SlideShare a Scribd company logo
1 of 13
Download to read offline
International Journal of Computer Science & Information Technology (IJCSIT) Vol 12, No 4, August 2020
DOI: 10.5121/ijcsit.2020.12406 67
PERFORMANCE EVALUATION OF LTE NETWORK
USING MAXIMUM FLOW ALGORITHM
Bir Bahadur Khatri1
, Bulbul Ahammad1
, Md. Mezbahul Islam2
, Rahmina Rubaiat2
and Md. Imdadul Islam1
1
Department of Computer Science and Engineering, Jahangirnagar University,
Savar, Dhaka, Bangladesh
2
Department of Computer Science and Engineering, MBSTU, Tangail, Bangladesh
ABSTRACT
In this paper, we propose a new traffic flow model of the Long Term Evaluation (LTE) network for the
Evolved Universal Terrestrial Radio Access Network (E-UTRAN). Here only one Evolve Node B (eNB)
nearest to the Mobility Management Entity (MME) and Serving Gateway (S-GW) will use the S1 link to
bridge the E-UTRAN and Evolved Packet Core (EPC). All the eNBs of a tracking area will be connected to
each other by the X2 link. Determination of capacity of a links of such a network is a challenging job since
each node offers its own traffic and at the same time conveys traffic of other nodes. In this paper, we apply
maximum flow algorithm including superposition theorem to solve the traffic flow of radio network. Using
the total flow per subcarrier, a new traffic model is also developed in the paper. The relation among the
traffic parameters: ‘blocking probability’, ‘offered traffic’, ‘instantaneous capacity’, ‘average holding
time’, and ‘number of users’ are shown graphically under both QPSK and 16-QAM. The concept of the
network will be helpful to improve the SINR of the received signal ofeNBslocated long distance relative to
MME/S-GW.
KEYWORDS
Aggregate offered traffic, blocking probability, traffic channel, weighted graph and RB.
1. INTRODUCTION
Traffic analysis of the LTE network is found in recent research works and few of them which are
relevant to the paper is considered here. In [1] analytical model of LTE traffic is shown based on
the Markov chain then the traffic model is combined with fading parameters (Rayleigh fading
with MIMO) of a wireless link. The probability of forced termination and blocking of calls are
plotted against call arrival rate and the number of channels. A similar analysis is found in [2],
where M/M/m/m/c state transition is used to measure the blocking probability of the LTE
network. An algorithm called, ‘Extended Erlang B formula’ is proposed to evaluate the
performance of the network and final ‘blocking probability’ is plotted against the number of
iteration of the algorithm. In [3] soft frequency reuse (SFR) performance of LTE is done by
simulation, where the throughput of a cell is plotted against traffic load and cell radius. In [4]
authors compare different algorithms pertinent to prioritizing traffic on LTE mobile network.
Four traffic parameters: throughput, delay, packet delivery ratio and packet loss ratio are
considered to compare the Quality of Service (QoS) of the network and results are shown
graphically. In [5] only one traffic parameter called jitter (delay difference) is related with
resource block (RB) assignment of LTE network under real time multimedia traffic. In
performance evaluation they consider High Definition (HD) video stream of uplink (UE to eNB)
using a simulation under Network Simulator (NS3). In [6] authors mainly focus on growth in
International Journal of Computer Science & Information Technology (IJCSIT) Vol 12, No 4, August 2020
68
mobile data traffic and enhancement of capacity of LTE network. Application of unlicensed
spectrum in LTE network is considered as the best way to increase the data rate of WAN. The
pros and cons of existing carried traffic improvement methods: coexistence between LTE-U and
Wi-Fi, Dynamic Channel Selection, Listen Before Talk (LBT) traffic, Traffic Offloading,
Resource Allocation etc. are discussed with some future issue. In [7] authors proposed traffic
model of LTE-WLAN network. The state transition chain of Bianchi model is modified, where
the probability of idle and busy state of the network is applied in a different way. Taking typical
traffic and wireless link parameters, authors plot the probability of ‘transmission of at least one
node’, ‘successful transmission’ and ‘normalized throughput’ against the ‘number of nodes’. The
impact of size of the ‘minimum backoff window’ is applied on the graphs of result section, where
analytical results are varied by simulation and authors claim high confidence level.
In this paper, we relate the traffic model of LTE with the maximum flow algorithm. Therefore,
some works on the maximum flow algorithm and their applications are mentioned in this section.
The Ford Fulkerson and Edmonds-Karp algorithm are widely used in the determination of the
maximum flow of a system like a computer/communication network, traffic flow, or fluid flow.
The solution of the algorithm using C# is available in [8] with its complexity. In [9] authors
propose an incremental maximum flow algorithm, where augmenting routing tree is used to
reduce the time complexity of the algorithm. The algorithm is applicable in evaluating the
capacity of a dynamic network. Another analysis is found in [10], where maximum flow is
determined based on a new technique of augmenting path called draining algorithm. The
algorithm works better for a near-saturated network but shows computational complexity like a
conventional augmenting path for the case of regular flow networks.
Analysing all the papers of this section we found three research gaps:(1) none of above papers
deals with accumulation of data traffic of a tracking area of E-UTRAN to an eNB(as a sink)
which is nearest to MME/S-GW then high capacity link between that eNB and EPC will carry the
