Carrier aggregation and integration of heterogeneous networks allow the mobile user equipment to benefit from wider bandwidth and radio coverage of different access technologies. However, these technologies have increased handoff scenario probability through user equipment’s mobility, leading to high outage probability and low throughput. Handover is an important aspect of mobility management which allows users to migrate from one cell to another without losing connections. But no lone access technology meets the requirements of providing seamless communication without loss and delay. Therefore, high-quality service continuity and reliable user equipment access to network anywhere and at any time require the
design of an appropriate handover decision algorithm. In this paper, a multi-criteria based handover decision-making algorithm is proposed to evade loss of communication and provide better performance to the system. It adaptively makes handover decisions based on different decision criteria (load, availability of resources, and the handover scenario type) in addition to signal interference to noise ratio. The multicriteria handover decision making algorithm-based method chooses among the cells that satisfy the requirements for the handover. As compared to some existing handover decision algorithms, simulation result shows that this algorithm improves system performance in terms of handover failure by 93%, 72%,
and 58%; radio link failure reduction by 77%, 43%, and 22%; and handover ping–pong by 81%, 59%, and 36% over the conventional received signal strength, received wireless transmission line, and multiinfluence factor hand over decisions respectively.
DATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKSEditor IJMTER
Hybrid networks are next generation of wireless networks that could be a
combination of Mobile wireless adhoc (MANET) networks and Wireless Infrastructure
networks. They are increasingly utilized in wireless communications that are extremely
supporting real time transmission with restricted Quality of Service. Invalid reservation and
race condition issues happens in MANET. In existing system, QoS-Oriented Distributed
routing protocol (QOD) is employed to boost the QoS support capability of hybrid networks,
it transforms the packet routing problem to resource scheduling problem that has 5
algorithms. They are, QoS guaranteed neighbor selection algorithm, Distributed packet
scheduling algorithm, Mobility based segment resizing algorithm, Traffic redundant
elimination algorithm and Data redundancy elimination based transmission algorithm. The
main drawback of hybrid networks is so far examined in minimum transmission hops and has
less beneficial feature with restricted number of mobile access points, mobility speeds, and
mobile workloads and with different network sizes. It will extremely perform on random
way point model and less in real mobility model. This paper present Data Transparent
Authentication to authenticates data streams by adjusting interpacket delay. Data Transparent
Authentication while not Communication overhead is an approach which reduces breakdown
of original information or sends out of band authentication data.
A small vessel detection using a co-located multi-frequency FMCW MIMO radar IJECEIAES
Small vessels detection is a known issue due to its low radar cross section (RCS). An existing shore-based vessel tracking radar is for long-distance commercial vessels detection. Meanwhile, a vessel-mounted radar system known for its reliability has a limitation due to its single radar coverage. The paper presented a co-located frequency modulated continuous waveform (FMCW) maritime radar for small vessel detection utilising a multiple-input multiple-output (MIMO) configuration. The radar behaviour is numerically simulated for detecting a Swerling 1 target which resembles small maritime’s vessels. The simulated MIMO configuration comprised two transmitting and receiving nodes. The proposal is to utilize a multi-frequency FMCW MIMO configuration in a maritime environment by applying the spectrum averaging (SA) to fuse MIMO received signals for range and velocity estimation. The analysis was summarised and displayed in terms of estimation error performance, probability of error and average error. The simulation outcomes an improvement of 2.2 dB for a static target, and 0.1 dB for a moving target, in resulting the 20% probability of range error with the MIMO setup. A moving vessel's effect was observed to degrade the range error estimation performance between 0.6 to 2.7 dB. Meanwhile, the proposed method was proven to improve the 20% probability of velocity error by 1.75 dB. The impact of multi-frequency MIMO was also observed to produce better average error performance.
Performance evaluation of interference aware topology power and flow control ...IJECEIAES
Multi-Radio Multi-Channel Wireless Mesh Network (MRMC-WMN) has been considered as one of the key technology for the enhancement of network performance. It is used in a number of real-time applications such as disaster management system, transportation system and health care system. MRMC-WMN is a multi-hop network and allows simultaneous data transfer by using multiple radio interfaces. All the radio interfaces are typically assigned with different channels to reduce the effect of co-channel interference. In MRMC-WMN, when two nodes transmit at the same channel in the range of each other, generates co-channel interference and degrades the network throughput. Co-channel interference badly affects the capacity of each link that reduces the overall network performance. Thus, the important task of channel assignment algorithm is to reduce the co-channel interference and enhance the network performance. In this paper, the problem of channel assignment has been addressed for MRMC-WMN. We have proposed an Interference Aware, Topology, Power and Flow Control (ITPFC) Channel Assignment algorithm for MRMC-WMN. This algorithm assignes the suitable channels to nodes, which provides better link capacity and reduces the co-channel interference. In the previous work performance of the proposed algorithm has been evaluated for a network of 30 nodes. The aim of this paper is to further evaluate the performance of proposed channel assignment algorithm for 40 and 50 nodes network. The results obtained from these networks show the consistent performance in terms of throughput, delay, packet loss and number of channels used per node as compared to LACA, FCPRA and IATC Channel Assignment algorithms.
Research Inventy : International Journal of Engineering and Scienceinventy
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
Markovian Queueing Model for Throughput Maximization in D2D-Enabled Cellular ...IJECEIAES
Device-to-Device (D2D) communication has been considered a key enabling technol- ogy that can facilitate spectrum sharing in 4G and 5G cellular networks. In order to meet the high data rate demands of these new generation cellular networks, this paper considers the optimization of available spectrum resource through dynamic spectrum access. The utilization of continuous-time Markov chain (CTMC) model for efficient spectrum access in D2D-enabled cellular networks is investigated for the purpose of determining the impact of this model on the capacity improvement of cellular networks. The paper considers the use of CTMC model with both queueing and non-queueing cases called 13-Q CTMC and 6-NQ CTMC respectively with the aim of improving the overall capacity of the cellular network under a fairness constraint among all users. The proposed strategy consequently ensures that spectrum access for cellular and D2D users is optimally coordinated by designing optimal spectrum access probabilities. Numerical simulations are performed to observe the impact of the proposed Markovian queueing model on spectrum access and consequently on the capacity of D2D-enabled cellular networks. Results showed that the proposed 13-Q CTMC provide a more spectrumefficient sharing scheme, thereby enabling better network performances and larger capabilities to accommodate more users.
Design and implementation of new routingIJCNCJournal
Energy consumption is a key element in the Wireless Sensor Networks (WSNs) design. Indeed, sensor nodes are really constrained by energy supply. Hence, how to improve the network lifetime is a crucial and challenging task. Several techniques are available at different levels of the OSI model to maximize the WSN lifetime and especially at the network layer which uses routing strategies to maintain the routes in the network and guarantee reliable communication. In this paper we intend to propose a new protocol called
Combined Energy and Distance Metrics Dynamic Routing Protocol (CEDM-DR). Our new approach considers not only the distance between wireless sensors but also the energy of node acting as a router in order to find the optimal path and achieve a dynamic and adaptive routing.
The performance metrics exploited for the evaluation of our protocol are average energy consumed, network lifetime and packets lost. By comparing our proposed routing strategy to protocol widely used in WSN namely Ad hoc On demand Distance Vector(AODV), simulation results show that CEDM-DR strategy might effectively balance the sensor power consumption and permits accordingly to enhance the network
lifetime. As well, this new protocol yields a noticeable energy saving compared to its counterpart.
DATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKSEditor IJMTER
Hybrid networks are next generation of wireless networks that could be a
combination of Mobile wireless adhoc (MANET) networks and Wireless Infrastructure
networks. They are increasingly utilized in wireless communications that are extremely
supporting real time transmission with restricted Quality of Service. Invalid reservation and
race condition issues happens in MANET. In existing system, QoS-Oriented Distributed
routing protocol (QOD) is employed to boost the QoS support capability of hybrid networks,
it transforms the packet routing problem to resource scheduling problem that has 5
algorithms. They are, QoS guaranteed neighbor selection algorithm, Distributed packet
scheduling algorithm, Mobility based segment resizing algorithm, Traffic redundant
elimination algorithm and Data redundancy elimination based transmission algorithm. The
main drawback of hybrid networks is so far examined in minimum transmission hops and has
less beneficial feature with restricted number of mobile access points, mobility speeds, and
mobile workloads and with different network sizes. It will extremely perform on random
way point model and less in real mobility model. This paper present Data Transparent
Authentication to authenticates data streams by adjusting interpacket delay. Data Transparent
Authentication while not Communication overhead is an approach which reduces breakdown
of original information or sends out of band authentication data.
A small vessel detection using a co-located multi-frequency FMCW MIMO radar IJECEIAES
Small vessels detection is a known issue due to its low radar cross section (RCS). An existing shore-based vessel tracking radar is for long-distance commercial vessels detection. Meanwhile, a vessel-mounted radar system known for its reliability has a limitation due to its single radar coverage. The paper presented a co-located frequency modulated continuous waveform (FMCW) maritime radar for small vessel detection utilising a multiple-input multiple-output (MIMO) configuration. The radar behaviour is numerically simulated for detecting a Swerling 1 target which resembles small maritime’s vessels. The simulated MIMO configuration comprised two transmitting and receiving nodes. The proposal is to utilize a multi-frequency FMCW MIMO configuration in a maritime environment by applying the spectrum averaging (SA) to fuse MIMO received signals for range and velocity estimation. The analysis was summarised and displayed in terms of estimation error performance, probability of error and average error. The simulation outcomes an improvement of 2.2 dB for a static target, and 0.1 dB for a moving target, in resulting the 20% probability of range error with the MIMO setup. A moving vessel's effect was observed to degrade the range error estimation performance between 0.6 to 2.7 dB. Meanwhile, the proposed method was proven to improve the 20% probability of velocity error by 1.75 dB. The impact of multi-frequency MIMO was also observed to produce better average error performance.
Performance evaluation of interference aware topology power and flow control ...IJECEIAES
Multi-Radio Multi-Channel Wireless Mesh Network (MRMC-WMN) has been considered as one of the key technology for the enhancement of network performance. It is used in a number of real-time applications such as disaster management system, transportation system and health care system. MRMC-WMN is a multi-hop network and allows simultaneous data transfer by using multiple radio interfaces. All the radio interfaces are typically assigned with different channels to reduce the effect of co-channel interference. In MRMC-WMN, when two nodes transmit at the same channel in the range of each other, generates co-channel interference and degrades the network throughput. Co-channel interference badly affects the capacity of each link that reduces the overall network performance. Thus, the important task of channel assignment algorithm is to reduce the co-channel interference and enhance the network performance. In this paper, the problem of channel assignment has been addressed for MRMC-WMN. We have proposed an Interference Aware, Topology, Power and Flow Control (ITPFC) Channel Assignment algorithm for MRMC-WMN. This algorithm assignes the suitable channels to nodes, which provides better link capacity and reduces the co-channel interference. In the previous work performance of the proposed algorithm has been evaluated for a network of 30 nodes. The aim of this paper is to further evaluate the performance of proposed channel assignment algorithm for 40 and 50 nodes network. The results obtained from these networks show the consistent performance in terms of throughput, delay, packet loss and number of channels used per node as compared to LACA, FCPRA and IATC Channel Assignment algorithms.
Research Inventy : International Journal of Engineering and Scienceinventy
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
Markovian Queueing Model for Throughput Maximization in D2D-Enabled Cellular ...IJECEIAES
Device-to-Device (D2D) communication has been considered a key enabling technol- ogy that can facilitate spectrum sharing in 4G and 5G cellular networks. In order to meet the high data rate demands of these new generation cellular networks, this paper considers the optimization of available spectrum resource through dynamic spectrum access. The utilization of continuous-time Markov chain (CTMC) model for efficient spectrum access in D2D-enabled cellular networks is investigated for the purpose of determining the impact of this model on the capacity improvement of cellular networks. The paper considers the use of CTMC model with both queueing and non-queueing cases called 13-Q CTMC and 6-NQ CTMC respectively with the aim of improving the overall capacity of the cellular network under a fairness constraint among all users. The proposed strategy consequently ensures that spectrum access for cellular and D2D users is optimally coordinated by designing optimal spectrum access probabilities. Numerical simulations are performed to observe the impact of the proposed Markovian queueing model on spectrum access and consequently on the capacity of D2D-enabled cellular networks. Results showed that the proposed 13-Q CTMC provide a more spectrumefficient sharing scheme, thereby enabling better network performances and larger capabilities to accommodate more users.
Design and implementation of new routingIJCNCJournal
Energy consumption is a key element in the Wireless Sensor Networks (WSNs) design. Indeed, sensor nodes are really constrained by energy supply. Hence, how to improve the network lifetime is a crucial and challenging task. Several techniques are available at different levels of the OSI model to maximize the WSN lifetime and especially at the network layer which uses routing strategies to maintain the routes in the network and guarantee reliable communication. In this paper we intend to propose a new protocol called
Combined Energy and Distance Metrics Dynamic Routing Protocol (CEDM-DR). Our new approach considers not only the distance between wireless sensors but also the energy of node acting as a router in order to find the optimal path and achieve a dynamic and adaptive routing.
The performance metrics exploited for the evaluation of our protocol are average energy consumed, network lifetime and packets lost. By comparing our proposed routing strategy to protocol widely used in WSN namely Ad hoc On demand Distance Vector(AODV), simulation results show that CEDM-DR strategy might effectively balance the sensor power consumption and permits accordingly to enhance the network
lifetime. As well, this new protocol yields a noticeable energy saving compared to its counterpart.
A novel optimal small cells deployment for next-generation cellular networks IJECEIAES
Small-cell-deployments have pulled cellular operators to boost coverage and capacity in high-demand areas (for example, downtown hot spots). The location of these small cells (SCs) should be determined in order to achieve successful deployments. In this paper, we propose a new approach that optimizes small cells deployment in cellular networks to achieve three objectives: reduce the total cost of network installation, balancing the allocation of resources, i.e. placement of each SC and their transmitted power, and providing optimal coverage area with a lower amount of interference between adjacent stations. An accurate formula was obtained to determine the optimum number of SC deployment (NSC). Finally, we derive a mathematical expression to calculate the critical-handoff-point (CHP) for neighboring wireless stations.
