MOVEMENT ASSISTED COMPONENT BASED SCALABLE FRAMEWORK FOR DISTRIBUTED WIRELESS...
 
NEW TECHNOLOGY FOR MACHINE TO MACHINE COMMUNICATION IN SOFTNET TOWARDS 5G
NEW TECHNOLOGY FOR MACHINE TO MACHINE COMMUNICATION IN SOFTNET TOWARDS 5GNEW TECHNOLOGY FOR MACHINE TO MACHINE COMMUNICATION IN SOFTNET TOWARDS 5G
NEW TECHNOLOGY FOR MACHINE TO MACHINE COMMUNICATION IN SOFTNET TOWARDS 5G
 
NEW TECHNOLOGY FOR MACHINE TO MACHINE COMMUNICATION IN SOFTNET TOWARDS 5G
NEW TECHNOLOGY FOR MACHINE TO MACHINE COMMUNICATION IN SOFTNET TOWARDS 5GNEW TECHNOLOGY FOR MACHINE TO MACHINE COMMUNICATION IN SOFTNET TOWARDS 5G
NEW TECHNOLOGY FOR MACHINE TO MACHINE COMMUNICATION IN SOFTNET TOWARDS 5G
 

More from IDES Editor

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A Review
IDES Editor
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
IDES Editor
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
IDES Editor
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
IDES Editor
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFC
IDES Editor
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
IDES Editor
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
IDES Editor
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
IDES Editor
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive Thresholds
IDES Editor
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
IDES Editor
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
IDES Editor
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability Framework
IDES Editor
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
IDES Editor
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
IDES Editor
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’s
IDES Editor
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
IDES Editor
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance Analysis
IDES Editor
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
IDES Editor
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
IDES Editor
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
IDES Editor
 

More from IDES Editor (20)

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A Review
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFC
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive Thresholds
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability Framework
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’s
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance Analysis
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
 

Recently uploaded

How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 

Recently uploaded (20)