combined traffic flow (2) the maximum flow algorithm is applied for the first time in the E-
UTRAN region of LTE network (3) the maximum flow algorithm is also modified, where
superposition theorem is included with Ford-Fulkerson Algorithm of [11].If the nearest eNB fails
then the second nearest eNB will act as the sink unlike the Radio Network Controller (RNC) of
3G.Objective of above modifications of existing LTE network is to improve the SINR of wireless
link between eNB and EPC.In this paper three parameters: simultaneous RB of LTE (as traffic
channel), the modulation scheme (QPSK and 16-QAM used in LTE), and Erlangs traffic model
are combined with aid of maximum flow algorithm to measure the performance of the network.
The rest of the paper is organized as section 2 deals with the proposed radio network of LTE, its
traffic model, and the modified maximum flow algorithm, section 3 provides results based on a
theoretical analysis of section 2 and section 4 concludes the entire analysis.
2. SYSTEM MODEL
This section gives the theoretical analysis of the proposed traffic model and steps of the
maximum flow algorithm (combination with superposition theorem) in the context of the
proposed radio network. To make the idea clear, we first introduce the physical architecture of
the conventional LTE network and the proposed radio network.
2.1. LTE Network
LTE network has four important features that make the breakthrough of the previous 3G. The
features are femtocell deployment, OFDMA-based physical layer access, MIMO, and elimination
of radio network controller (RNC) or base station controller (BSC) of the previous generation. To
International Journal of Computer Science & Information Technology (IJCSIT) Vol 12, No 4, August 2020
69
under standard the traffic model of the paper we first introduce the physical architecture of LTE-
A as shown in fig.1, which mainly consists of two parts: E-UTRAN (radio network) and EPC
(core switching part). In E-UTRAN, the eNBs are mutualy connected by the X2 link and to EPC
by S1 link as found in [12-13]. The outdoor traffic is routed through macro eNB and EPC but
indoor traffic is offloaded by the Internet. In this paper, we concentrated on an outdoor traffic
model, where a user is connected to MME/S-GW through its nearest macro eNB. An MME
serves a large number of eNBs under a tracking area. A user first sends its paging message to
MME through its eNB before establishing a connection. The MME verifies the authenticator of
the user with the help of a database called, Home Subscriber Server (HSS). After authentication
an S1 link is established between eNB and the S-GW. The Serving Gateway (S-GW) route the
internal traffic of the network. The Packet Data Network Gateway (P-GW) is responsible for
routing traffic of external network under a trusted group of 3GPP where Evolved Packet Data
Gateway (ePDG) does the work for the untrusted user group of 3GPP.
Fig.1: Physical architecture of LTE
In this paper, we propose a new radio network of LTE, where eNBs are connected by X2 links
like the conventional network, and the entire traffic carried by the eNBs will be accumulated at a
node nearest to the MME/S-GW. The nearest node is indicated by n will be connected to the
MME/S-GW by a high capacity S1 link as shown in fig.2. The combined traffic of the E-UTRAN
is applied to EPC by the high capacity link has the capacity of C. Here all the eNBs can be
considered as the sources and the noden where entire traffic is collected can be thought as the
sink, hence maximum flow algorithm is applicable for such network.
Fig.2:Universal Terrestrial Radio Access Network (UTRAN) of LTE
Femto
Macro
Radio tower
S-GW and MME
HSS
P-GW ePDG
Trusted non
3GPP access
Untrusted
non 3GPP
access
E-UTRAN
EPC
W8
9
W4
8
W3
6
W5
8
W2
5
W1
4
W2
3
W7
9
W7
8
W6
7
W1
5
W1
2
S-
GW
C
1
C
2
C
3
C
4
C
5
C
6
C
7
C
8
n
C
International Journal of Computer Science & Information Technology (IJCSIT) Vol 12, No 4, August 2020
70
2.1. Traffic Model
In fig.2 if the offered traffic of itheNB is Ai then the aggregate offered traffic experienced on sink
node will be,
hT
n
i
i tAA  1
(1)
Where λT → arrival rate of resource block (RB) in RB/ms and the→ service time of an RB in ms.
We know the duration of an RB is 0.5 ms and the number of symbols in 0.5ms is 7 under normal
cyclic prefix (CP). In QPSK each symbol carries 2 bits, therefore the number of bits per RB per
subcarrier is 2×7=14 bits.
Now the bit rate/subcarrier =14/0.5 =28Kbps =0.028 Mbps.
The aggregate offered traffic, A = λTth=0.5th
The node n is anchored with the core switch hence node n is considered as the sink of the
maximum flow algorithm as found in [14-15]. The nodes i = 1, 2, 3,…,n-1 are the sources and we
have only one node n works as the sink, therefore the Ford-Fulkerson Algorithm in determination
maximum flow needs some modification. In this paper, we propose the following modified
algorithm where we add the superposition theorem with amaximum flow algorithm.
2.2. Maximum Flow Algorithm with Superposition Theorem
(a) Determine the weighted graph of the connected eNBs of the tracking area.
(b) Initialize all the edges with weight Wij between node i and j with the unit of Mbps.
(c) Take the node 1 as the source and make all the nodes of the network inactive (simply
repeater) and the node n works as the sink; provided node n is connected to MME/S-GW.
(d) Determine maximum flow Y1 from node 1 to n; where the offered data of node 1 is C1
Mbps.
(e) Record all the used capacity Uij and remaining capacity Rij of each edge.
(f) If Y1 <C1 then enhance the remaining capacity of links to secure Y1 ≥ C1.
(g) Repeat steps (c) to (e) for the node 2 with offered data rate of C2 Mbps to secure maximum
flow of Y2 ≥ C1+C2.
(h) Repeat steps (c) to (e) to support the aggregate data flow of all sources to sink, 