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...pijans
As it is well known, the QoS(quality of service) provided by mobile Internet access point devices is far from
the QoS level offered by the common ADSL modem-router due to several reasons: in fact, mobile Internet
access networks are not designed to support real-time data traffic because of several drawbacks
concerning the wireless medium such as resource sharing, traffic congestion, radio link coverage etc.,
which impact directly such parameters as delay, jitter, and packet loss rate that are strictly connected to
the quality of user experience. The main scope of the present paper is to introduce a dual USIM HSPA
gateway for ad hoc and sensors networks thanks to which it will be possible to guarantee a QoS suitable
for a series of network-centric application such as real-time communications and monitoring, video
surveillance, real-time sensor networks, telemedicine, vehicular and mobile sensor networks and so on. The
main idea is to exploit multiple radio access networks in order to enhance the available end-to-end
bandwidth and the perceived quality of experience. The scope has been reached by combining multiple
radio access with dynamic load balancing and the VPN (virtual private network) bond technique.
Downlink beamforming and admissin control for spectrum sharing cognitive radi...acijjournal
n this paper, to detect the moving objects between frames in compressed video and to obtain the bes
t
compression video
and the noiseless video. We describe a video in which frames by classifying
macroblocks (MB), and describe motion estimation (ME), motion vector field (MV) and motion
compensation (MC). we propose to classify Macroblocks of each video frame into different
classes and use
this class information to describe the frame content based on the motion vector. MB class informatio
n
video applications such as shot change detection, motion discontinuity detection, Outlier rejection
for
global motion estimation. To reduc
e the noise and to improve the clarity of the compressed video by using
contrast limited adaptive histogram equalization (CLAHE) Algorithm
In this project, we proposed a framework to support heterogenous traffic with different QoS demand in
WiMAX. This framework dynamically changes the bandwidth allocation (BA) for ongoing and new arrival
connections based on network condition and service demand. The objective is to efficiently use the
available bandwidth and provide QoS support in a fair manner. Dynamic allocation of spectrum prior to
transmission can mitigate the starvation problem of Non Real time application. The WFQ based dynamic
bandwidth allocation framework uses architecture that has packet scheduler scheme (PS), call admission
policy and a dynamic bandwidth allocation mechanism. By the simulation result we have showed that this
architecture could provide QoS support by being fair to all classes of services.
Scheduling schemes for carrier aggregation in lte advanced systemseSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Research Inventy : International Journal of Engineering and Scienceinventy
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
CROSS-LAYER RESOURCE ALLOCATION SCHEME UNDER HETEROGENEOUS CONSTRAINTS FOR NE...IJNSA Journal
In the next generation wireless networks, the growing demand for new wireless applications is accompanied with high expectations for better quality of service (QoS) fulfillment especially for multimedia applications. Furthermore, the coexistence of future unlicensed users with existing licensed users is becoming a challenging task in the next generation communication systems to overcome the underutilization of the spectrum. A QoS and interference aware resource allocation is thus of special interest in order to respond to the heterogeneous constraints of the next generation networks. In this work, we address the issue of resource allocation under heterogeneous constraints for unlicensed multiband ultra-wideband (UWB) systems in the context of Future Home Networks, i.e. the wireless personal area network (WPAN). The problem is first studied analytically using a heterogeneous constrained optimization problem formulation. After studying the characteristics of the optimal solution, we propose a low-complexity suboptimal algorithm based on a cross-layer approach that combines information provided by the PHY and MAC layers. While the PHY layer is responsible for providing the channel quality of the unlicensed UWB users as well as their interference power that they cause on licensed users, the MAC layer is responsible for classifying the unlicensed users using a two-class based approach that guarantees for multimedia services a high-priority level compared to other services. Combined in an efficient and simple way, the PHY and MAC information present the key elements of the aimed resource allocation. Simulation results demonstrate that the proposed scheme provides a good tradeoff between the QoS satisfaction of the unlicensed applications with hard QoS requirements and the limitation of the interference affecting the licensed users.
DESIGN OF A COMPACT CIRCULAR MICROSTRIP PATCH ANTENNA FOR WLAN APPLICATIONS pijans
This paper presents the design of a compact circular microstrip patch antenna for WLAN applications which covers the band 5.15 to 5.825 GHz. The antenna is designed using 1.4mm thick FR-4 (lossy)substrate with relative permittivity 4.4 and a microstrip line feed is used. The radius of the circular patch is chosen as 7.62mm. To reduce the size and enhance the performance of the proposed antenna, a circular slot is loaded on circular patch and a square slot is etched on the ground plane of dimension 30mm×30mm. Design of the antenna is carried out using CST Microsoft Studio Sonimulation Software. The proposed antenna resonates at 5.5 GHz with a wider bandwidth of 702 MHz and it provides low return loss of -31.58 dB, good gain of 3.23 dB and directivity of 4.28 dBi and high efficiency of around 79% against the resonance frequency. The geometry of the proposed circular antenna with reduced size and its various performance parameters such as return loss, bandwidth, VSWR, gain, directivity, efficiency and radiation pattern plots are presented and discussed.
RESOURCE ALLOCATION ALGORITHMS FOR QOS OPTIMIZATION IN MOBILE WIMAX NETWORKSijwmn
WiMAX is based on the standard IEEE 802.16e-2009 for wireless access in Metropolitan Area Networks. It
is one of the solutions for 4G IP based wireless technology. WiMAX utilizes Orthogonal Frequency
Division Multiple Access which also supports Multicast and Broadcast Service with appropriate
Modulation and Coding Scheme. Presently, Scheduling and Resource allocation algorithm in Opportunistic
Layered Multicasting provides multicasting of layered video over mobile WiMAX to ensure better QoS.
Initially, the knowledge based allocation of subcarriers is used for scheduling. In addition, to reduce the
burst overhead, delay and jitter, SWIM (Swapping Min-Max) algorithm is utilized. Another promising
technology that can greatly improve the system performance by exploring the broadcasting nature of
wireless channels and the cooperation among multiple users is the Cooperative Multicast Scheduling
(CMS) technique. The simulation results show, Swapping Min-Max performs better with lesser number of
bursts, Zero jitter and with optimal throughput. The results with Cooperative Multicast Scheduling show
the enhanced throughput for each member in the Multicasting Scenario.
HANDOVER NECESSITY ESTIMATION FOR 4G HETEROGENEOUS NETWORKSijistjournal
One of the most challenges of 4G network is to have a unified network of heterogeneous wireless networks. To achieve seamless mobility in such a diverse environment, vertical hand off is still a challenging problem. In many situations handover failures and unnecessary handoffs are triggered causing degradation of services, reduction in throughput and increase the blocking probability and packet loss. In this paper a new vertical handoff decision algorithm handover necessity estimation (HNE), is proposed to minimize the number of handover failure and unnecessary handover in heterogeneous wireless networks. we have proposed a multi criteria vertical handoff decision algorithm based on two parts: traveling time estimation and time threshold calculation. Our proposed methods are compared against two other methods: (a) the fixed RSS threshold based method, in which handovers between the cellular network and the WLAN are initiated when the RSS from the WLAN reaches a fixed threshold, and (b) the hysteresis based method, in which a hysteresis is introduced to prevent the ping-pong effect. Simulation results show that, this method reduced the number of handover failures and unnecessary handovers up to 80% and 70%, respectively.
BIO-INSPIRED SEAMLESS VERTICAL HANDOVER ALGORITHM FOR VEHICULAR AD HOC NETWORKSijwmn
One of the most important factors to implement VANET is by considering the variety of wireless networks available around the city as well as the vehicles traffic scenarios. However, by providing a diverse range of wireless access technologies, it is necessary to provide continuous network connectivity as well as selecting the most suitable network technology and performance. Many researchers have worked on building algorithms for selecting the best network to improve the handover process. However, with high-speed vehicles mobility, the vertical handover process became the most challenging task in order to achieve realtime network selection. This paper proposes a bio-inspired network selection algorithm influenced by insect's behaviour which combines Artificial Bee Colony (ABC) and Particle Swarm Optimization (PSO). The proposed algorithm is applied to process multi-criteria parameters to evaluate the best available network and then execute the handover process seamlessly. The results demonstrate the benefits of the proposed Multi-Criteria ABC-PSO method by reducing the handover decision delays by 25%. It gives the optimum performance in terms of network selections and reduces the handover latency by 14.5%. The proposed algorithm also reduces the number of unnecessary handovers by 48% for three different mobility scenarios based on traffic environments (highway, urban and traffic jam).
Performance analysis for Adaptive Subcarriers Allocation in Coherent Optical ...iosrjce
The constraint to satisfy the need of increased bandwidth requirement for high speed applications
with higher performance has been a motivation to work on Optical Orthogonal Frequency division multiplexing
(OOFDM) technique with coherent detection. We implement the coherent optical OFDM (CO-OOFDM)
technique and investigate the effect of the number of sub-carriers on performance over single mode fiber (SMF)
links. To explore improvement in performance adaptive subcarriers has been selected by assigning subcarriers
to user according to the conditions of channel. An adaptive subcarrier allocation has been investigated and
performance comparison for proportional and equal allocation has been carried over.
A vertical handover decision approaches in next generation wireless networks ...ijmnct
In next generation wireless network the most desirable feature is its ability to move seamlessly over various
access network regardless of the network infrastructure is used. The handover between these dissimilar
networks can be explored by using vertical handover algorithms. This paper focuses on the vertical
handover decision methods and algorithms effectiveness. Most of the algorithms which are based on RSS
values provide vertical handover with small delay at a lower rate of throughput. There are such algorithms
which provide significant improvements in throughput but at a cost of higher delays. As per the need for the
real time applications in next generation wireless networks there is a requirement of developing new
optimized algorithms that are able to produce high throughput and minimizing signalling cost and delay.
Quality of Service in bandwidth adapted hybrid UMTS/WLAN interworking networkTELKOMNIKA JOURNAL
Integration of Universal Mobile Telecommunications System (UMTS) and Wireless Local Area Network (WLAN) result in ubiquitous connection for end users. In the integrated network, ensuring the quality of service to users and enhancing capacity of network are prominent issues. Bandwidth adaptation technique is one of the solutions to overcome these issues. Bandwidth adaptation based on per flow and per class schemes were proposed for loosely coupled interworking network. In this paper, hybrid coupled UMTS and WLAN interworking network is analyzed with bandwidth adaptation based on per flow and per class schemes and the performances have been compared. Simulation result shows that the proposed hybrid coupled interworking network with bandwidth adaptation based on per class scheme performs better with enhanced quality of service and network capacity.
Multi-Criteria Handoff Decision Algorithms In Wireless Networksiosrjce
IOSR Journal of Mobile Computing & Application (IOSR-JMCA) aims to cover innovative topics to research findings to trends analysis on Mobile Computing and Application related theories, technologies, methods, applications, and services from all engineering, business and organizational perspectives
Quality of experience aware network selection model for service provisioning...IJECEIAES
Heterogeneous wireless networks (HWNs) are capable of integrating the different radio access technologies that make it possible to connect mobile users based on the performance parameters. Further quality of service (QoS) is one of the major topics for HWNs, moreover existing radio access technology (RAT) methodology are designed to provide network QoS criteria. However, limited work has been carried out for the RAT selection mechanism considering user QoS preference and existing models are developed based on the multi-mode terminal under a given minimal density network. For overcoming research issues this paper present quality of experience (QoE) RAT (QOE-RAT) selection methodology, incorporating both network performance criteria and user preference considering multiple call and multi-mode HWNs environment. First, this paper presents fuzzy preference aware weight (FPAW) and multi-mode terminal preference aware TOPSIS (MMTPA-TOPSIS) for choosing the best RAT for gaining multiservices. Experiment outcomes show the QOE-RAT selection method achieves much superior packet transmission outcomes when compared with state-of-art Rat selection methodologies.
Adaptive Bandwidth Management Model for Wireless Mobile Ad-hoc NetworkIJCNCJournal
The quality of service (QoS) component in a mobile ad-hoc network has an active role in the current network scenario. In a dynamic mobile ad hoc network, ensuring optimum QoS with a scarce network resource is a significant challenge. To achieve QoS, it is essential to adopt some effective and efficient mechanisms. We have proposed an adaptive bandwidth manager model (ABMM) which uses a bandwidthsharing concept along with the flexible bandwidth reservation algorithm (FBRA) for an effective, quick and authentic data transfer. During real-time data transfer, to make communication effective, we make use of bandwidth-sharing network design problems and the concept of reserving bandwidth in high-performance networks. In our proposed model we are concentrating on the maximum utilization of resources, and using the scheduling concept to provide the minimum required bandwidth guarantee to QoS flows. Our goal is to reduce the delay in data transfer and enhance the throughput while properly utilizing the system resources. Our simulation result also shows that our model improves the network performance.
ADAPTIVE BANDWIDTH MANAGEMENT MODEL FOR WIRELESS MOBILE AD-HOC NETWORKIJCNCJournal
The quality of service (QoS) component in a mobile ad-hoc network has an active role in the current
network scenario. In a dynamic mobile ad hoc network, ensuring optimum QoS with a scarce network
resource is a significant challenge. To achieve QoS, it is essential to adopt some effective and efficient
mechanisms. We have proposed an adaptive bandwidth manager model (ABMM) which uses a bandwidthsharing concept along with the flexible bandwidth reservation algorithm (FBRA) for an effective, quick and
authentic data transfer. During real-time data transfer, to make communication effective, we make use of
bandwidth-sharing network design problems and the concept of reserving bandwidth in high-performance
networks. In our proposed model we are concentrating on the maximum utilization of resources, and using
the scheduling concept to provide the minimum required bandwidth guarantee to QoS flows. Our goal is to
reduce the delay in data transfer and enhance the throughput while properly utilizing the system resources.
Our simulation result also shows that our model improves the network performance.