How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 

Intelligent Approach for Seamless Mobility in Multi Network Environment

  • 1. ACEEE Int. J. on Communication, Vol. 02, No. 02, July 2011 Intelligent Approach for Seamless Mobility in Multi Network Environment Manoj Sharma1, Dr. R.K. Khola2 1 Research Scholar, Faculty of Engineering & Technology Maharishi Dayanand University, Rohtak, Haryana, India-124001 neelmanoj@gmail.com 2 Professor, Department of Electronics & Communication Engineering. P.D.M College of Engineering, Bahadurgarh, Haryana, India-124507 manoj_brcm@yahoo.com Abstract: Seamless interoperability between two dissimilar network selection is imperative. In order to provide an effective networks requires handoff from one network to the other. and efficient solution for network selection in a Such handoffs are known as vertical handoffs. Vertical handoff heterogeneous networking environment, we have proposed introduces a shift in the approach to handoffs. It deals with a vertical handover decision algorithm used to determine the handoffs between dissimilar networks, such as from an access point to a base station or vice versa. The integration of diverse best access network. but complementary cellular and wireless technologies in the next generation of wireless communication systems requires the design of intelligent vertical handoff decision algorithms to enable mobile users to seamlessly switch network access and experience uninterrupted service continuity anywhere and anytime. This paper provides a vertical handoff decision algorithm that enables wireless access network selection at a mobile terminal. Example shows that our proposed vertical handover algorithm is able to determine the best access network. Index Terms: Vertical Handover, Base Stations, Signal Strength, Unused Bandwidth, Handover Decision Vector. I. INTRODUCTION Fig 1: Heterogeneous Wireless Environment Along with the development of the mobile technologies II. SURVEY OF RELATED WORKS as well as the rapid growing number of mobile users, the all- IP backbone which provides the possibility to integrate Related work on vertical handoff has been presented in heterogeneous access networks and technologies becomes recent research literature. Several papers have addressed the development trend in wireless communications, designing architecture for hybrid networks, such as the supporting ubiquitous communications and seamless mobile application-layer session initiation protocol (SIP) [2], the computing. In a fourth generation (4G) environment, a mobile hierarchical mobility management architecture proposed in node equipped with multiple interfaces can handover [3], and the P-handoff protocol [4]. However, these papers seamlessly between heterogeneous networks to guarantee focused on architecture design and did not address the the continuity of an ongoing application session such as handoff decision point or the vertical handoff performance voice over IP (VoIP) and online gaming. In order to make issues. W. Zhang, in [5], proposes that the vertical handoff seamless handover possible, future network devices should decision is formulated as a fuzzy multiple attribute decision- be capable to roam freely across various access technologies making (MADM) problem. Fuzzy logic is used to represent such as wireless local area networks (WLANs), WiMAX the imprecise information of some attributes of the networks networks, cellular systems, etc [1]. An illustration of a wireless and the preferences of the user. In [6], Pramod Goyal, and S. Internet roaming scenario across heterogeneous access K. Saxena proposes the Dynamic Decision Model, for networks that involve a personal area network (PAN), a local performing the vertical handoffs to the “Best” interface at area network (LAN), a wide area network (WAN), and a cellular the “best” time moment, successfully and efficiently. They system is shown in Fig. 1. However, supporting seamless proposed Dynamic Decision Model for VHO which adopts a roaming among heterogeneous networks is a crucial but three phase approach comprising Priority phase, Normal challenging task, for different access networks having phase and Decision phase. Lorenza Giupponi and Jordi Pérez- different unique networking characteristics such as mobility, Romero in [7] propose an innovative mechanism to perform quality-of-service (QoS), and security requirements Thus, joint radio resource management (JRRM) based on neuron- existing handover schemes may not be applicable to a fuzzy in heterogeneous radio access networks. The proposed pervasive heterogeneous network. A novel approach for fuzzy neural JRRM algorithm is able to jointly manage the common available radio resources operating in two steps. 43 © 2011 ACEEE DOI: 01.IJCOM.02.02.6