m
i
iCY
1
Let the total flow is found as C Mbps/subcarrier. Since the bit rate/subcarrier of a RB under
QPSK is 0.028 Mbps (as found before) therefore the number of RBs carried by the network
simultaneously will be,





028.0
C
N .
Let the field survey provides that each user on an average claims m RB per call. If the capacity of
the network is N RBs then the number of channel of the network will be, N
k
m
 
  
 
.
International Journal of Computer Science & Information Technology (IJCSIT) Vol 12, No 4, August 2020
71
Each user on the network generates average of s calls/min, m RB are used on each call and the
duration of a call is th min. The offered traffic per user in terms of RB is, a = (s.m)th= smth
The total offered traffic, A= aM=smthM.
Example-1
Let M = 200, m=3 RB/call/user, th =1.5 mins and s = 1/60 min. If the current capacity of the
network is 25 RB then find the offered traffic and number of channel.
A= smthM= (1/60)×3×(1.5) 200=15 Erls.
The number of channels, N
k
m
 
  
 
= 8
3
25






The blocking probability using Erlangs B formula of [16-17],
0
!( , )
!
k
k i
i
A
kB A k
A
i


(2)
If B(A, k) is weighted with the symbol error rate (SER) of QPSK and 16-QAM we get the relation
between network traffic and SNR of the link (UE and eNB).
3. RESULTS
In LTE two types of modulation schemes: QPSK and 16-QAM are used. When users are adjacent
to eNB then they receive strong SNR and the system use 16-QAM (4 bits/symbol) again when
users are at cell boundary experience huge fading then use QPSK scheme (2bits/symbol).
Therefore throughput is higher when users are closed to eNB. In the section, we first consider the
case of the QPSK scheme. The weighted graph of fig.3 is the interconnected eNBs, where each
node corresponds to eNB and the edges are the wireless link among eNBs. Here we assume that
each node offers the data of 2Mbps/subcarrier. This is not the typical value of the offered load of
the LTE network, we only assume it to verify the profile of traffic parameters. The weight of each
edge is the channel capacity (in Mbps) of that link. Here we use nine eNBs and found the
maximum flow from the ith node to sink node 9 (using Matlab 18) as shown in Table I. We
consider, the number of users M = 50, 100 and 200, average RB /call m =5, average arrival rate
per user: (1/60)/min, and the modulation scheme of QPSK. Fig.4(a)-(c) show the variation of
‘blocking probability’ against ‘offered average RB /call’ taking ‘average holding time’ as a
parameter. Here blocking probability increases with an increase in ‘offered average RB /call’,
‘number of users’, and ‘holding time’. The rise of all curves is found exponential and mutually
parallel. Actually ‘offered average RB /call’ m is proportional to offered traffic at the same time
inversely proportional to the number of channels hence fig.4 shows the curves equivalent to
offered traffic vs. blocking probability (B) of Erlang’s model. For all the curves of fig.4, we
consider a network of low capacity i.e. C = 2.2 Gbps, therefore the blocking probability is found
very high. In a practical network, capacity C is thousands of times higher than the value used for
fig.4 hence practical blocking probability is very low.
International Journal of Computer Science & Information Technology (IJCSIT) Vol 12, No 4, August 2020
72
Fig.3 Equivalent weighted graph of interconnected eNBs of LTE
(a) M = 50
(b) M = 100
2 4 6 8 10 12
0
0.2
0.4
0.6
0.8
1
Holding time = 2 mins
Holding time = 3 mins
Holding time = 4 mins
Number of RB/call (m)
BlockingProbability
2 4 6 8 10 12
0
0.2
0.4
0.6
0.8
1
Holding time = 2 mins
Holding time = 3 mins
Holding time = 4 mins
Number of RB/call (m)
BlockingProbability
International Journal of Computer Science & Information Technology (IJCSIT) Vol 12, No 4, August 2020
73
(c) M =200
Fig.4 Variation of offered RB/call (m) against blocking probability
The variation of blocking probability against the ‘simultaneous capacity of RB’ taking ‘average
holding time’ as a parameter is shown in fig.5. Three graphs are shown for m = 2, 3, and 4. The
‘simultaneous capacity of RB’ is equivalent to the number of channels hence the curves of fig.5
are equivalent to the curve of ‘number of channels’ vs. blocking probability. The blocking
probability decreases with an increase in the ‘simultaneous capacity of RB’ but reveres relation is
found with ‘average holding time’. The blocking probability also increases with an increase in m
is also visualized from fig.5 (a)-(c).
(a) m = 2
2 4 6 8 10 12
0
0.2
0.4
0.6
0.8
1
Holding time = 2 mins
Holding time = 3 mins
Holding time = 4 mins
Number of RB/call (m)
BlockingProbability
60 80 100 120 140
0.05
0.1
0.15
Holding time = 2 mins
Holding time = 3 mins
Holding time = 4 mins
Number of Simultaneous RB (N)
BlockingProbability
International Journal of Computer Science & Information Technology (IJCSIT) Vol 12, No 4, August 2020
74
(b) m = 3
(c) m = 4
Fig.5 Variation of the number of simultaneous RB (N) against blocking probability
Next, we consider a network of higher capacity as shown in fig.6; where we assume that each
node offers the data of 4 Mbps/subcarrier. Using the maximum flow algorithm, we got the flow
of data from the ith node to sink node 9 is shown in table II. Let the number of users is M = 50,
100, and 200 and the capacity C = 9 Gbps. Now our aim is to observe the impact of incrementof
capacity from source to sink like before. The blocking probability is found lower than the
previous case as shown in fig.7 (a)-(c).
60 80 100 120 140
0.2
0.4
0.6
Holding time = 2 mins
Holding time = 3 mins
Holding time = 4 mins
Number of Simultaneous RB (N)
BlockingProbability
60 80 100 120 140
0.2
0.4
0.6
Holding time = 2 mins
Holding time = 3 mins
Holding time = 4 mins
Number of Simultaneous RB (N)
BlockingProbability
International Journal of Computer Science & Information Technology (IJCSIT) Vol 12, No 4, August 2020
75
Fig.6 Equivalent weighted graph of interconnected eNBs of LTE of higher capacity
(a) M = 50
(b) M = 100
2 4 6 8 10 12
0
0.1
0.2
0.3
0.4
Holding time = 2 mins
Holding time = 3 mins
Holding time = 4 mins
Number of RB/call (m)
BlockingProbability
2 4 6 8 10 12
0
0.2
0.4
0.6
0.8
Holding time = 2 mins
Holding time = 3 mins
Holding time = 4 mins
Number of RB/call (m)
BlockingProbability
International Journal of Computer Science & Information Technology (IJCSIT) Vol 12, No 4, August 2020
76
(c) M = 200
Fig.7 Variation of offered RB/call (m) against blocking probability under QPSK
Table-I: Maximum flow per subcarrier
Source Sink Maximum flow
(Mbps/subcarrier)
1
9
2.2
2 3.3
3 3.3
4 2
5 2
6 2.2
7 3.3
8 3.3
Table-II: Maximum flow per subcarrier
Source Sink Maximum flow
(Mbps/subcarrier)
1
9
9
2 15
3 11
4 9
5 4
6 13
7 17
8 18
(a) M = 50
2 4 6 8 10 12
0
0.2
0.4
0.6
0.8
1
Holding time = 2 mins
Holding time = 3 mins
Holding time = 4 mins
Number of RB/call (m)
BlockingProbability
2 4 6 8 10 12
0
0.2
0.4
0.6
0.8
Holding time = 2 mins
Holding time = 3 mins
Holding time = 4 mins
Number of RB/call (m)
BlockingProbability
International Journal of Computer Science & Information Technology (IJCSIT) Vol 12, No 4, August 2020
77
(b) M = 100
(c) M = 200
Fig.8 Variation of RB/call against B under 16-QAM
In 16-QAM the number of simultaneous RB carried by the network becomes, 