A novel optimal small cells deployment for next-generation cellular networks IJECEIAES
Small-cell-deployments have pulled cellular operators to boost coverage and capacity in high-demand areas (for example, downtown hot spots). The location of these small cells (SCs) should be determined in order to achieve successful deployments. In this paper, we propose a new approach that optimizes small cells deployment in cellular networks to achieve three objectives: reduce the total cost of network installation, balancing the allocation of resources, i.e. placement of each SC and their transmitted power, and providing optimal coverage area with a lower amount of interference between adjacent stations. An accurate formula was obtained to determine the optimum number of SC deployment (NSC). Finally, we derive a mathematical expression to calculate the critical-handoff-point (CHP) for neighboring wireless stations.
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...pijans
As it is well known, the QoS(quality of service) provided by mobile Internet access point devices is far from
the QoS level offered by the common ADSL modem-router due to several reasons: in fact, mobile Internet
access networks are not designed to support real-time data traffic because of several drawbacks
concerning the wireless medium such as resource sharing, traffic congestion, radio link coverage etc.,
which impact directly such parameters as delay, jitter, and packet loss rate that are strictly connected to
the quality of user experience. The main scope of the present paper is to introduce a dual USIM HSPA
gateway for ad hoc and sensors networks thanks to which it will be possible to guarantee a QoS suitable
for a series of network-centric application such as real-time communications and monitoring, video
surveillance, real-time sensor networks, telemedicine, vehicular and mobile sensor networks and so on. The
main idea is to exploit multiple radio access networks in order to enhance the available end-to-end
bandwidth and the perceived quality of experience. The scope has been reached by combining multiple
radio access with dynamic load balancing and the VPN (virtual private network) bond technique.
Downlink beamforming and admissin control for spectrum sharing cognitive radi...acijjournal
n this paper, to detect the moving objects between frames in compressed video and to obtain the bes
t
compression video
and the noiseless video. We describe a video in which frames by classifying
macroblocks (MB), and describe motion estimation (ME), motion vector field (MV) and motion
compensation (MC). we propose to classify Macroblocks of each video frame into different
classes and use
this class information to describe the frame content based on the motion vector. MB class informatio
n
video applications such as shot change detection, motion discontinuity detection, Outlier rejection
for
global motion estimation. To reduc
e the noise and to improve the clarity of the compressed video by using
contrast limited adaptive histogram equalization (CLAHE) Algorithm
In this project, we proposed a framework to support heterogenous traffic with different QoS demand in
WiMAX. This framework dynamically changes the bandwidth allocation (BA) for ongoing and new arrival
connections based on network condition and service demand. The objective is to efficiently use the
available bandwidth and provide QoS support in a fair manner. Dynamic allocation of spectrum prior to
transmission can mitigate the starvation problem of Non Real time application. The WFQ based dynamic
bandwidth allocation framework uses architecture that has packet scheduler scheme (PS), call admission
policy and a dynamic bandwidth allocation mechanism. By the simulation result we have showed that this
architecture could provide QoS support by being fair to all classes of services.
Scheduling schemes for carrier aggregation in lte advanced systemseSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Research Inventy : International Journal of Engineering and Scienceinventy
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
CROSS-LAYER RESOURCE ALLOCATION SCHEME UNDER HETEROGENEOUS CONSTRAINTS FOR NE...IJNSA Journal
In the next generation wireless networks, the growing demand for new wireless applications is accompanied with high expectations for better quality of service (QoS) fulfillment especially for multimedia applications. Furthermore, the coexistence of future unlicensed users with existing licensed users is becoming a challenging task in the next generation communication systems to overcome the underutilization of the spectrum. A QoS and interference aware resource allocation is thus of special interest in order to respond to the heterogeneous constraints of the next generation networks. In this work, we address the issue of resource allocation under heterogeneous constraints for unlicensed multiband ultra-wideband (UWB) systems in the context of Future Home Networks, i.e. the wireless personal area network (WPAN). The problem is first studied analytically using a heterogeneous constrained optimization problem formulation. After studying the characteristics of the optimal solution, we propose a low-complexity suboptimal algorithm based on a cross-layer approach that combines information provided by the PHY and MAC layers. While the PHY layer is responsible for providing the channel quality of the unlicensed UWB users as well as their interference power that they cause on licensed users, the MAC layer is responsible for classifying the unlicensed users using a two-class based approach that guarantees for multimedia services a high-priority level compared to other services. Combined in an efficient and simple way, the PHY and MAC information present the key elements of the aimed resource allocation. Simulation results demonstrate that the proposed scheme provides a good tradeoff between the QoS satisfaction of the unlicensed applications with hard QoS requirements and the limitation of the interference affecting the licensed users.
DESIGN OF A COMPACT CIRCULAR MICROSTRIP PATCH ANTENNA FOR WLAN APPLICATIONS pijans
This paper presents the design of a compact circular microstrip patch antenna for WLAN applications which covers the band 5.15 to 5.825 GHz. The antenna is designed using 1.4mm thick FR-4 (lossy)substrate with relative permittivity 4.4 and a microstrip line feed is used. The radius of the circular patch is chosen as 7.62mm. To reduce the size and enhance the performance of the proposed antenna, a circular slot is loaded on circular patch and a square slot is etched on the ground plane of dimension 30mm×30mm. Design of the antenna is carried out using CST Microsoft Studio Sonimulation Software. The proposed antenna resonates at 5.5 GHz with a wider bandwidth of 702 MHz and it provides low return loss of -31.58 dB, good gain of 3.23 dB and directivity of 4.28 dBi and high efficiency of around 79% against the resonance frequency. The geometry of the proposed circular antenna with reduced size and its various performance parameters such as return loss, bandwidth, VSWR, gain, directivity, efficiency and radiation pattern plots are presented and discussed.
RESOURCE ALLOCATION ALGORITHMS FOR QOS OPTIMIZATION IN MOBILE WIMAX NETWORKSijwmn
WiMAX is based on the standard IEEE 802.16e-2009 for wireless access in Metropolitan Area Networks. It
is one of the solutions for 4G IP based wireless technology. WiMAX utilizes Orthogonal Frequency
Division Multiple Access which also supports Multicast and Broadcast Service with appropriate
Modulation and Coding Scheme. Presently, Scheduling and Resource allocation algorithm in Opportunistic
Layered Multicasting provides multicasting of layered video over mobile WiMAX to ensure better QoS.
Initially, the knowledge based allocation of subcarriers is used for scheduling. In addition, to reduce the
burst overhead, delay and jitter, SWIM (Swapping Min-Max) algorithm is utilized. Another promising
technology that can greatly improve the system performance by exploring the broadcasting nature of
wireless channels and the cooperation among multiple users is the Cooperative Multicast Scheduling
(CMS) technique. The simulation results show, Swapping Min-Max performs better with lesser number of
bursts, Zero jitter and with optimal throughput. The results with Cooperative Multicast Scheduling show
the enhanced throughput for each member in the Multicasting Scenario.
HANDOVER NECESSITY ESTIMATION FOR 4G HETEROGENEOUS NETWORKSijistjournal
One of the most challenges of 4G network is to have a unified network of heterogeneous wireless networks. To achieve seamless mobility in such a diverse environment, vertical hand off is still a challenging problem. In many situations handover failures and unnecessary handoffs are triggered causing degradation of services, reduction in throughput and increase the blocking probability and packet loss. In this paper a new vertical handoff decision algorithm handover necessity estimation (HNE), is proposed to minimize the number of handover failure and unnecessary handover in heterogeneous wireless networks. we have proposed a multi criteria vertical handoff decision algorithm based on two parts: traveling time estimation and time threshold calculation. Our proposed methods are compared against two other methods: (a) the fixed RSS threshold based method, in which handovers between the cellular network and the WLAN are initiated when the RSS from the WLAN reaches a fixed threshold, and (b) the hysteresis based method, in which a hysteresis is introduced to prevent the ping-pong effect. Simulation results show that, this method reduced the number of handover failures and unnecessary handovers up to 80% and 70%, respectively.
BIO-INSPIRED SEAMLESS VERTICAL HANDOVER ALGORITHM FOR VEHICULAR AD HOC NETWORKSijwmn
One of the most important factors to implement VANET is by considering the variety of wireless networks available around the city as well as the vehicles traffic scenarios. However, by providing a diverse range of wireless access technologies, it is necessary to provide continuous network connectivity as well as selecting the most suitable network technology and performance. Many researchers have worked on building algorithms for selecting the best network to improve the handover process. However, with high-speed vehicles mobility, the vertical handover process became the most challenging task in order to achieve realtime network selection. This paper proposes a bio-inspired network selection algorithm influenced by insect's behaviour which combines Artificial Bee Colony (ABC) and Particle Swarm Optimization (PSO). The proposed algorithm is applied to process multi-criteria parameters to evaluate the best available network and then execute the handover process seamlessly. The results demonstrate the benefits of the proposed Multi-Criteria ABC-PSO method by reducing the handover decision delays by 25%. It gives the optimum performance in terms of network selections and reduces the handover latency by 14.5%. The proposed algorithm also reduces the number of unnecessary handovers by 48% for three different mobility scenarios based on traffic environments (highway, urban and traffic jam).
Performance analysis for Adaptive Subcarriers Allocation in Coherent Optical ...iosrjce
The constraint to satisfy the need of increased bandwidth requirement for high speed applications
with higher performance has been a motivation to work on Optical Orthogonal Frequency division multiplexing
(OOFDM) technique with coherent detection. We implement the coherent optical OFDM (CO-OOFDM)
technique and investigate the effect of the number of sub-carriers on performance over single mode fiber (SMF)
links. To explore improvement in performance adaptive subcarriers has been selected by assigning subcarriers
to user according to the conditions of channel. An adaptive subcarrier allocation has been investigated and
performance comparison for proportional and equal allocation has been carried over.
A vertical handover decision approaches in next generation wireless networks ...ijmnct
In next generation wireless network the most desirable feature is its ability to move seamlessly over various
access network regardless of the network infrastructure is used. The handover between these dissimilar
networks can be explored by using vertical handover algorithms. This paper focuses on the vertical
handover decision methods and algorithms effectiveness. Most of the algorithms which are based on RSS
values provide vertical handover with small delay at a lower rate of throughput. There are such algorithms
which provide significant improvements in throughput but at a cost of higher delays. As per the need for the
real time applications in next generation wireless networks there is a requirement of developing new
optimized algorithms that are able to produce high throughput and minimizing signalling cost and delay.
Quality of Service in bandwidth adapted hybrid UMTS/WLAN interworking networkTELKOMNIKA JOURNAL
Integration of Universal Mobile Telecommunications System (UMTS) and Wireless Local Area Network (WLAN) result in ubiquitous connection for end users. In the integrated network, ensuring the quality of service to users and enhancing capacity of network are prominent issues. Bandwidth adaptation technique is one of the solutions to overcome these issues. Bandwidth adaptation based on per flow and per class schemes were proposed for loosely coupled interworking network. In this paper, hybrid coupled UMTS and WLAN interworking network is analyzed with bandwidth adaptation based on per flow and per class schemes and the performances have been compared. Simulation result shows that the proposed hybrid coupled interworking network with bandwidth adaptation based on per class scheme performs better with enhanced quality of service and network capacity.
Multi-Criteria Handoff Decision Algorithms In Wireless Networksiosrjce
IOSR Journal of Mobile Computing & Application (IOSR-JMCA) aims to cover innovative topics to research findings to trends analysis on Mobile Computing and Application related theories, technologies, methods, applications, and services from all engineering, business and organizational perspectives
Quality of experience aware network selection model for service provisioning...IJECEIAES
Heterogeneous wireless networks (HWNs) are capable of integrating the different radio access technologies that make it possible to connect mobile users based on the performance parameters. Further quality of service (QoS) is one of the major topics for HWNs, moreover existing radio access technology (RAT) methodology are designed to provide network QoS criteria. However, limited work has been carried out for the RAT selection mechanism considering user QoS preference and existing models are developed based on the multi-mode terminal under a given minimal density network. For overcoming research issues this paper present quality of experience (QoE) RAT (QOE-RAT) selection methodology, incorporating both network performance criteria and user preference considering multiple call and multi-mode HWNs environment. First, this paper presents fuzzy preference aware weight (FPAW) and multi-mode terminal preference aware TOPSIS (MMTPA-TOPSIS) for choosing the best RAT for gaining multiservices. Experiment outcomes show the QOE-RAT selection method achieves much superior packet transmission outcomes when compared with state-of-art Rat selection methodologies.
Adaptive Bandwidth Management Model for Wireless Mobile Ad-hoc NetworkIJCNCJournal
The quality of service (QoS) component in a mobile ad-hoc network has an active role in the current network scenario. In a dynamic mobile ad hoc network, ensuring optimum QoS with a scarce network resource is a significant challenge. To achieve QoS, it is essential to adopt some effective and efficient mechanisms. We have proposed an adaptive bandwidth manager model (ABMM) which uses a bandwidthsharing concept along with the flexible bandwidth reservation algorithm (FBRA) for an effective, quick and authentic data transfer. During real-time data transfer, to make communication effective, we make use of bandwidth-sharing network design problems and the concept of reserving bandwidth in high-performance networks. In our proposed model we are concentrating on the maximum utilization of resources, and using the scheduling concept to provide the minimum required bandwidth guarantee to QoS flows. Our goal is to reduce the delay in data transfer and enhance the throughput while properly utilizing the system resources. Our simulation result also shows that our model improves the network performance.
ADAPTIVE BANDWIDTH MANAGEMENT MODEL FOR WIRELESS MOBILE AD-HOC NETWORKIJCNCJournal
The quality of service (QoS) component in a mobile ad-hoc network has an active role in the current
network scenario. In a dynamic mobile ad hoc network, ensuring optimum QoS with a scarce network
resource is a significant challenge. To achieve QoS, it is essential to adopt some effective and efficient
mechanisms. We have proposed an adaptive bandwidth manager model (ABMM) which uses a bandwidthsharing concept along with the flexible bandwidth reservation algorithm (FBRA) for an effective, quick and
authentic data transfer. During real-time data transfer, to make communication effective, we make use of
bandwidth-sharing network design problems and the concept of reserving bandwidth in high-performance
networks. In our proposed model we are concentrating on the maximum utilization of resources, and using
the scheduling concept to provide the minimum required bandwidth guarantee to QoS flows. Our goal is to
reduce the delay in data transfer and enhance the throughput while properly utilizing the system resources.