  • 2. ACEEE Int. J. on Communication, Vol. 02, No. 02, July 2011 The first step selects a suitable combination of cells built around the three available Radio Access Technology (RAT), while the second step chooses the most appropriate RAT to which a user should be attached. The proposed algorithm allows implementing different operator policies as well as technical and subjective criteria, such as the operator and user preferences when performing the RAT selection by means of appropriate inference rules and a multiple decision mechanism. In [8] Liu Xia, et. al proposes a novel vertical handoff decision algorithm for overlay wireless networks consisting of cellular and wireless local area networks (WLANs). The target network is selected using a fuzzy logic- based normalized quantitative decision algorithm. Rami Tawil, et. al in [9] proposes a Trusted Distributed Vertical Handover Decision (T-DVHD) scheme for the fourth generation wireless networks. The main goals of the T-DVHD are to decrease the processing delay and to make a trust handoff decision in a heterogeneous wireless environment. In [10] Imed Lassoued, et. al proposes a novel methodology to evaluate the performance of vertical handoff mechanisms. They proposed a framework that allows to simulate realistic scenarios and to evaluate the entire vertical handoff mechanisms in a coherent Fig 2: Proposed Algorithm Flow Chart manner. The proposed methodology takes into account the users preferences, the applications requirements, the mobile IV. MEMBERSHIP FUNCTIONS & WEIGHT terminal context and the operator constraints. In [11] Ben- VECTORS OF CANDIDATE B.S’S. Jye Chang and Jun-Fu Chen propose a cross-layer-based Heterogeneous access through multiple networks is the polynomial regression predictive RSS approach with the current trend in the new generation of mobile devices. Markov decision process (MDP) based optimal network Managing the complexity of different access schemes, selection for handoff in heterogeneous wireless networks amount of bandwidth and cell coverage in multiple-interface was proposed. The proposed approach consists of a two- devices is becoming a critical aspect to face. Namely, with phase procedure. In the first phase, a predictive RSS based multiple-mode mobile devices it is necessary to provide on the polynomial regression with a hysteresis algorithm is seamless mobility support not only during changes of cells proposed to predict whether a mobile node moves closer to of the same access network, but also during movement or away from the monitored wireless network. In the second between access technologies. So we need vertical handover phase, the handoff cost is determined based on the MDP to use the best characteristic of any technology at one time analysis. The candidate network with the lowest handoff cost and another at any other time. This handover decision should is selected as the optimal handoff network. be intelligent enough to take the decision spontaneously. The three input parameters for each of the BS’s which we III. PROPOSED ALGORITHM have considered are: A) The Signal Strength which gives us indication about the In this section we will introduce a new handoff decision signal strength. strategy. The proposed handoff decision strategy deals with B) Unused bandwidth will gives us the indication about the network destination selection. In fig. 2 we show the flow available bandwidth of the network. chart of proposed vertical handover decision system. The C) Cost will give us the information about the cost of the member ship values for different parameters from different services used. Base Stations are collected. Weight factor for different Figure 3, 4 and 5 shows the membership functions for these parameters is calculated. On the basis of Weight factor and above said input parameters. Each input parameter has three membership values the value the vertical handover decision variables. {F.H.D} is calculated for each B.S. Now F[max.] –F [Max.]-1 is calculated. If the difference is greater than FTH than the B.S with highest value is selected as target B.S. And if the difference is less than FTH then there is no need of handoff and the user will remains in current B.S. Fig 3: Member Ship Function for the Input Variable Signal Strength 44 © 2011 ACEEE DOI: 01.IJCOM.02.02. 6
  • 3. ACEEE Int. J. on Communication, Vol. 02, No. 02, July 2011 where i is the standard deviation of the membership functions µ1,1, µ1,2, ————————————, µ1,n and is given by 2 1 n  1 n  i   i, k  n i, k  n 1 k 1  k 1  (4) For the ith BS (1 d” i d” n), its membership degree vector are given as Fig 4: Member Ship Function for the Input Variable Cost   1, i   i   , i   (5)   , i    Now the handover decision for the ith Base station BSi is given by Fi=Wµ (6) or it can be given as Fi  w1 i  w 2 i  w3 i (7) The handover decision vector can be given as Fig 5: Member Ship Function for the Input Variable Unused F   F1, F2, F3, Fn ( ) Bandwidth Table 1 shows the membership degrees for each of the base With the handover decision vector F, the final vertical stations. In this table the first subscript denotes the input handover decision can be achieved with the following parameter and the second subscript denotes the BS. procedure and if it satisfied both the given conditions. For the ith base station BSi to be selected it should satisfied T ABLE 1 MEMBERSHIP DEGREES AND HANDOVER D ECISION FOR EACH B.S {1} Fi  max.  F 1, F 2, F 3,    Fn  ; {2} Fi  Fj  FTH , Where Fj  max .{F 1, F 2, F 3      Fi  1, Fi  1,     Fn} is the threshold handover decision value. It is used to avoid unnecessary vertical handovers. Then BSi is the final base station BSi chosen for handover. V. RESULTS AND DISCUSSION In this model we have considered 4 base stations BS1, BS2, BS3 and BS4. Table 2 shows the membership functions of The weight vector for 3 membership degrees can be given as the 4 base stations for their 3 input parameters. W= (w1, w2, w3) (1) T ABLE 2  i MEMBERSHIP DEGREE VALUES AND HANDOVER DECISION FOR EACH BS wi  3 and  i1  i (2)         3 , 3 , 3  or W= (w , w , w )=  (3) 1 2 3  i i i   i1 i 1 i 1   45 © 2011 ACEEE DOI: 01.IJCOM.02.02. 6