056.0
C
N i.e.
half of QPSK. Therefore the performance is deteriorated under 16-QAM visualized from fig. 8.
HereN is taken as the number of traffic channels of Erlang’s model of the previous section, which
is half compared to QPSK but throughput remains the same since each symbol of 16-QAM
carries twice the bits of QPSK. Therefore the RR/call i.e. m under 16-QAM is just half of QPSK
to keep the same throughput hence performance remains the same like fig. 7. If we could relate
the traffic model with SNR of link then we could get better performance under 16-QAM at higher
SNR.
4. CONCLUSIONS
In this paper, we relate the simultaneous RB, modulation scheme, and traffic parameters to
measure the performance of the LTE network. The traffic model used here is M/M/n, in future we
will develop M/G/n/K model applicable for RB of both fixed and variable length. Here we
consider QPSK and 16-QAM under the awgn scheme. To get a more realistic result we have to
consider small scale fading environments like Rayleigh or Nakagami-m case. The entire result of
the paper is analytical, in the future we will develop a simulation model with fading parameters.
2 4 6 8 10 12
0
0.2
0.4
0.6
0.8
1
Holding time = 2 mins
Holding time = 3 mins
Holding time = 4 mins
Number of RB/call (m)
BlockingProbability
2 4 6 8 10 12
0
0.2
0.4
0.6
0.8
1
Holding time = 2 mins
Holding time = 3 mins
Holding time = 4 mins
Number of RB/call (m)
BlockingProbability
International Journal of Computer Science & Information Technology (IJCSIT) Vol 12, No 4, August 2020
78
REFERENCES
[1] Jesmin Akhter, Abu Sayed Md. MostafizurRahaman, Md. Imdadul Islam, M. R. Amin,
‘Traffic
Modelling of Low Dense Femtocellular Network for Long Term Evolution,’ Journal of Computer and
Communications, pp.88-101, Vol.7, No.12, December 2019
[2] Ma Lin, Wei Shouming and Qiang Wei, ‘A Novel Traffic Analysis Method For PoC over LTE Based
on Retrial Calling Model,’ 2011 6th International ICST Conference on Communications and
Networking in China (CHINACOM), 17-19 Aug. 2011, pp.771-774, Harbin, China
[3] H. Hidayat, Al KautsarPermana, I. Ridwany, and Iskandar, ‘Cell Capacity Prediction with Traffic
Load Effect for Soft Frequency Reuse (SFR) Technique in LTE – A Network,’ The 11th International
Conference on Telecommunication Systems, Services, and Applications, 26-27 Oct. 2017, 26-27
October 2017, Lombok-Indonesia
[4] Haka, V. Aleksieva and H. Valchanov, ‘Comparative Analysis of Traffic Prioritisation Algorithms by
LTE Base Station Scheduler,’ 2020 21st International Symposium on Electrical Apparatus &
Technologies (SIELA), pp. 1-4, 3-6 June 2020, Bourgas, Bulgaria
[5] M. Sahu, ‘Delay Jitter Analysis for Uplink Traffic in LTE Systems,’ 2019 11th International
Conference on Communication Systems & Networks (COMSNETS), pp. 504-506, 7-11 Jan. 2019,
Bengaluru, India
[6] R. Liu, Q. Chen, G. Yu, G. Y. Li and Z. Ding, ‘Resource Management in LTE-U Systems: Past,
Present, and Future,’ IEEE Open Journal of Vehicular Technology, vol. 1, pp. 1-17, Oct’ 2020
[7] Bulbul Ahammad, Risala T. Khan and Md. Imdadul Islam, ‘WLAN-LTE Integrated Traffic Model
under Unlicensed Spectrum,’ International Journal of Computer Science and Information Security
(IJCSIS), vol. 17, no. 3, pp.85-100, March 2019
[8] Fatima Sapundzhi and MetodiPopstoilov, ‘C# implementation of the maximum flow problem,’ 2019
27th National Conference with International Participation (TELECOM),pp. 62-65,30-31 Oct. 2019,
Sofia, Bulgaria
[9] Y. Wang, J. Ling, S. Zhou, Y. Liu, W. Liao and B. Zhang, ‘A Study on Rapid Incremental Maximum
Flow Algorithm in Dynamic Network,’ 2018 1st International Cognitive Cities Conference (IC3), pp.
7-11, 7-9 Aug. 2018, Okinawa, Japan
[10] Jiyang Dong, Wei Li, CongboCai, Zhong Chen, ‘Draining Algorithm for the Maximum Flow
Problem,’ 2009 International Conference on Communications and Mobile Computing, pp.197-200, 6-
8 Jan. 2009, Yunnan, China
[11] Ruipeng Bai1 ,HuiGuo, Zhenzhong Wang, Yanlong Zhang, Fan Zhang and Lei Chen, ‘FPGA
Interconnect Resources Test Based on A Improved Ford-Fulkerson Algorithm,’ 2018 IEEE 4th
Information Technology and Mechatronics Engineering Conference (ITOEC 2018), pp.251-258, 14-
16 Dec. 2018, Chongqing, China
[12] Jesmin Akhter, Md. Imdadul Islam, ASM M Rahaman and M R Amin, ‘Performance Evaluation of
Femtocell Based LTE Network under the Concept of Cross-layer Optimization,’International Journal
of Computer Science and Information Security, pp. 52-60, vol. 14, no. 7, July 2016
[13] Jesmin Akhter, Md. Imdadul Islam, ASM M Rahaman and M R Amin, ‘The MIMO Performance of
LTE Network under Rayleigh Fading Environment,’ International Journal of Computer Science and
Information Security, pp. 88-94, vol. 14, no. 8, August 2016
[14] Lifeng Zhao and XiaowanMeng, ‘An Improved Algorithm for Solving Maximum Flow Problem,’