Our simulation result also shows that our model improves the network performance.
Wireless Sensor Network Using Six Sigma Multi Hop RoutingIOSR Journals
Abstract: The most significant problem in the design of wireless sensor networks is to coordinate the sensors with dynamism into a wireless communication network and route sensed data to the base station. The energy efficiency is the most important key point of the network routing designing. This paper presents the efficient multi hop routing algorithm to extend the lifetime of sensor networks and focuses by employing six sigma principles to obtain the Quality of Service. To attain QoS support, we have to find either a route to assure the application requirements or offering network response to the application when the requirements cannot be met. Keywords: Wireless Sensor Networks, Multi hop routing, six sigma, QoS
Wireless Sensor Network Using Six Sigma Multi Hop RoutingIOSR Journals
The most significant problem in the design of wireless sensor networks is to coordinate the sensors
with dynamism into a wireless communication network and route sensed data to the base station. The energy
efficiency is the most important key point of the network routing designing. This paper presents the efficient
multi hop routing algorithm to extend the lifetime of sensor networks and focuses by employing six sigma
principles to obtain the Quality of Service. To attain QoS support, we have to find either a route to assure the
application requirements or offering network response to the application when the requirements cannot be met.
A SURVEY ON CALL ADMISSION CONTROL SCHEMES IN LTEIJCSES Journal
The growing number of mobile users with diverse applications such as VoIP, video, internet surfing etc. has made LTE networks to adopt a CAC strategy in order to ensure the quality of service (QoS) requirements of these applications. Over the years, several CAC schemes have been proposed to either accept or reject service requests. This paper presents a survey of these schemes under four different classes. The classes are: Bandwidth Reservation (BR), Bandwidth Degradation (BD), BR and BD and Non-BR and Non-BD (NBR-NBD). In each of the classification, the operation procedure, strengths and weaknesses of each scheme has been discussed. Furthermore, a comparative analysis of these schemes is also presented. The analysis provides insight into the challenges in the design of CAC by highlighting open research issues for future directions.
HANDOVER NECESSITY ESTIMATION FOR 4G HETEROGENEOUS NETWORKSijistjournal
One of the most challenges of 4G network is to have a unified network of heterogeneous wireless networks. To achieve seamless mobility in such a diverse environment, vertical hand off is still a challenging problem. In many situations handover failures and unnecessary handoffs are triggered causing degradation of services, reduction in throughput and increase the blocking probability and packet loss. In this paper a new vertical handoff decision algorithm handover necessity estimation (HNE), is proposed to minimize the number of handover failure and unnecessary handover in heterogeneous wireless networks. we have proposed a multi criteria vertical handoff decision algorithm based on two parts: traveling time estimation and time threshold calculation. Our proposed methods are compared against two other methods: (a) the fixed RSS threshold based method, in which handovers between the cellular network and the WLAN are initiated when the RSS from the WLAN reaches a fixed threshold, and (b) the hysteresis based method, in which a hysteresis is introduced to prevent the ping-pong effect. Simulation results show that, this method reduced the number of handover failures and unnecessary handovers up to 80% and 70%, respectively.
A Novel Handoff Necessity Estimation Approach Based on Travelling DistanceIJAAS Team
Mobility management is one of the most important challenges in Next
Generation Wireless Networks (NGWNs) as it enables users to move across
geographic boundaries of wireless networks. Nowadays, mobile
communications have heterogeneous wireless networks offering variable
coverage and Quality of Service (QoS). The availability of alternatives
generates a problem of occurrence of unnecessary handoff that results in
wastage of network resources. To avoid this, an efficient algorithm needs to
be developed to minimize the unnecessary handoffs. Conventionally,
whenever Wireless Local Area Network (WLAN) connectivity is available,
the mobile node switch from cellular network to wireless local area network
to gain maximum use of high bandwidth and low cost of wireless local area
network as much as possible. But to maintain call quality and minimum
number of call failure, a considerable proportion of these handovers should
be determined. Our algorithm makes the handoff to wireless local area
network only when the Predicted Received Signal Strength (PRSS) falls
below a threshold value and travelling distance inside the wireless local area
network is larger than a threshold distance.Through MATLAB simulation,
we show that our algorithm is able to improve handover performance.
Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...M H
One of the key challenges for research in wireless sensor networks is the development of routing protocols that provide application-specific service guarantees. This paper presents a new cluster-based Route Optimisation and Load-balancing protocol, called ROL, that uses various quality of service (QoS) metrics to meet application requirements. ROL combines several application requirements, specifically it attempts to provide an inclusive solution to prolong network life, provide timely message delivery and improve network robustness. It uses a combination of routing metrics that can be configured according to the priorities of user-level applications to improve overall network performance. To this end, an optimisation tool for balancing the communication resources for the constraints and priorities of user applications has been developed and Nutrient-flow-based Distributed Clustering (NDC), an algorithm for load balancing is proposed. NDC works seamlessly with any clustering algorithm to equalise, as far as possible, the diameter and the membership of clusters. This paper presents simulation results to show that ROL/NDC gives a higher network lifetime than other similar schemes, such Mires++. In simulation, ROL/NDC maintains a maximum of 7\% variation from the optimal cluster population, reduces the total number of set-up messages by up to 60%, reduces the end-to-end delay by up to 56%, and enhances the data delivery ratio by up to 0.98% compared to Mires++.
A Comparative Analysis of Vertical Handover Decision Process Algorithms for N...Editor IJMTER
Increasing consumer demand for access to services anywhere and anytime is driving a
hastened technological progression towards the integration of a variety of wireless access
technologies. Therefore one of the chief interest points of Next Generation Wireless Networks
(NGWNs), refers to the capability to support wireless network access equipments to guarantee a high
rate of services between dissimilar wireless networks. To answer these problems it is essential to
have decision algorithms to decide for every user of mobile terminal, which is the most excellent
network at some point, for a service or a precise application that the user needs. Therefore to make
these things, many algorithms use the vertical handoff technique. A series of algorithms based on
vertical handoff technique with a categorization of the different existing vertical handoff decision
strategies, which tries to resolve these issues of wireless network selection at a specified time for a
specific application of an user has been discussed in this paper. Also few parameters that are to be
considered during vertical handover have been discussed briefly.
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...pijans
Reliable group communication is a challenging issue for most Mobile Ad-hoc Networks (MANETs) due to
dynamic nature of wireless mobile nodes, group key establishment and management, ensuring secure
information exchange and Quality of Service (QoS) in data transfer. Recently multicast and broadcast
routing protocols are emerging for supporting QoS aware group communication. In MANETs QoS
requirements can be quantified by a set of measurable pre-specified service attributes such as packet
delivery ratio, end-to-end delay, packet loss probability, network control overhead, throughput,
bandwidth, power consumption, service coverage area etc. In this paper, the performance of a neighbor
knowledge based broadcast protocol is analyzed using different QoS metrics (packet delivery ratio, end-toend delay, packet loss probability and network control overhead). BCAST is used as broadcast protocol.
The performance differentials are analyzed using NS-2 network simulator for varying number of data
senders (multicast group size) and data sending rate (offered traffic to the network) over QoS aware group
communication. Simulation results show that BCAST performs well in most cases and provides robust
performance even with high traffic environments.
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...pijans
Reliable group communication is a challenging issue for most Mobile Ad-hoc Networks (MANETs) due to
dynamic nature of wireless mobile nodes, group key establishment and management, ensuring secure
information exchange and Quality of Service (QoS) in data transfer. Recently multicast and broadcast
routing protocols are emerging for supporting QoS aware group communication. In MANETs QoS
requirements can be quantified by a set of measurable pre-specified service attributes such as packet
delivery ratio, end-to-end delay, packet loss probability, network control overhead, throughput,
bandwidth, power consumption, service coverage area etc. In this paper, the performance of a neighbor
knowledge based broadcast protocol is analyzed using different QoS metrics (packet delivery ratio, end-toend delay, packet loss probability and network control overhead). BCAST is used as broadcast protocol.
The performance differentials are analyzed using NS-2 network simulator for varying number of data
senders (multicast group size) and data sending rate (offered traffic to the network) over QoS aware group
communication. Simulation results show that BCAST performs well in most cases and provides robust
performance even with high traffic environments.
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...IJNSA Journal
With the rapid growth of wireless communication infras,,tructure over the recent few years, new
challenges has been posed on the system and analysis on wireless adhoc networking. Implementation of
MIMO communication in such type of network is enhancing the packet transmission capabilities. There
are different techniques for cooperative transmission and broadcasting packet in MIMO equipped
Mobile Adhoc Network. We have employed a model network in the OPNET environment and propose a
new scheduling algorithm based on investigating the different broadcasting algorithm. The new
broadcasting algorithm improves the packet transmission rate of the network based on energy
performance of the network and minimizes the BER for different transmission mode which is illustrated
in this paper. The simulations are done in MATLAB and OPNET environment and the simulated result
for the packet transmission rate are collected and shown in the tabular form. Also simulate the network
for generating a comparative statement for each mobile node. And performance analysis is also done for
the model network. The main focus is to minimize BER and improve information efficiency of the
network.
ADAPTIVE HANDOVER HYSTERESIS AND CALL ADMISSION CONTROL FOR MOBILE RELAY NODESIJCNCJournal
The aim of equipping a wireless network with a mobile relay node is to support broadband wireless communications for vehicular users and their devices. The high mobility of vehicular users, possibly at a very high velocity in the area in which two cells overlap, could cause the network to suffer from a reduced handover success rate and, hence, increased radio link failure. The combined impact of these problems is service interruptions to vehicular users. Thus, the handover schemes are crucial in solving these problems. In this work, we first present the adaptive handover hysteresis scheme for the wireless network with mobile relay nodes in the high-speed train scenario. Specifically, our proposed adaptive hysteresis scheme is based on the velocity of the train. Second, the handover call dropping probability is reduced by introducing a modified call admission control scheme to support radio resource reservation for handover calls that prioritizes handover calls of mobile relay over the other calls. The proposed solution in which adaptive parameter is combined with call admission control is evaluated by system level simulation. Our simulation results illustrate an increased handover success rate and reduced radio link failures.
IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...IJNSA Journal
With the rapid growth of wireless communication infras,,tructure over the recent few years, new challenges has been posed on the system and analysis on wireless adhoc networking. Implementation of MIMO communication in such type of network is enhancing the packet transmission capabilities. There are different techniques for cooperative transmission and broadcasting packet in MIMO equipped Mobile Adhoc Network. We have employed a model network in the OPNET environment and propose a new scheduling algorithm based on investigating the different broadcasting algorithm. The new broadcasting algorithm improves the packet transmission rate of the network based on energy performance of the network and minimizes the BER for different transmission mode which is illustrated in this paper. The simulations are done in MATLAB and OPNET environment and the simulated result for the packet transmission rate are collected and shown in the tabular form. Also simulate the network for generating a comparative statement for each mobile node. And performance analysis is also done for the model network. The main focus is to minimize BER and improve information efficiency of the network.
An Approach to Improve the Quality of Service in OFDMA Relay Networks via Re-...iosrjce
With the next-generation cellular networks making a transition toward smaller cells, two-hop
orthogonal frequency-division multiple access (OFDMA) relay networks have become a dominant, mandatory
component in the 4G standards (WiMAX802.16j, 3GPP LTE-Adv.). Here we are using the multicasting strategy
Given the growing importance of multimedia broadcast and multicast services (MBMS) in 4G networks, the
latter forms the focus of this project. The main aim of this project is to improve the performance of the OFDMA
based relay networks. The OFDMA transmission Scheme is a widely accepted scheme for improving the quality
and speed of communication over the 4G cellular network. There are two different models designed for OFDMA
relay networks .Distributed (DP) and Contiguous (CP) permutations. We are checking the performance of two
algorithms The linear programming algorithm and the greedy algorithm by using two models of OFDMA for
multicast scheduling and after performance evaluation we select the best model and the algorithm for
transmission. We further improve the throughput via retransmission of lost packets during data transfer over the
specified network. We can detect the packet loss by packet synchronization technique and a request will be sent
by the destination for re-sending the lost packets which is called as Re-Transmission.[1]
Vehicle Ad Hoc Networks (VANETs) have become a viable technology to improve traffic flow and safety on the roads. Due to its effectiveness and scalability, the Wingsuit Search-based Optimised Link State Routing Protocol (WS-OLSR) is frequently used for data distribution in VANETs. However, the selection of MultiPoint Relays (MPRs) plays a pivotal role in WS-OLSR's performance. This paper presents an improved MPR selection algorithm tailored to WS-OLSR, designed to enhance the overall routing efficiency and reduce overhead. The analysis found that the current OLSR protocol has problems such as redundancy of HELLO and TC message packets or failure to update routing information in time, so a WS-OLSR routing protocol based on improved-MPR selection algorithm was proposed. Firstly, factors such as node mobility and link changes are comprehensively considered to reflect network topology changes, and the broadcast cycle of node HELLO messages is controlled through topology changes. Secondly, a new MPR selection algorithm is proposed, considering link stability issues and nodes. Finally, evaluate its effectiveness in terms of packet delivery ratio, end-to-end delay, and control message overhead. Simulation results demonstrate the superior performance of our improved MR selection algorithm when compared to traditional approaches.