  • 4. ACEEE Int. J. on Communication, Vol. 02, No. 02, July 2011 From these values of the membership function for each parameter the value of handover decision is calculated. For example consider the case B.S 2 the membership values for the parameters Signal Strength, Cost and Unused Bandwidth are .9, .2, and .8 respectively. From theses membership values the weight vector is calculated for each of the input parameters with the help of equation (2), equation (3) and equation (4). After calculating weight vector for each of the input parameter we can now find the handover decision is for each base station. From the table 2 we can see these values are .53, .69, .11, and .47 for BS1, BS2, BS3 and BS4 respectively. From these values the maximum value F [max.] is .69 and F [max.]-1 is .53 and now we have to find that the difference between these two Fig 7: Surface Curves between Signal Strength, Unused Bandwidth and Output Handover Decision values should be equals to or greater than FTH , where is the threshold handover decision value and is used to avoid unnecessary handoff. The difference of these two values is .16 and we assume that this value is greater than and so now the BS2 is selected for handover. And if the difference is less than then the mobile will remains in its current BS and there will be no handoff. Table 3 shows the membership functions of the 4 base stations for their 3 input parameters for different scenario. In this case the difference between F [max.] and F [max.]-1 is less than so in this case there will be no handoff and the mobile will remain in its current BS. Figure no. 6, 7 and 8 shows the surface curves between various input parameter and output handoff decision. T ABLE 3 MEMBERSHIP DEGREE VALUES AND HANDOVER DECISION FOR EACH BS Fig 8: Surface Curves between Cost, Unused Bandwidth and Output Handover Decision CONCLUSION In this paper we have presented we have presented an intelligent vertical handover algorithm in heterogeneous wireless networks. Our proposed vertical handover algorithm considers some network parameters including signal strength, cost and unused bandwidth. The handover decision is based on the weight vector for each of the input parameter and membership function of each parameter. We can also plan to choose different factors as the input parameters to see if these changes can affect the service quality in wireless system. We can also plan to use neural method to intelligently decide the weights and satisfy the dynamic network conditions in the future work. Fig 6: Surface Curves between Signal Strength, Cost and Output Handover Decision 46 © 2011 ACEEE DOI: 01.IJCOM.02.02. 6
  • 5. ACEEE Int. J. on Communication, Vol. 02, No. 02, July 2011 REFERENCES [6] Pramod Goyal, and S. K. Saxena, “A Dynamic Decision Model For Vertical Handoffs Across Heterogeneous Wireless Networks” [1] Draft IEEE Standard for Local and Metropolitan Area Networks: proceedings of World Academy of Science, Engineering & Media Independent Handover Services. IEEE P802.21/D01.00. Technology Vol. 31 July 2008, pp 677-682. March 2006. Available from IEEE. [7] Lorenza Giupponi, Jordi Pérez-Romero, “A Novel Approach [2] W.Wu, N.Banerjee, K. Basu, and S. K. Das, “SIP-Based Vertical for Joint Radio Resource Management Based On Fuzzy Neural Handoff between WWANs and WLANs,” IEEE Wireless Methodology” IEEE Transactions on Vehicular Technology, Vol. Communications, vol. 12, no. 3, pp. 66–72, 2005. 57, No. 3, May 2008. pp 1789-1805. [3] H. Badis and K. Al-Agha, “Fast and Efficient Vertical Handoffs [8] Liu Xia, Ling-ge Jiang and Chen He, “A Novel Fuzzy Logic In Wireless Overlay Networks,” in Proceedings of IEEE Vertical Handoff Algorithm with Aid of Differential Prediction and International Symposium on Personal, Indoor and Mobile Radio Pre-Decision Method” Proceedings of IEEE International Communications (PIMRC ’04), vol. 3, pp. 1968–1972, Barcelona, Conference on Communications ICC’ 07 pp 5665-5670. Spain, September 2004. [9] Rami Tawil, Jacques Demerjian, Guy Pujolle, “ A Trusted [4] J. Tourrilhes and C. Carter, “P-Handoff: A Protocol for Fine- Handoff Decision Scheme For The Next Generation Wireless Grained Peer-To-Peer Vertical Handoff,” in Proceedings of the 13th Networks” International Journal of Computer Science and Network IEEE International Symposium on Personal, Indoor, and Mobile Security, VOL.8 No.6, June 2008 pp.174-182. Radio Communications (PIMRC ’02), vol. 2, pp. 966– 971, Lisbon, [10] Imed Lassoued, Jean-Marie Bonnin, Zied Ben Hamouda and Portugal, September 2002. Abdelfettah Belghith, “A Methodology For Evaluating Vertical [5] W. Zhang, “Handover Decision Using Fuzzy MADM In Handoff Decision Mechanisms” proceedings of IEEE Seventh Heterogeneous Networks,” in Proc. IEEE WCNC, Atlanta, GA, Mar. International Conference on Networking, 2008, ICN 2008, pp 377- 2004, pp. 653–658. 384. [11] Ben-Jye Chang and Jun-Fu Chen, “Cross-Layer-Based Adaptive Vertical Handoff with Predictive RSS in Heterogeneous Wireless Networks” IEEE Transactions on Vehicular Technology Vol. 57, No. 6, November 2008, pp 3679-3692. 47 © 2011 ACEEE DOI: 01.IJCOM.02.02. 6