2012 8th International Conference on Natural Computation (ICNC 2012), pp.1016-1018, 29-31 May
2012, Chongqing, China
[15] Bo Hong and Zhengyu He, ‘An Asynchronous Multithreaded Algorithm for the Maximum Network
Flow Problem with Nonblocking Global Relabeling Heuristic,’ IEEE Transactions on Parallel and
Distributed Systems, pp.1025-1033, vol. 22, no. 6, June 2011
[16] Ali Mustafa Elshawesh, Mohamed Abdulali, ‘Dimensioning of Circuit Switched Networks by using
Simulation Code based on Erlang (B) formula,’ 2014 Global Summit on Computer & Information
Technology (GSCIT), pp. 1-5, 14-16 June 2014, Sousse, Tunisia
[17] James K. Tamgno, Mamadou Alpha Barry, Simplice E. Gnang, Claude Lishou, ‘Estimating Number
of Organs using Erlang's B & C-Formulas,’2017 19th International Conference on Advanced
Communication Technology (ICACT), pp.858-864, 19-22 Feb. 2017, Bongpyeong, South Korea
International Journal of Computer Science & Information Technology (IJCSIT) Vol 12, No 4, August 2020
79
AUTHORS
Birbahadur Khatri completed his B.Sc. in Computer Science and Engineering
from Jahangirnagar University, Savar, Dhaka in 2015 and M.Sc. in the same
discipline from the same University in 2016. He worked as a programming trainer in
Green University of Bangladesh and as a software engineer at Newscred in
Bangladesh from 2017 to 2018. Currently, he is working as a software engineer at
Google in UK since 2019. He has excellent computer programming problem
solving skill. He took part in many competitive programming contests both onsite
and online and has a very good contest rating in Codeforces. He is very enthusiastic at research work and
his fields of interest are algorithm analysis and constructive algorithm design, wireless communication and
machine learning.
Bulbul Ahammad completed his B.Sc. in Computer Science and Engineering from
Jahangirnagar University, Savar, Dhaka in 2015 and M.Sc. in the same discipline
from the same University in 2016. He worked as a lecturer at the department of
Computer Science and Engineering in Daffodil International University from 1st
January,2017 to 24th June 2019. He has been at the Department of Computer Science
and Engineering as a lecturer in Jahangirnagar University since 25th June, 2019. He
took part in many competitive programming contests and has a very good skill in
solving constructive computer programming problem. He has a great enthusiasm for innovative research
work and his fields of research interest are machine learning, algorithm analysis and design, image
processing and wireless communication.
Md. Mezbahul Islam received his B.Sc. (Honors) and M.Sc. in Computer Science
and Engineering from Jahangirnagar University, Dhaka, Bangladesh in 2015 and
2017 respectively. He has been working as a faculty in the Department of Computer
Science and Engineering, MawlanaBhashani Science and Technology University,
Tangail, Bangladesh since April 2017. His research is focused in the fields of Image
Processing, Pattern Recognition, Wireless Network and Machine Learning.
Rahmina Rubaiat completed her B.Sc. (Honors) and M.Sc. in Computer Science and
Engineering from Jahangirnagar University, Dhaka, Bangladesh in 2015 and 2017
respectively. She worked as a faculty in the Department of Computer Science and
Engineering, Brac University, Dhaka, Bangladesh since October 2015 to June 2019.
Currently, she is working as a faculty member in the department of Computer Science
and Engineering, MawlanaBhashani Science and Technology University, Tangail,
Bangladesh since June 2019. Her research focused in the fields of Image Processing,
Data Science, Pattern Recognition and Wireless Network.
Md. Imdadul Islam has completed his B.Sc. and M.Sc Engineering in Electrical and
Electronic Engineering from Bangladesh University of Engineering and Technology,
Dhaka, Bangladesh in 1993 and 1998 respectively and has completed his Ph.D degree
from the Department of Computer Science and Engineering, Jahangirnagar
University, Dhaka, Bangladesh in the field of network traffic in 2010. He is now
working as a Professor at the Department of Computer Science and Engineering,
Jahangirnagar University, Savar, Dhaka, Bangladesh. Previously, he worked as an
Assistant Engineer in Sheba Telecom (Pvt.) LTD (A joint venture company between Bangladesh and
Malaysia, for Mobile cellular and WLL), from Sept.1994 to July 1996. Dr Islam has a very good field
experience in installation and design of mobile cellular network, Radio Base Stations and Switching
Centers for both mobile and WLL. His research field is network traffic, wireless communications, wavelet
transform, adaptive filter theory, ANFIS, neural network, deep learning and machine learning. He has more
than hundred and eighty research papers in national and international journals and conference proceedings.