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
So far, Wireless Body Area Networks (WBANs) have played a pivotal role in driving the development of intelligent healthcare systems with broad applicability across various domains. Each WBAN consists of one or more types of sensors that can be embedded in clothing, attached directly to the body, or even implanted beneath an individual's skin. These sensors typically serve asingle application. However, the traffic generated by each sensor may have distinct requirements. This diversity necessitates a dual approach: tailored treatment based on the specific needs of each traffic typeand the fulfillment of application requirements, such asreliability and timeliness. Never the less, the presence of energy constraints and the unreliable nature of wireless communications make QoS provisioning under such networks a non-trivial task. In this context, the current paper introduces a novel Medium AccessControl (MAC) strategy for the regular traffic applications of WBANs, designed to significantly enhance efficiency when compared to the established MAC protocols IEEE 802.15.4 and IEEE 802.15.6, with a particular focus on improving reliability, timeliness, and energy efficiency.
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdfIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
The efficient use of energy in wireless sensor networks is critical for extending node lifetime. The network topology is one of the factors that have a significant impact on the energy usage at the nodes and the quality of transmission (QoT) in the network. We propose a topology control algorithm for software-defined wireless sensor networks (SDWSNs) in this paper. Our method is to formulate topology control algorithm as a nonlinear programming (NP) problem with the objective to optimizing two metrics, maximum communication range, and desired degree. This NP problem is solved at the SDWSN controller by employing the genetic algorithm (GA) to determine the best topology. The simulation results show that the proposed algorithm outperforms the MaxPower algorithm in terms of average node degree and energy expansion ratio.
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
The integration of artificial intelligence technology with a scalable Internet of Things (IoT) platform facilitates diverse smart communication services, allowing remote users to access services from anywhere at any time. The multi-server environment within IoT introduces a flexible security service model, enabling users to interact with any server through a single registration. To ensure secure and privacy preservation services for resources, an authentication scheme is essential. Zhao et al. recently introduced a user authentication scheme for the multi-server environment, utilizing passwords and smart cards, claiming resilience against well-known attacks. This paper conducts cryptanalysis on Zhao et al.'s scheme, focusing on denial of service and privacy attacks, revealing a lack of user-friendliness. Subsequently, we propose a new multi-server user authentication scheme for privacy preservation with fuzzy commitment over the IoT environment, addressing the shortcomings of Zhao et al.'s scheme. Formal security verification of the proposed scheme is conducted using the ProVerif simulation tool. Through both formal and informal security analyses, we demonstrate that the proposed scheme is resilient against various known attacks and those identified in Zhao et al.'s scheme.
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
In -Vehicle Ad-Hoc Network (VANET), vehicles continuously transmit and receive spatiotemporal data with neighboring vehicles, thereby establishing a comprehensive 360-degree traffic awareness system. Vehicular Network safety applications facilitate the transmission of messages between vehicles that are near each other, at regular intervals, enhancing drivers' contextual understanding of the driving environment and significantly improving traffic safety. Privacy schemes in VANETs are vital to safeguard vehicles’ identities and their associated owners or drivers. Privacy schemes prevent unauthorized parties from linking the vehicle's communications to a specific real-world identity by employing techniques such as pseudonyms, randomization, or cryptographic protocols. Nevertheless, these communications frequently contain important vehicle information that malevolent groups could use to Monitor the vehicle over a long period. The acquisition of this shared data has the potential to facilitate the reconstruction of vehicle trajectories, thereby posing a potential risk to the privacy of the driver. Addressing the critical challenge of developing effective and scalable privacy-preserving protocols for communication in vehicle networks is of the highest priority. These protocols aim to reduce the transmission of confidential data while ensuring the required level of communication. This paper aims to propose an Advanced Privacy Vehicle Scheme (APV) that periodically changes pseudonyms to protect vehicle identities and improve privacy. The APV scheme utilizes a concept called the silent period, which involves changing the pseudonym of a vehicle periodically based on the tracking of neighboring vehicles. The pseudonym is a temporary identifier that vehicles use to communicate with each other in a VANET. By changing the pseudonym regularly, the APV scheme makes it difficult for unauthorized entities to link a vehicle's communications to its real-world identity. The proposed APV is compared to the SLOW, RSP, CAPS, and CPN techniques. The data indicates that the efficiency of APV is a better improvement in privacy metrics. It is evident that the AVP offers enhanced safety for vehicles during transportation in the smart city.
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
Malware is one of the threats to security of computer networks and information systems. Since malware instances are available sufficiently, there is increased interest among researchers on usage of Artificial Intelligence (AI). Of late AI-enabled methods such as machine learning (ML) and deep learning paved way for solving many real-world problems. As it is a learning-based approach, accumulated training samples help in improving thequality of training and thus leveraging malware detection accuracy. Existing deep learning methods are focusing on learning-based malware detection systems. However, there is need for improving the state of the art through ensemble approach. Towards this end, in this paper we proposed a framework known as Deep Ensemble Framework (DEF) for automatic malware detection. The framework obtains features from training samples. From given malware instance a grayscale image is generated. There is another process to extract the opcode sequences. Convolutional Neural Network (CNN) and Long Short Term Memory (LSTM) techniques are used to obtain grayscale image and opcode sequence respectively. Afterwards, a stacking ensemble is employed in order to achieve efficient malware detection and classification. Malware samples collected fromthe Internet sources and Microsoft are used for theempirical study. An algorithm known as Ensemble Learning for Automatic Malware Detection (EL-AML) is proposed to realize our framework. Another algorithm named Pre-Process is proposed to assist the EL-AML algorithm for obtaining intermediate features required by CNN and LSTM.Empirical study reveals that our framework outperforms many existing methods in terms of speed-up and accuracy.
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficIJCNCJournal
With the emergence of smart devices and the Internet of Things (IoT), millions of users connected to the network produce massive network traffic datasets. These vast datasets of network traffic, Big Data are challenging to store, deal with and analyse using a single computer. In this paper we developed parallel implementation using a High Performance Computer (HPC) for the Non-Negative Matrix Factorization technique as an engine for an Intrusion Detection System (HPC-NMF-IDS). The large IoT traffic datasets of order of millions samples are distributed evenly on all the computing cores for both storage and speedup purpose. The distribution of computing tasks involved in the Matrix Factorization takes into account the reduction of the communication cost between the computing cores. The experiments we conducted on the proposed HPC-IDS-NMF give better results than the traditional ML-based intrusion detection systems. We could train the HPC model with datasets of one million samples in only 31 seconds instead of the 40 minutes using one processor), that is a speed up of 87 times. Moreover, we have got an excellent detection accuracy rate of 98% for KDD dataset.
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
So far, Wireless Body Area Networks (WBANs) have played a pivotal role in driving the development of intelligent healthcare systems with broad applicability across various domains. Each WBAN consists of one or more types of sensors that can be embedded in clothing, attached directly to the body, or even implanted beneath an individual's skin. These sensors typically serve asingle application. However, the traffic generated by each sensor may have distinct requirements. This diversity necessitates a dual approach: tailored treatment based on the specific needs of each traffic typeand the fulfillment of application requirements, such asreliability and timeliness. Never the less, the presence of energy constraints and the unreliable nature of wireless communications make QoS provisioning under such networks a non-trivial task. In this context, the current paper introduces a novel Medium AccessControl (MAC) strategy for the regular traffic applications of WBANs, designed to significantly enhance efficiency when compared to the established MAC protocols IEEE 802.15.4 and IEEE 802.15.6, with a particular focus on improving reliability, timeliness, and energy efficiency.
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
The efficient use of energy in wireless sensor networks is critical for extending node lifetime. The network topology is one of the factors that have a significant impact on the energy usage at the nodes and the quality of transmission (QoT) in the network. We propose a topology control algorithm for software-defined wireless sensor networks (SDWSNs) in this paper. Our method is to formulate topology control algorithm as a nonlinear programming (NP) problem with the objective to optimizing two metrics, maximum communication range, and desired degree. This NP problem is solved at the SDWSN controller by employing the genetic algorithm (GA) to determine the best topology. The simulation results show that the proposed algorithm outperforms the MaxPower algorithm in terms of average node degree and energy expansion ratio.
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
The integration of artificial intelligence technology with a scalable Internet of Things (IoT) platform facilitates diverse smart communication services, allowing remote users to access services from anywhere at any time. The multi-server environment within IoT introduces a flexible security service model, enabling users to interact with any server through a single registration. To ensure secure and privacy preservation services for resources, an authentication scheme is essential. Zhao et al. recently introduced a user authentication scheme for the multi-server environment, utilizing passwords and smart cards, claiming resilience against well-known attacks. This paper conducts cryptanalysis on Zhao et al.'s scheme, focusing on denial of service and privacy attacks, revealing a lack of user-friendliness. Subsequently, we propose a new multi-server user authentication scheme for privacy preservation with fuzzy commitment over the IoT environment, addressing the shortcomings of Zhao et al.'s scheme. Formal security verification of the proposed scheme is conducted using the ProVerif simulation tool. Through both formal and informal security analyses, we demonstrate that the proposed scheme is resilient against various known attacks and those identified in Zhao et al.'s scheme.
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
In -Vehicle Ad-Hoc Network (VANET), vehicles continuously transmit and receive spatiotemporal data with neighboring vehicles, thereby establishing a comprehensive 360-degree traffic awareness system. Vehicular Network safety applications facilitate the transmission of messages between vehicles that are near each other, at regular intervals, enhancing drivers' contextual understanding of the driving environment and significantly improving traffic safety. Privacy schemes in VANETs are vital to safeguard vehicles’ identities and their associated owners or drivers. Privacy schemes prevent unauthorized parties from linking the vehicle's communications to a specific real-world identity by employing techniques such as pseudonyms, randomization, or cryptographic protocols. Nevertheless, these communications frequently contain important vehicle information that malevolent groups could use to Monitor the vehicle over a long period. The acquisition of this shared data has the potential to facilitate the reconstruction of vehicle trajectories, thereby posing a potential risk to the privacy of the driver. Addressing the critical challenge of developing effective and scalable privacy-preserving protocols for communication in vehicle networks is of the highest priority. These protocols aim to reduce the transmission of confidential data while ensuring the required level of communication. This paper aims to propose an Advanced Privacy Vehicle Scheme (APV) that periodically changes pseudonyms to protect vehicle identities and improve privacy. The APV scheme utilizes a concept called the silent period, which involves changing the pseudonym of a vehicle periodically based on the tracking of neighboring vehicles. The pseudonym is a temporary identifier that vehicles use to communicate with each other in a VANET. By changing the pseudonym regularly, the APV scheme makes it difficult for unauthorized entities to link a vehicle's communications to its real-world identity. The proposed APV is compared to the SLOW, RSP, CAPS, and CPN techniques. The data indicates that the efficiency of APV is a better improvement in privacy metrics. It is evident that the AVP offers enhanced safety for vehicles during transportation in the smart city.
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
Malware is one of the threats to security of computer networks and information systems. Since malware instances are available sufficiently, there is increased interest among researchers on usage of Artificial Intelligence (AI). Of late AI-enabled methods such as machine learning (ML) and deep learning paved way for solving many real-world problems. As it is a learning-based approach, accumulated training samples help in improving thequality of training and thus leveraging malware detection accuracy. Existing deep learning methods are focusing on learning-based malware detection systems. However, there is need for improving the state of the art through ensemble approach. Towards this end, in this paper we proposed a framework known as Deep Ensemble Framework (DEF) for automatic malware detection. The framework obtains features from training samples. From given malware instance a grayscale image is generated. There is another process to extract the opcode sequences. Convolutional Neural Network (CNN) and Long Short Term Memory (LSTM) techniques are used to obtain grayscale image and opcode sequence respectively. Afterwards, a stacking ensemble is employed in order to achieve efficient malware detection and classification. Malware samples collected fromthe Internet sources and Microsoft are used for theempirical study. An algorithm known as Ensemble Learning for Automatic Malware Detection (EL-AML) is proposed to realize our framework. Another algorithm named Pre-Process is proposed to assist the EL-AML algorithm for obtaining intermediate features required by CNN and LSTM.Empirical study reveals that our framework outperforms many existing methods in terms of speed-up and accuracy.
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficIJCNCJournal
With the emergence of smart devices and the Internet of Things (IoT), millions of users connected to the network produce massive network traffic datasets. These vast datasets of network traffic, Big Data are challenging to store, deal with and analyse using a single computer. In this paper we developed parallel implementation using a High Performance Computer (HPC) for the Non-Negative Matrix Factorization technique as an engine for an Intrusion Detection System (HPC-NMF-IDS). The large IoT traffic datasets of order of millions samples are distributed evenly on all the computing cores for both storage and speedup purpose. The distribution of computing tasks involved in the Matrix Factorization takes into account the reduction of the communication cost between the computing cores. The experiments we conducted on the proposed HPC-IDS-NMF give better results than the traditional ML-based intrusion detection systems. We could train the HPC model with datasets of one million samples in only 31 seconds instead of the 40 minutes using one processor), that is a speed up of 87 times. Moreover, we have got an excellent detection accuracy rate of 98% for KDD dataset.
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
Cyber intrusion attacks increasingly target the Internet of Things (IoT) ecosystem, exploiting vulnerable devices and networks. Malicious activities must be identified early to minimize damage and mitigate threats. Using actual benign and attack traffic from the CICIoT2023 dataset, this WORK aims to evaluate and benchmark machine-learning techniques for IoT intrusion detection. There are four main phases to the system. First, the CICIoT2023 dataset is refined to remove irrelevant features and clean up missing and duplicate data. The second phase employs statistical models and artificial intelligence to discover novel features. The most significant features are then selected in the third phase based on cooperative game theory. Using the original CICIoT2023 dataset and a dataset containing only novel features, we train and evaluate a variety of machine learning classifiers. On the original dataset, Random Forest achieved the highest accuracy of 99%. Still, with novel features, Random Forest's performance dropped only slightly (96%) while other models achieved significantly lower accuracy. As a whole, the work contributes substantial contributions to tailored feature engineering, feature selection, and rigorous benchmarking of IoT intrusion detection techniques. IoT networks and devices face continuously evolving threats, making it necessary to develop robust intrusion detection systems.