More Related Content

What's hot

Improved AODV based on Load and Delay for Route Discovery in MANET
Improved AODV based on Load and Delay for Route Discovery in MANETImproved AODV based on Load and Delay for Route Discovery in MANET
Improved AODV based on Load and Delay for Route Discovery in MANETIOSR Journals
 
MOBILITY LOAD BALANCING BASED ADAPTIVE HANDOVER IN DOWNLINK LTE SELF-ORGANIZI...
MOBILITY LOAD BALANCING BASED ADAPTIVE HANDOVER IN DOWNLINK LTE SELF-ORGANIZI...MOBILITY LOAD BALANCING BASED ADAPTIVE HANDOVER IN DOWNLINK LTE SELF-ORGANIZI...
MOBILITY LOAD BALANCING BASED ADAPTIVE HANDOVER IN DOWNLINK LTE SELF-ORGANIZI...ijwmn
 
Adaptive resource allocation and internet traffic engineering on data network
Adaptive resource allocation and internet traffic engineering on data networkAdaptive resource allocation and internet traffic engineering on data network
Adaptive resource allocation and internet traffic engineering on data networkcsandit
 
SECURING BGP BY HANDLING DYNAMIC NETWORK BEHAVIOR AND UNBALANCED DATASETS
SECURING BGP BY HANDLING DYNAMIC NETWORK BEHAVIOR AND UNBALANCED DATASETSSECURING BGP BY HANDLING DYNAMIC NETWORK BEHAVIOR AND UNBALANCED DATASETS
SECURING BGP BY HANDLING DYNAMIC NETWORK BEHAVIOR AND UNBALANCED DATASETSIJCNCJournal
 
Traffic Congestion Prediction using Deep Reinforcement Learning in Vehicular ...
Traffic Congestion Prediction using Deep Reinforcement Learning in Vehicular ...Traffic Congestion Prediction using Deep Reinforcement Learning in Vehicular ...
Traffic Congestion Prediction using Deep Reinforcement Learning in Vehicular ...IJCNCJournal
 
An Efficient System for Traffic Control in Networks Using Virtual Routing Top...
An Efficient System for Traffic Control in Networks Using Virtual Routing Top...An Efficient System for Traffic Control in Networks Using Virtual Routing Top...
An Efficient System for Traffic Control in Networks Using Virtual Routing Top...IJMER
 
Novel Position Estimation using Differential Timing Information for Asynchron...
Novel Position Estimation using Differential Timing Information for Asynchron...Novel Position Estimation using Differential Timing Information for Asynchron...
Novel Position Estimation using Differential Timing Information for Asynchron...IJCNCJournal
 
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)graphhoc
 
IRJET - Improving Energy Efficiency for EMRP Routing Protocol for Virtualizat...
IRJET - Improving Energy Efficiency for EMRP Routing Protocol for Virtualizat...IRJET - Improving Energy Efficiency for EMRP Routing Protocol for Virtualizat...
IRJET - Improving Energy Efficiency for EMRP Routing Protocol for Virtualizat...IRJET Journal
 
Multimedia Streaming in Wireless Ad Hoc Networks According to Fuzzy Cross-lay...
Multimedia Streaming in Wireless Ad Hoc Networks According to Fuzzy Cross-lay...Multimedia Streaming in Wireless Ad Hoc Networks According to Fuzzy Cross-lay...
Multimedia Streaming in Wireless Ad Hoc Networks According to Fuzzy Cross-lay...Editor IJCATR
 
Performance Comparison of Different Mobility Model on Topology Managed MANET
Performance Comparison of Different Mobility Model on Topology Managed MANETPerformance Comparison of Different Mobility Model on Topology Managed MANET
Performance Comparison of Different Mobility Model on Topology Managed MANETEswar Publications
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
B ENCHMARKING OF C ELL T HROUGHPUT U SING P ROPORTIONAL F AIR S CHEDULE...
B ENCHMARKING OF  C ELL  T HROUGHPUT  U SING  P ROPORTIONAL  F AIR  S CHEDULE...B ENCHMARKING OF  C ELL  T HROUGHPUT  U SING  P ROPORTIONAL  F AIR  S CHEDULE...
B ENCHMARKING OF C ELL T HROUGHPUT U SING P ROPORTIONAL F AIR S CHEDULE...ijwmn
 
Proportional fair buffer scheduling algorithm for 5G enhanced mobile broadband
Proportional fair buffer scheduling algorithm for 5G enhanced mobile broadband Proportional fair buffer scheduling algorithm for 5G enhanced mobile broadband
Proportional fair buffer scheduling algorithm for 5G enhanced mobile broadband IJECEIAES
 