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
IoT networking uses real items as stationary or mobile nodes. Mobile nodes complicate networking. Internet of Things (IoT) networks have a lot of control overhead messages because devices are mobile. These signals are generated by the constant flow of control data as such device identity, geographical positioning, node mobility, device configuration, and others. Network clustering is a popular overhead communication management method. Many cluster-based routing methods have been developed to address system restrictions. Node clustering based on the Internet of Things (IoT) protocol, may be used to cluster all network nodes according to predefined criteria. Each cluster will have a Smart Designated Node. SDN cluster management is efficient. Many intelligent nodes remain in the network. The network design spreads these signals. This paper presents an intelligent and responsive routing approach for clustered nodes in IoT networks. An existing method builds a new sub-area clustered topology. The Nodes Clustering Based on the Internet of Things (NCIoT) method improves message transmission between any two nodes. This will facilitate the secure and reliable interchange of healthcare data between professionals and patients. NCIoT is a system that organizes nodes in the Internet of Things (IoT) by grouping them together based on their proximity. It also picks SDN routes for these nodes. This approach involves selecting one option from a range of choices and preparing for likely outcomes problem addressing limitations on activities is a primary focus during the review process. Predictive inquiry employs the process of analyzing data to forecast and anticipate future events. This document provides an explanation of compact units. The Predictive Inquiry Small Packets (PISP) improved its backup system and partnered with SDN to establish a routing information table for each intelligent node, resulting in higher routing performance. Both principal and secondary roads are available for use. The simulation findings indicate that NCIoT algorithms outperform CBR protocols. Enhancements lead to a substantial 78% boost in network performance. In addition, the end-to-end latency dropped by 12.5%. The PISP methodology produces 5.9% more inquiry packets compared to alternative approaches. The algorithms are constructed and evaluated against academic ones.
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
Cyber intrusion attacks increasingly target the Internet of Things (IoT) ecosystem, exploiting vulnerable devices and networks. Malicious activities must be identified early to minimize damage and mitigate threats. Using actual benign and attack traffic from the CICIoT2023 dataset, this WORK aims to evaluate and benchmark machine-learning techniques for IoT intrusion detection. There are four main phases to the system. First, the CICIoT2023 dataset is refined to remove irrelevant features and clean up missing and duplicate data. The second phase employs statistical models and artificial intelligence to discover novel features. The most significant features are then selected in the third phase based on cooperative game theory. Using the original CICIoT2023 dataset and a dataset containing only novel features, we train and evaluate a variety of machine learning classifiers. On the original dataset, Random Forest achieved the highest accuracy of 99%. Still, with novel features, Random Forest's performance dropped only slightly (96%) while other models achieved significantly lower accuracy. As a whole, the work contributes substantial contributions to tailored feature engineering, feature selection, and rigorous benchmarking of IoT intrusion detection techniques. IoT networks and devices face continuously evolving threats, making it necessary to develop robust intrusion detection systems.
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...IJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
IoT networking uses real items as stationary or mobile nodes. Mobile nodes complicate networking. Internet of Things (IoT) networks have a lot of control overhead messages because devices are mobile. These signals are generated by the constant flow of control data as such device identity, geographical positioning, node mobility, device configuration, and others. Network clustering is a popular overhead communication management method. Many cluster-based routing methods have been developed to address system restrictions. Node clustering based on the Internet of Things (IoT) protocol, may be used to cluster all network nodes according to predefined criteria. Each cluster will have a Smart Designated Node. SDN cluster management is efficient. Many intelligent nodes remain in the network. The network design spreads these signals. This paper presents an intelligent and responsive routing approach for clustered nodes in IoT networks. An existing method builds a new sub-area clustered topology. The Nodes Clustering Based on the Internet of Things (NCIoT) method improves message transmission between any two nodes. This will facilitate the secure and reliable interchange of healthcare data between professionals and patients. NCIoT is a system that organizes nodes in the Internet of Things (IoT) by grouping them together based on their proximity. It also picks SDN routes for these nodes. This approach involves selecting one option from a range of choices and preparing for likely outcomes problem addressing limitations on activities is a primary focus during the review process. Predictive inquiry employs the process of analyzing data to forecast and anticipate future events. This document provides an explanation of compact units. The Predictive Inquiry Small Packets (PISP) improved its backup system and partnered with SDN to establish a routing information table for each intelligent node, resulting in higher routing performance. Both principal and secondary roads are available for use. The simulation findings indicate that NCIoT algorithms outperform CBR protocols. Enhancements lead to a substantial 78% boost in network performance. In addition, the end-to-end latency dropped by 12.5%. The PISP methodology produces 5.9% more inquiry packets compared to alternative approaches. The algorithms are constructed and evaluated against academic ones.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
MULTI-CRITERIA HANDOVER DECISION FOR HETEROGENEOUS NETWORKS: CARRIER AGGREGATION DEPLOYMENT SCENARIO
1. International Journal of Computer Networks & Communications (IJCNC) Vol.12, No.4, July 2020
DOI: 10.5121/ijcnc.2020.12403 41
MULTI-CRITERIA HANDOVER DECISION FOR
HETEROGENEOUS NETWORKS: CARRIER
AGGREGATION DEPLOYMENT SCENARIO
Maryam Abdulazeez- Ahmed, Nor Kamariah Nordin, Aduwati Bint Sali and
Fazirulhisyam Hashim
Department of Computer and Communication Systems Engineering, Universiti Putra
Malaysia, 43400, UPM Serdang, Selangor Malaysia
ABSTRACT
Carrier aggregation and integration of heterogeneous networks allow the mobile user equipment to benefit
from wider bandwidth and radio coverage of different access technologies. However, these technologies
have increased handoff scenario probability through user equipment’s mobility, leading to high outage
probability and low throughput. Handover is an important aspect of mobility management which allows
users to migrate from one cell to another without losing connections. But no lone access technology meets
the requirements of providing seamless communication without loss and delay. Therefore, high-quality
service continuity and reliable user equipment access to network anywhere and at any time require the
design of an appropriate handover decision algorithm. In this paper, a multi-criteria based handover
decision-making algorithm is proposed to evade loss of communication and provide better performance to
the system. It adaptively makes handover decisions based on different decision criteria (load, availability
of resources, and the handover scenario type) in addition to signal interference to noise ratio. The multi-
criteria handover decision making algorithm-based method chooses among the cells that satisfy the
requirements for the handover. As compared to some existing handover decision algorithms, simulation
result shows that this algorithm improves system performance in terms of handover failure by 93%, 72%,
and 58%; radio link failure reduction by 77%, 43%, and 22%; and handover ping–pong by 81%, 59%, and
36% over the conventional received signal strength, received wireless transmission line, and multi-
influence factor hand over decisions respectively.
KEYWORDS
Carrier aggregation, handover decision, user equipment, heterogeneous network, Long Time Evolution-
Advanced, multi-criteria, signal-to-interference-plus-noise-ratio, interference-to-interference-plus-noise-
ratio
1. INTRODUCTION
Several works have proposed various handover decision algorithms in wireless communication
systems. In conventional handover, Received Signal Strength (RSS) and/or power level received
from candidate base stations is compared in [1]. Also, other parameters such as: (a) RSS with a
threshold (b) RSS with hysteresis (c) RSS with hysteresis and threshold [2][3] (d) RSS with
hysteresis and distance [4][5] (e) Signal-to-Interference-plus-Noise-Ratio (SINR) [6][7][8][9]and
(f) Interference-to-Interference-plus-Noise-Ratio (IINR) [10]. However, their handover decision
algorithms are based on a single parameter. In order to enhance handover decision through user’s
movement, other factors like bandwidth and availability of resources, velocity of mobile terminal,
distance between mobile stations, and Evolved Node Bs (eNodeBs) need to be considered so as
to maximize system performance and User Equipment (UE) satisfaction. This is because
2. International Journal of Computer Networks & Communications (IJCNC) Vol.12, No.4, July 2020
42
traditionally, mobile devices may be moved for better service quality. Thus, employing only
single criteria causes service interruption and unbalanced network load which in turn degrades
user’s throughput and increases its outage probability.
In [11][12][13][14], handover decisions are taken based on multi-criteria factors but none
considers carrier aggregation techniques. Carrier aggregation in heterogeneous networks leads to
increased access in technologies, bandwidth, transmission rate, energy requirement, coverage,
and enhanced network protocols. For the purpose of efficiency, one infrastructure capable of
interconnecting multiple access networks is required to support data concurrence at all cell
locations. Thus, efficient handover mechanism is required for ensuring seamless connectivity and
uninterrupted service delivery for future generation wireless networks.
Carrier Aggregation (CA) is one of the main background features for Long Time Evolution-
Advanced (LTE-A). With CA, users would gain access to a total bandwidth of up to 100MHz.
The system bandwidth may be contiguous, non-contiguous, and inter-band noncontiguous [15].
The bandwidth of these Component Carriers (CCs) can vary widely, ranging from 1.4MHz to
20MHz for Long Time Evolution (LTE) carriers. Also, propagation characteristics differ in
different CCs. For example, the propagation characteristic of CCs in the 800MHz band differs
from a component carrier in the 2.4GHz band [16].
Also, the introduction of CA technology, brings with it, a new handover scenario, which can be
performed between the CCs serving under the same sector and the same eNodeB with a
probability of redefining the Primary Component Carriers (PCCs). This results in increased
handover probability that consequently increases throughput degradation. The handover scenario
here is being translated into an efficient Handover Decision (HoD) provided the serving PCC
gives enough RSS to the UEs on acceptable levels.
Though [17] has studied handover decisions in the CA scenario using multi-influence criteria, but
only macro celle NodeB is considered. This cannot give the maximum benefit of CA in terms of
capacity and coverage increment. On the other hand, a limited number of UEs can be served by
outdoor macro eNodeB in heavily populated areas with the available spectrum. Therefore, the CA
technique and heterogeneous networks are possible solutions [18][19][20] to improve cell
capacity and utilization of the available spectrum. On the other hand, the seamless mobility of
UEs in the CA scenario using the same parameters of a macro eNodeB faces challenges due to
the aggregation of multiple CCs [21].
Fundamentally, handover is considered during the period when a voice call is in progress and
moving toward the current eNodeB (i.e source to a target eNodeB). In this case, signal
measurements obtained at a UE from the neighboring eNodeB, are reported by the UE to the
serving eNodeB and the handover decision is based on the measurement report from the UE at
the source eNodeB. Whereas in CA-based system, due to multiple CCs, the source and the target
eNodeBs can be CCs of the same or different eNodeBs. Employing such a signal Measurement
Report (MR) for decision making is not speedily concluded. Thus, it leads to a high probability of
handover failure, increase throughput degradation, and user outage probability especially to the
high-velocity UEs [22][23].
The main idea of handover is to maintain the connection while the subcarrier moves out of the
coverage area of the source eNodeB and enters the vicinity of the target eNodeB. Availability of
services to satisfy the customer is one of the major goals in cellular networks communication
[24]. However, efficient handover decision algorithm leads to an improvement in continuous
connectivity and enhancement in the network performances are inadequate. Therefore, it is novel
3. International Journal of Computer Networks & Communications (IJCNC) Vol.12, No.4, July 2020
43
to look into HoD algorithm that can satisfactorily handle the major tasks in cellular network by
enhancing the level of the services, and manage the resources of the network simultaneously, and
serve as motivation to carrying out this work.
In this work, a proposed algorithm called Multi-criteria Handover Decision (MCHoD) is
presented to take tactful decision on handover when heterogeneous Network (HetNet) and CA is
implemented in LTE-A system. MCHoD dynamically changes handover decision algorithm
based on the signal strength, availability of resources, UE distance from the serving eNodeB and
the handover scenario type. MCHoD algorithm seeks to improve the system performances by
providing higher efficiency in SINR, cell edge spectral efficiency, and low outage probability in
the event of users’ mobility. The major contribution of this work is the development of MCHoD
algorithm on CA, integrating macro-eNodeBs (MeNodeBs) and femto-eNodeBs (FeNodeBs) to
provide UEs uninterrupted services in users’ mobility network.
The remaining of this paper is organized as follows. Related Work is presented in Section 2
followed by handover with CA techniques in section 3. The proposed algorithm and the system
model are described in Section 4. In section 5, results and discussions are presented while
conclusion is given in Section 6.
2. RELATED WORK
The handover decision is taken by the serving eNodeB based on the measurement report that is
received from the served UE. MR contains a list of signal levels of neighboring cells, and it can
provide other information based on the HoD algorithm being implemented. There are several
methods of a handover decision algorithm. Generally, it may be classified into the following
categories:
1) The traditional RSS-based criteria
2) Fuzzy logic
3) Multi-influence Factor (MIF) based
RSS–based approach is the traditional handover decision algorithm that uses RSS as the main
criteria to trigger handover [2][25]. In this case, the signal strengths of neighboring eNodeBs are
compared and consequently, the handover is enabled. The RSS-based technique has been
enhanced by adopting the RSS threshold (hysteresis) [5] and by combining the RSS threshold
with the user’s distance [4], SINR [6], and IINR [10]. To suppress the Ping-Pong effects, a
threshold is defined and applied in relative signal strength. The handover is initiated if existing
eNodeB RSS is lower than the threshold value and the new eNodeB RSS is stronger than the
threshold. Though, RSS based method is simple in principle and easy to use in measuring the
characteristics and the quality of services. However, the RSS signal fluctuates due to path loss in
the wireless medium. This effect results in unnecessary handovers, ping pong, and throughput
degradation. Also, RSS with threshold has drawbacks of handover delay and high call drop.
However, recent studies have demonstrated that by implementing CA and HetNets technologies,
handover decision becomes more challenging. The RSS-based criterion is not complete enough
for a decision process in HetNet with CA technique.
There are studies which employed fuzzy logic in decision making process to improve the
intelligence of HoD [26][27] for network selection and performances. Fuzzy logic method has
advantage of inherent potential to solve the precision problems but with the cost of design
complexity.
4. International Journal of Computer Networks & Communications (IJCNC) Vol.12, No.4, July 2020
44
Meanwhile, an MIF decision making criteria was studied in a coordinated carrier aggregation
deployment scenario [17]. MIF applied different parameters that influence the decision making
process. Though, the simulation result shows that ping pong has been reduced but the result is not
optimal when HetNet is considered in CA.
The algorithm based on multi-criteria reduces the handoff delay and service disruption time. This
in turn decreases the packet lost, and increases throughput during handover [11][13][28].
Because of this, in MCHoD the chosen criteria ensure that the accuracy of the decision making is
held high. The main criteria are either user-related or network related, such as RSS, mobility,
application, and bandwidth. Despite all the earlier works are based on different criteria in
HetNets and CA, the question of which of the parameters yield an optimal handover process is an
open question. So, to find out the best parameters for successful handover process, a new
algorithm called multi-criteria handover decision algorithm is proposed for efficient handover
decision making when CA and HetNet is considered in LTE-A system. Table 1 compares some
of the existing work on different algorithms.
Table 1. Comparison of related works
Algorithm Application Achievement Drawback
RSS HetNet Simple Inaccurate
High rate of unnecessary
handover
Ping-pong effect
Fuzzy Logic HetNet Accurate precision High design complexity
MIF Coordinated CA Ping pong effect and
unnecessary
handover reduced
Only single eNodeB was used
Therefore, the proposed MCHoD algorithm combines RSS, bandwidth, speed, handover scenario,
and SINR in decision process in other to achieve seamless mobility.
3. CARRIER AGGREGATION BASED HANDOVER TECHNIQUES IN HETNETS
The introduction of CA technique in LTE-A system raises the number of aggregated CCs that can
be deployed at one eNodeB and simultaneously assign it to a UE. These CCs are grouped into
two main types. The first one is known as a PCC, whereas the second type of CCs is called
Secondary Component Carrier (SCC) [29][30].
The CCs concept of CA techniques considered in this study are as follows. We assumed that the
PCC is always at the Micro eNodeB (MeNodeB), whereas, the SCC is at the Femto eNodeB
(FeNodeB). With this configuration, the UEs always have a stable anchor PCC. At the
commencement of radio resource connection (RRC), UE is associated to the PCC which provides
the best signal quality over all the active CCs as the serving cell that is always active throughout
the active mode of the UE [31][32][33]. Data transmission between the UE and the eNodeB; and
the control signaling information exchange are usually carried out with PCC. Apart from being
used as data transmission channel, PCC is employed for random access procedure and allocation
of SCC. In the process, radio link failure event is recorded only if there is radio link connection
failure over the PCC. On the other hand, SCC can be configured and activated by eNodeB as an
additional CC used for additional resources for the served UE where higher data rate is required.
5. International Journal of Computer Networks & Communications (IJCNC) Vol.12, No.4, July 2020
45
However, SCC cannot be used for exchanging control signaling messages between a UE and an
eNodeB [34].
Addition more to the developments, Radio Link Failure (RLF) is an indicator recorded when a
connection over the PCC fails. If this happens, Radio Resource Control (RRC) re-establishment
procedure comes into action over the named PCC. In the same vein, the Non-access Stratum
(NaS) recovery procedure is triggered if the RCC re-establishment procedure over the PCC is
failed within T310. T310 is the maximum allowed time for recovering connection through the
RRC re-establishment procedure [30][35].
Unlike the LTE system, the CA in the LTE-A system has increased handover scenarios (i.e.
changing of PCC in the same sector) influenced by aggregation of multiple carriers in addition to
channel conditions of two or more adjacent cells that may completely differ for the specific UE.
This poses challenges for the target eNodeB to guarantee the reservation of sufficient system
resources for the incoming UE’s service requirement. Therefore, employing single criteria in the
handover decision-making process may result in inappropriate handover for the target eNodeB
thus, leading to high handover probability which in turn increases outage probability and
throughput degradation.
In this paper, in order to reduce the outage probability and increase the spectral efficiency, we
propose a multi-criteria handover decision method with additional parameters such as SINR,
bandwidth, and data rate. This algorithm provides a set of parameters for better handover.
4. PROPOSED MULTI-CRITERIA HANDOVER DECISION ALGORITHM
In response to handover decision challenges of CA concept in LTE-A and future generation
systems, different handover decision algorithms have been proposed but none of the algorithms
has given the optimal result expected, particularly for HetNet’s Carrier Aggregation Deployment
Scenario (CADS). Therefore, in this study, we propose an efficient multi-criteria handover
decision (MCHoD) algorithm that utilizes both the network parameter (network topology and
radio resources) and mobile parameter (load, and UE distance) as input for decision making.
Due to the deployment structure of Het-Net’s CADS, UEs may not receive a signal from only the
MeNodeB, but also from FeNodeB. UEs are mostly connected to MeNodeB for high signal
reception and quality of service but are handed over to FeNodeB and vice-versa when the signal
strength drops below acceptable levels. This consequently leads to load imbalance. Furthermore,
differences in the transmitted power between MeNodeB and FeNodeB often cause frequent
handover, especially, ping-pong handover which negatively affects the system throughput.
Therefore, in this study, we incorporate Cell Range Expansion (CRE) power control technique
standardized in the Third Generation Partnership Project (3GPP) [36], as a virtual bias, added to
actual UE received power. This assists the UE with the association decision required. CRE is a
practical power control technique that boosts the received signal power strength of FeNodeB
which forces the UEs to offload to it. The biasing technique limits the MeNodeB load and
stabilizes the UE when it transits around the cell edges. At the same time, it reduces ping-pong
probability and consequently increases the network throughput.
Meanwhile, CRE will also alter the UE’s handover position due to changes in the coverage area
by the FeNodeB. During the UE association process, the handover margin is used to adapt the
received signal strength (RSS) in MCHoD. The PCC handover decision is initiated by UE
performance parameters such as SINR Handover management (HoM) and SINR threshold; and
6. International Journal of Computer Networks & Communications (IJCNC) Vol.12, No.4, July 2020
46
handover scenario types. With this, handover decisions can be adaptively executed according to
the following conditions as depicted in the flowchart in Figure 1.
1) If the target cell SINR is larger than the sum of the handover margin and the serving cell
SINR then handover to target cell for all UEs on PCC, subject to condition 2.
2) That the target cell load is less than the sum of the serving cell load and the load margin
on inter-frequency components.
On the other hand, if the handover type is changing the serving sector or serving eNodeB (macro
to Femto), the decision will be based on resource availability, UE distance to the eNodeB, and
SINR. The handover decision can then be executed if the following conditions are satisfied:
1) That the target SINR is larger than that of the serving SINR plus handover margin
2) That the serving cell load is larger than the target cell load by a predefined load margin
3) That the UE distance to the target cell is less than the UE distance to the serving cell.
The combination of both the MCHoD and CRE techniques does not only increase the system
throughput but also reduces the handover failure rate.
Figure 1: Flow diagram of the proposed multi-criteria decision algorithm
7. International Journal of Computer Networks & Communications (IJCNC) Vol.12, No.4, July 2020
47
4.1. System Model and Simulation Setup
The proposed algorithm is implemented as a multicell system using MATLAB toolbox system-
level simulator to generate LTE-A heterogeneous network topologies. MATLAB have a wide
variety of inbuilt libraries and features that can convert C, C++ code into MATLAB codes. It also
allows the necessary manipulation of data, improves the chances of new technology, and
increases the security surrounding a new technology [33]. We employed MATLAB as used by
prior studies [17][11][1].
The network scenario configuration was implemented by overlaying FeNodeBs on the
MeNodeBs coverage area with a uniform user’s distribution using the 3GPP LTE-A standard
topology [34][37]. The considered simulation environment consists of 61 hexagonal cell layout of
macro eNodeB located at the center with 500m inter-site distance. The MeNodeBs is subdivided
into three sectors and Omni-directional coverage femtocells are deployed in each sector to form
the CCs in inter-band noncontiguous deployment. The operating frequencies for CC1 and CC2
are 2GHz and 3.5GHz respectively premised on the band scenarios for Release 13 and 14 [34].
The UEs are uniformly distributed across the femtocell coverage area. The simulated cell
accommodates up to 50 mobile UEs randomly moving within the coverage area with a uniform
speed of 3, 20, 30, 60, 90, and 120 km/h. The assumption is that the frequency re-use factor is
taken to be 1. The inter-cell interference to other sectors is generated only from the first tier of the
neighboring eNodeBs. This is because the second tier neighboring eNodeBs are far away from
the serving eNodeB. Moreover, their signals are assumed to be weak and therefore, have no
significant impact on the served UEs. Radio resource control (RRC), radio link failure (RLF), and
NaS recovery procedures are all considered in this simulation. Adaptive Modulation and Coding
(AMC) schemes as specified in [38] is considered. The handover process follows the procedures
introduced in [39] with the assumption of 600ms as a time to trigger and 6dB as handover
margin. In order to improve performance accuracy; Radio Link Failure (RLF), radio resource
connection re-establishment, and NaS procedures are considered throughout the simulation. The
summary of the parameters that are used is listed in Table 2.
Table 2. Simulation parameters and values
Parameters Values
Propagation model Macrocell/Femtocell urban model
OFDM
Number of Component Carriers 2CCs each 20MHz
Bandwidth (MHz) 40 (2X20) MHz
Number of Resource Block 100
Resource Block size 180kHz
Number of Subcarrier per RB 12 Subcarrier per RB
Subcarrier Spacing 15kHz
Number of OFDM Symbol per frame 7
MeNodeB Parameters
Transmit power (dBm) 46dBm
Antenna gain + feeder loss 15dBi
Antenna height 15m
Noise figure 5
FeNodeB Parameters
Transmit power (dBm) 10dB
Antenna gain + feeder loss 2dBi
8. International Journal of Computer Networks & Communications (IJCNC) Vol.12, No.4, July 2020
48
Antenna height 1m
Noise figure 4dB
Biasing value 10
User Parameters:
Antenna Gain 0 dBi
Antenna Height 1.5m
Noise Figure 9dB
Thermal Noise Power (NP) NP = Nt +10log (BW x 106) dB
Time-To-Trigger (TTT) 600ms
Handover Margin (HoM) 6dB
T311 10s
Measurement Interval for PCC and SCC 50ms
Process Delay Time 10ms
Simulation Time 500min
5. RESULT AND DISCUSSION
The proposed MCHoD algorithm is simulated and validated using MATLAB tools for the
simulation following the evaluation methodology of the LTE-A system.
Generally, high-speed UEs present several challenges to handover algorithms. To evaluate the
performance of MCHoD, it is compared with other handover decision algorithms such as
Conventional Received Signal Strength (CRSS), Received Wireless Transmission Line (RWTL),
and Multi-influence Factor (MIF) earlier discussed in section II. To demonstrate the effectiveness
of our algorithm, a comprehensive investigation of MCHoD at various speeds was examined
based on the probabilities of the Radio Link Failure (RLF), Handover Failure Rate (HFR), ping-
pong and throughput as shown in Figures 2, 3, and 4 respectively.
In terms of Handover Failure (HoF) reduction, the performance gains of MCHoD over CRSS,
MIF-HoD, and RWTL is presented in Figure 2. Generally, it is observed that at low speeds, the
rate of HoF is lower than at high speeds as in Figure 2a. This can be attributed to the fact that the
number of cells that a UE crosses over a certain period of time is lower at those speeds (i.e. 3, 20,
and 30 km/h). However, an increase in UE’s speed accelerates the frequency of handover because
as the UE moves away from the serving cell, signal reception becomes weaker, and so also is the
data rate. This results in a high HoF rate and consequently reduces the performance of the
system.
A plot of the average HoF probability shows that CRSS has the highest HoF rate as shown in
Figure 2b. The reason is that CRSS employs only a single criterion for handover decision
making. Besides, it does not consider the SINR and the availability of the resources. Therefore, it
suffices to say that, since handover consumes more resources, it is bound to experience more HoF
rates if the target cell is not having the required resources. The other two baselines, RWTL and
MIF have a much lower HoF compared to CRSS because the former utilizes RSS and
transmission line losses whereas, the latter employs more than one criterion in the handover
decision making process implementing CA scenario. The use of CA facilitates wider bandwidth
and effective utilization of available resources to make decisions. Quantitative assessment
produced shows that MCHoD achieves higher reduction gain in HoF by approximately 93%,
72%, and 58% over CRSS, RWTL-HoD, and MIF-HoD respectively.
9. International Journal of Computer Networks & Communications (IJCNC) Vol.12, No.4, July 2020
49
Figure 2: Probability of handover failure (HoF). (a) At different speeds (b) average handover failure
probability for different decision algorithms.
UE speed does not only affect handover, it has much to do with RLF probability. At high UE
speeds, radio link connection becomes weakened due to fading, leading to higher RLF failure.
Figure 3a illustrates the RLF rate at different speeds. Overall, it is observed that the probabilities
of RLF get higher as the UE’s speed increases but the effects vary among the four algorithms
examined. Similar to the evaluation of HoF, CRSS is much affected by RLF than the other
algorithms. Generally, RSS is known to be unstable [26]. So, its implementation as an only
deciding factor in the heterogeneous network which has different characteristic cannot give the
optimal result. Figure 3a shows the performances of RFL in relation to mobile speed where
MCHoD and MIF-HoD are both low. On the average (Figure 3b), MCHoD shows a good
performance (low RLF ratio) compared with the other algorithms, CRSS, RWTL, and MIF-HoD
by 77%, 43%, and 22%, respectively.
10. International Journal of Computer Networks & Communications (IJCNC) Vol.12, No.4, July 2020
50
Figure 3: Probability of Radio Link Failure (RLF). (a) Failure at different UE’s speeds and (b) average
RLF for different decision algorithms
The plot of the Handover Ping Pong (HoPP) ratio against the speed is presented in Figure 4a. As
expected, due to its reliance on only the downlink signal quality, the CRSS method shows the
highest HoPP rate. Except for MCHoD which has insignificant ping-pong effects across the
different speeds examined, other decision criteria show the extensive influence of speed over
HoPP. Obviously, this phenomenon increases with increasing UE speed. In Figure 4a, as the RSS
in the downlink tends to fluctuate due to shadow fading, cell selection becomes unstable, leading
to a high HoPP ratio. The higher the HoPP, the more resources are wasted. In our algorithm,
HoPP is minimized much better by using MCHoD where the handover is triggered if the
requirements are met. Thus, the UE can be handed over to a suitable cell that satisfies the entire
requirements for a successful handover to the target cell. The MCHoD has the best performance.