PERFORMANCE ANALYSIS IN CELLULAR NETWORKS CONSIDERING THE QOS BY RETRIAL QUEU...
PERFORMANCE ANALYSIS IN CELLULAR NETWORKS CONSIDERING THE QOS BY RETRIAL QUEU...PERFORMANCE ANALYSIS IN CELLULAR NETWORKS CONSIDERING THE QOS BY RETRIAL QUEU...
PERFORMANCE ANALYSIS IN CELLULAR NETWORKS CONSIDERING THE QOS BY RETRIAL QUEU...IJCNCJournal
 
Performing Network Simulators of TCP with E2E Network Model over UMTS Networks
Performing Network Simulators of TCP with E2E Network Model over UMTS NetworksPerforming Network Simulators of TCP with E2E Network Model over UMTS Networks
Performing Network Simulators of TCP with E2E Network Model over UMTS NetworksAM Publications,India
 
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSNOptimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSNIJCNCJournal
 

What's hot (19)

Improved AODV based on Load and Delay for Route Discovery in MANET
Improved AODV based on Load and Delay for Route Discovery in MANETImproved AODV based on Load and Delay for Route Discovery in MANET
Improved AODV based on Load and Delay for Route Discovery in MANET
 
MOBILITY LOAD BALANCING BASED ADAPTIVE HANDOVER IN DOWNLINK LTE SELF-ORGANIZI...
MOBILITY LOAD BALANCING BASED ADAPTIVE HANDOVER IN DOWNLINK LTE SELF-ORGANIZI...MOBILITY LOAD BALANCING BASED ADAPTIVE HANDOVER IN DOWNLINK LTE SELF-ORGANIZI...
MOBILITY LOAD BALANCING BASED ADAPTIVE HANDOVER IN DOWNLINK LTE SELF-ORGANIZI...
 
Adaptive resource allocation and internet traffic engineering on data network
Adaptive resource allocation and internet traffic engineering on data networkAdaptive resource allocation and internet traffic engineering on data network
Adaptive resource allocation and internet traffic engineering on data network
 
SECURING BGP BY HANDLING DYNAMIC NETWORK BEHAVIOR AND UNBALANCED DATASETS
SECURING BGP BY HANDLING DYNAMIC NETWORK BEHAVIOR AND UNBALANCED DATASETSSECURING BGP BY HANDLING DYNAMIC NETWORK BEHAVIOR AND UNBALANCED DATASETS
SECURING BGP BY HANDLING DYNAMIC NETWORK BEHAVIOR AND UNBALANCED DATASETS
 
G1063841
G1063841G1063841
G1063841
 
Traffic Congestion Prediction using Deep Reinforcement Learning in Vehicular ...
Traffic Congestion Prediction using Deep Reinforcement Learning in Vehicular ...Traffic Congestion Prediction using Deep Reinforcement Learning in Vehicular ...
Traffic Congestion Prediction using Deep Reinforcement Learning in Vehicular ...
 
An Efficient System for Traffic Control in Networks Using Virtual Routing Top...
An Efficient System for Traffic Control in Networks Using Virtual Routing Top...An Efficient System for Traffic Control in Networks Using Virtual Routing Top...
An Efficient System for Traffic Control in Networks Using Virtual Routing Top...
 
Novel Position Estimation using Differential Timing Information for Asynchron...
Novel Position Estimation using Differential Timing Information for Asynchron...Novel Position Estimation using Differential Timing Information for Asynchron...
Novel Position Estimation using Differential Timing Information for Asynchron...
 
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)
 
IRJET - Improving Energy Efficiency for EMRP Routing Protocol for Virtualizat...
IRJET - Improving Energy Efficiency for EMRP Routing Protocol for Virtualizat...IRJET - Improving Energy Efficiency for EMRP Routing Protocol for Virtualizat...
IRJET - Improving Energy Efficiency for EMRP Routing Protocol for Virtualizat...
 
Multimedia Streaming in Wireless Ad Hoc Networks According to Fuzzy Cross-lay...
Multimedia Streaming in Wireless Ad Hoc Networks According to Fuzzy Cross-lay...Multimedia Streaming in Wireless Ad Hoc Networks According to Fuzzy Cross-lay...
Multimedia Streaming in Wireless Ad Hoc Networks According to Fuzzy Cross-lay...
 
Performance Comparison of Different Mobility Model on Topology Managed MANET
Performance Comparison of Different Mobility Model on Topology Managed MANETPerformance Comparison of Different Mobility Model on Topology Managed MANET
Performance Comparison of Different Mobility Model on Topology Managed MANET
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
B ENCHMARKING OF C ELL T HROUGHPUT U SING P ROPORTIONAL F AIR S CHEDULE...
B ENCHMARKING OF  C ELL  T HROUGHPUT  U SING  P ROPORTIONAL  F AIR  S CHEDULE...B ENCHMARKING OF  C ELL  T HROUGHPUT  U SING  P ROPORTIONAL  F AIR  S CHEDULE...
B ENCHMARKING OF C ELL T HROUGHPUT U SING P ROPORTIONAL F AIR S CHEDULE...
 
Proportional fair buffer scheduling algorithm for 5G enhanced mobile broadband
Proportional fair buffer scheduling algorithm for 5G enhanced mobile broadband Proportional fair buffer scheduling algorithm for 5G enhanced mobile broadband
Proportional fair buffer scheduling algorithm for 5G enhanced mobile broadband
 
PERFORMANCE ANALYSIS IN CELLULAR NETWORKS CONSIDERING THE QOS BY RETRIAL QUEU...
PERFORMANCE ANALYSIS IN CELLULAR NETWORKS CONSIDERING THE QOS BY RETRIAL QUEU...PERFORMANCE ANALYSIS IN CELLULAR NETWORKS CONSIDERING THE QOS BY RETRIAL QUEU...
PERFORMANCE ANALYSIS IN CELLULAR NETWORKS CONSIDERING THE QOS BY RETRIAL QUEU...
 