11. International Journal of Computer Networks & Communications (IJCNC) Vol.12, No.4, July 2020
51
It reduces the HoPP by approximately 81%, 59%, and 36% over the CRSS, RWTL, and MIF-
HoD, respectively.
The resultant effect of HoF, RLF, and HoPP reflects on the Cumulative Distribution Function
(CDF) probability UEs throughput. The higher the throughput value on the CDF probability plot,
the better the performance of the system (Figure 4b). It can be observed, therefore, that the
proposed MCHoD decision algorithm performs better than all the other algorithms evaluated in
this work. In short, MCHoD is designed to select the best target cell based on multi-criteria
decision method. This reduces the HoPP and increases the throughput gain.
Figure 4: (a) Average Ping-Pong Handover probability over different speeds and (b) CDF of UEs
throughputs
6. CONCLUSION
The proposed MCHoD performs better than previous handover decision algorithms as it
demonstrate a significant reduction in HoF, RLF, and HoPP rates. This is an achievement and can
12. International Journal of Computer Networks & Communications (IJCNC) Vol.12, No.4, July 2020
52
be explained thus. First, there is a choice in the mapping of CCs, and PCC configured on
MeNodeB for wider coverage, and the SCC on FeNodeB to extend the signal to the cell edge
users. Second, the implementation of AMC schemes which allows UEs to be assigned the most
suitable channel irrespective of variations in the channel conditions linearly increases the SINR
which eventually leads to improvement in the entire system throughput. Third, the
implementation of CRE techniques to resolve the load imbalance problem among the configured
networks thereby offloading traffics from the congested MeNodeBs. One of the outstanding
performances of the MCHoD is that it minimizes the effects of the parameters examined (RLF,
HoF, and HoPP) across the observed UE speeds. It also provides efficient resource utilization as a
result of the increased number of aggregated CCs that can be deployed at an eNodeB and
simultaneously assigned to a UE. This development is useful whenever there are a number of
users that are required to add or remove one or more CCs. Finally, MCHoD contributes to the
enhancement of the system performances by increasing user SINR, spectral efficiency, and
reducing the user’s outage probability. Since the future generation wireless communication will
be built on these qualities, MCHoD stands a promising handover decision algorithm for carrier
aggregation, Het-Nets deployment in LTE-A and future generation of wireless communication
As with every research, there are limitations and this study is no exception. Since carrier
aggregation technique and heterogeneous networks deployment appears to be the prospect of
wireless generation networks for higher capacity and data rate, further study needs to be
conducted on effective deployment of Femtocell (FeNodeB) for high-speed outdoor application.
Parameters like security, password protection, interoperability, etc. can also be included.
Technically, a femtocell is deployed for use indoors, but in this study, it is considered for outdoor
use and tested over different UE speeds. Certainly, its deployment outside is practicable but may
result in a high rate of ping-pong especially with user speed above 120 km/h.
CONFLICTS OF INTEREST
The authors declare no conflict of interest.
REFERENCES
[1] S. Maaloul, M. Afif, and S. Tabbane, “Handover Decision in Heterogeneous Networks,” in IEEE
30th International Conference on Advanced Information Networking and Applications, 2016, pp.
588–595.
[2] G. P. Pollini, “Trends in Handover Design,” IEEE Commun. Mag., vol. 34, no. 3, pp. 82–90, 1996.
[3] S. Dhar ROY, “Performance Evaluation of Signal Strength Based Handover Algorithms,” Int’l J.
Commun. Netw. Syst. Sci., vol. 02, no. 07, pp. 657–663, 2009.
[4] I. Ken-Ichi, W. Soichi, S. Jen-Shew, and S. Takuro, “Performance of Handoff Algorithm Based on
Distance and RSSI Measurements VOL. 51, NO. 6, NOVEMBER 2002,” IEEE Trans. Veh. Technol.,
vol. 51, no. 6, 2002.
[5] S. Lal and D. K. Panwar, “Coverage Analysis of Handoff Algorithm with Adaptive Hystersis
Margin,” in International conference on Information Technology, 2007, pp. 133–138.
[6] K. Yang, I. Gondal, B. Qiu, and L. S. Dooley, “Combined SINR Based Vertical Handoff Algorithm
for Next Generation Heterogeneous Wireless Networks,” in IEEE Globecom proceedings,
2007, pp. 4483–4487.
[7] A. K., N. K.;, and a. D. P.Ayyappan, “SINR Based Vertical Handoff Scheme for QoS in
Heterogeneous Wireless Networks,” in International Conference on Future Computer and
Communication (ICFCC 2009)., 2009, pp. 117–121.
[8] A. A. Bathich, M. D. Baba, R. A. Rahman, and U. T. Mara, “SINR Based Media Independent
Handover in WiMAX and WLAN Networks,” in international conference on Computier Application
and iIdustrial Electronics (ICCAIE), 2011, pp. 331–334.
13. International Journal of Computer Networks & Communications (IJCNC) Vol.12, No.4, July 2020
53
[9] P. Baruah, N. Sarma, and S. S. Satapathy, “SINR based vertical handoff algorithm between GPRS
and WiMAX networks,” J. Theor. Appl. Inf. Technol., vol. 14, no. 2, pp. 107–110, 2010.
[10] H. Choi, “An Optimal Handover Decision for Throughput Enhancement,” IEEE Commun. Lett., vol.
14, no. 9, pp. 851–853, 2010.
[11] G. Mahardhika, M. Ismail, and R. Nordin, “Multi-criteria vertical handover decision algorithm in
heterogeneous wireless network,” J. Theor. Appl. Inf. Technol., vol. 54, no. 2, pp. 339–345, 2015.
[12] M. A. Radhwan and A. Z. Zuriati, “Enhanced Handover Decision Algorithm in Heterogeneous
Wireless network,” Sensors, vol. 1626, no. 17, pp. 1–14, 2017.
[13] S. Pahal and P. Sehrawat, “Multi-Criteria Handoff Decision Algorithms In Wireless Networks,” J.
Mob. Comput. Appl., vol. 2, no. 2, pp. 2394–42, 2015.
[14] M. M. Alkhawlani, “Multi-Criteria Vertical Handover for Heterogonous Networks,” Int. J. Wirel.
Mob. Networks, vol. 3, no. 2, pp. 149–163, 2011.
[15] X. Lin, J. Andrews, and A. Ghosh, “Modeling, analysis and design for carrier aggregation in
heterogeneous cellular networks,” IEEE Transactions on Communications, pp. 1–12, 2012.
[16] X. Lin, J. G. Andrews, R. Ratasuk, B. Mondal, and A. Ghosh, “Carrier Aggregation in Heterogeneous
Cellular Networks,” IEEE Wireless Communication Symposium, pp. 5199–5203, 2013.
[17] I. Shayea, M. Ismail, R. Nordin, and H. Mohamad, “Adaptive Handover Decision Algorithm Based
on Multi-Influence Factors through Carrier Aggregation Implementation in LTE- Advanced
System,” J. Comput. Networks Commun., vol. 2014, p. 8, 2014.
[18] 3GPP, “TR 136 912 - V13.0.0 - LTE; Feasibility study for Further Advancements for E-UTRA (LTE-
Advanced) (3GPP TR 36.912 version 13.0.0 Release 13),” 2016.
[19] 4G Americas, “LTE-Advanved: ‘Carrier Aggregation Aggregation Technology Development and
Deployment worldwide’ http://www.4gamericas.org/files/8414/1471/2230/,” 2014.
[20] T. Anti, “LTE‐Advanced Standardization,” in LTE-Advanced: 3GPP Solution for IMT-Advanced, 1st
ed., H. Holma and A. Toskala, Eds. John Wiley & Sons, 2012, pp. 8–13.
[21] L. Liu, M. Li, J. Zhou, X. She, L. Chen, Y. Sagae, and M. Iwamura, “Component Carrier
Management for Carrier Aggregation in LTE-Advanced System,” in IEEE 73RD Vehicular
Technology Conference (VTC Spring), 2011, pp. 1–6.
[22] 3GPP, “3GPP TR 36.839 V11.0.0 (2012-09), Mobility enhancements in heterogeneous networks
(Release 11),” 2012.
[23] K. Vasudeva, M. Simsek, D. Lopez-Perez and I. Guvenc and S. Meryem, “Analysis of Handover
Failures in Heterogeneous Networks with Fading,” IEEE Transactions on Vehicular Technology, vol.
66, no. 7, pp. 6060–6074, 2017.
[24] R. Kaur and H. Singh, “An Efficient Approach for Handover Decision Making In Wireless
Networks,” Int. Res. J. Eng. Technol., vol. 05, no. 02, pp. 454–458, 2018.
[25] Sonia and G. S. Saini, “Optimized RSS based Algorithm for Heterogeneous Networks,” Indian J. Sci.
Technol., vol. 9, no. December, p. 6, 2016.
[26] P. Tillapart, T. Thumthawatworn, P. Viriyaphol, and P. Santiprabhob, “Intelligent Handover Decision
Based on Fuzzy Logic for Heterogeneouse Wireless Networks,” in Electrica/Electronics Engineering,
Computer , Telecommunication and Information Technology (ECTI-CON), 2015, pp. 1–6.
[27] V. A. Narayanan, A. Rajeswari, and V. Sureshkumar, “AN Intelligent Vertical Handover Decision
Algorithm for Heterogeneous Networks,” Am. J. Appl. Sci., vol. 11, no. 5, pp. 732–739, 2014.
[28] M. Khan, “Multi-criteria based vertical handover decision in heterogeneous wireless network,” in
Proceedings of the 30th Annual ACM Symposium on Applied Computing - SAC ’15, 2015, vol.
2015, pp. 720–721.
[29] Y. D. Lee, S. D. Chun, S. J. Yi, S. J. Park, and S. H. Jung, “Carrier aggregation management method,
system and devices., [Google Patents].,” US 2011/0028148 A1, 2011.
[30] P. J. Song and J. Shin, “Method for handover in multi-carrier system, [Google Patents], US8688120
B2.,” US8688120 B2., 2014.
[31] Z. Shen, A. Papasakellariou, G. Dirk, and F. Xu, “Overview of 3GPP LTE-Advanced Carrier
Aggregation for 4G Wireless Communications,” IEEE Communications Magazine, no. February, pp.
122–130, 2012.
[32] L. Liu, M. Li, J. Zhou, X. She, L. Chen, Y. Sagae, and M. Iwamura, “Component Carrier
Management for Carrier Aggregation in LTE-Advanced System,” IEEE 69th Veh. Technol. Conf.
spring (VTC2009-Spring), Barcelonal, Spain, pp. 1–6, 2011.
[33] “DOCOMO R4-102114: Simulation Assumption for mobility performance in Carrier Aggregation;
14. International Journal of Computer Networks & Communications (IJCNC) Vol.12, No.4, July 2020
54
DoCoMo, Montreal, Canada,” 2010.
[34] 3GPP, “Radio Frequency (RF) system scenarios, (3GPP TR 36.942 version 14.0.0 Release 14),
FRANCE,” 2016.
[35] I. Mikio, K. Etemad, M. Fong, R. Nory, and R. Love, “Carrier Aggregation Framework in,” IEEE
Commun. Mag., no. August, pp. 60–67, 2010.
[36] Qualcomm, “R1-100701 Importance of Serving Cell Association in Heterogeneous Networks,” 2010,
pp. 1–6.
[37] 3GPP, “TR 136 932 - V14.1.0 - LTE; Scenarios and requirements for small cell enhancements for E-
UTRA and E-UTRAN,” 2017.
[38] 3GPP, “TS 136 211 - V14.2.0, Physical channels and modulation, (3GPP TS 36.211 version 14.2.0
Release 14),” 2017.
[39] 3GPP, “TS 36.300 , Overall description ; 3GPP TS 36.300 version 13.9.0 (Release 13).,” 2017.
AUTHORS
Maryam Abdulazeez- Ahmed received her first degree in Electronics and
Telecommunication Engineering from Kwara Polytechnic Ilorin Nigeria in 1989,
Master of Engineering Management in 2011 from Universiti Putra Malaysia
(UPM) and Ph.D. (in view), Wireless Communication Engineering from UPM.
Her research interests include mobile cellular, wireless, and green communication.
She has published several papers in journals and conferences.
Nor Kamariah Noordin received her B.Sc. in Electrical Engineering from the
University of Alabama, USA, in 1987. She became a tutor at the Department of
Computer and Communication System Engineering, UPM, and obtained a Master
Degree from Universiti Teknologi Malaysia (UTM) and Ph.D. from UPM. She is
currently the Director of Corporate Planning Division at the Office of the Vice-
Chancellor. She has received National, and research awards, being a researcher at
the Wireless and Photonic Network Research Center of Excellence (WiPNET),
UPM. She has over 100 publications in journals and conferences.
Aduwati Bint Sali is a Professor at Department of Computer and Communication
Systems, Faculty of Engineering, UPM. She obtained her Ph.D. in Mobile and
Satellite Communications from the University of Surrey in the United Kingdom, in
July 2009, her MSc in Communications and Network Engineering from UPM, in
April 2002, and her B. Eng in Electrical Electronics Engineering
(Communications) from University of Edinburgh, UK, in 1999. Her research
interests are radio resource management, MAC layer protocols, satellite
communications, wireless sensor networks, satellite-assisted emergency
communications, and 3D video transmission over wireless networks. She is a researcher at the WiPNET,
UPM.
Fazirulhisyam Hashim holds an MSc degree from Universiti Sains Malaysia and a
Ph.D. in Telecommunications Engineering from the University of Sydney,
Australia. His research interests include network security and quality of service of
next-generation mobile networks, green communication systems, cognitive
networks, and wireless sensor networks. He is a member of IEEE and ACM, and
currently a senior lecturer and researcher at the Wireless and Photonic Network
Research Center of Excellence (WiPNET), Universiti Putra Malaysia.