Bx4201493498
Bx4201493498Bx4201493498
Bx4201493498
 
Performing Network Simulators of TCP with E2E Network Model over UMTS Networks
Performing Network Simulators of TCP with E2E Network Model over UMTS NetworksPerforming Network Simulators of TCP with E2E Network Model over UMTS Networks
Performing Network Simulators of TCP with E2E Network Model over UMTS Networks
 
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSNOptimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSN
 

Similar to Performance Evaluation of LTE Network using Maximum Flow Algorithm

Analysis of data transmission in wireless lan for 802.11
Analysis of data transmission in wireless lan for 802.11Analysis of data transmission in wireless lan for 802.11
Analysis of data transmission in wireless lan for 802.11eSAT Publishing House
 
Analysis of data transmission in wireless lan for 802.11 e2 et
Analysis of data transmission in wireless lan for 802.11 e2 etAnalysis of data transmission in wireless lan for 802.11 e2 et
Analysis of data transmission in wireless lan for 802.11 e2 eteSAT Journals
 
Energy Behavior in Ad Hoc Network Minimizing the Number of Hops and Maintaini...
Energy Behavior in Ad Hoc Network Minimizing the Number of Hops and Maintaini...Energy Behavior in Ad Hoc Network Minimizing the Number of Hops and Maintaini...
Energy Behavior in Ad Hoc Network Minimizing the Number of Hops and Maintaini...CSCJournals
 
Energy Consumption in Ad Hoc Network With Agents Minimizing the Number of Hop...
Energy Consumption in Ad Hoc Network With Agents Minimizing the Number of Hop...Energy Consumption in Ad Hoc Network With Agents Minimizing the Number of Hop...
Energy Consumption in Ad Hoc Network With Agents Minimizing the Number of Hop...CSCJournals
 
02eb68ab60b13bbfca46c09bb73eb608d353
02eb68ab60b13bbfca46c09bb73eb608d35302eb68ab60b13bbfca46c09bb73eb608d353
02eb68ab60b13bbfca46c09bb73eb608d353Shanti Tripathi
 
The performance of the vehicular communication-clustering process
The performance of the vehicular communication-clustering processThe performance of the vehicular communication-clustering process
The performance of the vehicular communication-clustering processTELKOMNIKA JOURNAL
 
QoS-aware scheduling in LTE-A networks with SDN control
QoS-aware scheduling in LTE-A networks with SDN controlQoS-aware scheduling in LTE-A networks with SDN control
QoS-aware scheduling in LTE-A networks with SDN controlUniversity of Piraeus
 
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless NetworksEfficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless NetworksCSCJournals
 
MOBILITY LOAD BALANCING BASED ADAPTIVE HANDOVER IN DOWNLINK LTE SELF-ORGANIZI...
MOBILITY LOAD BALANCING BASED ADAPTIVE HANDOVER IN DOWNLINK LTE SELF-ORGANIZI...MOBILITY LOAD BALANCING BASED ADAPTIVE HANDOVER IN DOWNLINK LTE SELF-ORGANIZI...
MOBILITY LOAD BALANCING BASED ADAPTIVE HANDOVER IN DOWNLINK LTE SELF-ORGANIZI...ijwmn
 
Dynamic bandwidth allocation scheme in lr pon with performance modelling and ...
Dynamic bandwidth allocation scheme in lr pon with performance modelling and ...Dynamic bandwidth allocation scheme in lr pon with performance modelling and ...
Dynamic bandwidth allocation scheme in lr pon with performance modelling and ...IJCNCJournal
 
Lte training an introduction-to-lte-basics
Lte training an introduction-to-lte-basicsLte training an introduction-to-lte-basics
Lte training an introduction-to-lte-basicsSaurabh Verma
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
 
Address-light and energy aware routing protocol for wireless sensor network
Address-light and energy aware routing protocol for wireless sensor networkAddress-light and energy aware routing protocol for wireless sensor network
Address-light and energy aware routing protocol for wireless sensor networkTELKOMNIKA JOURNAL
 
Newton-raphson method to solve systems of non-linear equations in VANET perfo...
Newton-raphson method to solve systems of non-linear equations in VANET perfo...Newton-raphson method to solve systems of non-linear equations in VANET perfo...
Newton-raphson method to solve systems of non-linear equations in VANET perfo...journalBEEI
 
IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...
IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...
IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...IJNSA Journal
 
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...IJNSA Journal
 

Similar to Performance Evaluation of LTE Network using Maximum Flow Algorithm (20)

1605.01126
1605.011261605.01126
1605.01126
 
Analysis of data transmission in wireless lan for 802.11
Analysis of data transmission in wireless lan for 802.11Analysis of data transmission in wireless lan for 802.11
Analysis of data transmission in wireless lan for 802.11
 
Analysis of data transmission in wireless lan for 802.11 e2 et
Analysis of data transmission in wireless lan for 802.11 e2 etAnalysis of data transmission in wireless lan for 802.11 e2 et
Analysis of data transmission in wireless lan for 802.11 e2 et
 
Energy Behavior in Ad Hoc Network Minimizing the Number of Hops and Maintaini...
Energy Behavior in Ad Hoc Network Minimizing the Number of Hops and Maintaini...Energy Behavior in Ad Hoc Network Minimizing the Number of Hops and Maintaini...
Energy Behavior in Ad Hoc Network Minimizing the Number of Hops and Maintaini...
 
Energy Consumption in Ad Hoc Network With Agents Minimizing the Number of Hop...
Energy Consumption in Ad Hoc Network With Agents Minimizing the Number of Hop...Energy Consumption in Ad Hoc Network With Agents Minimizing the Number of Hop...
Energy Consumption in Ad Hoc Network With Agents Minimizing the Number of Hop...
 
02eb68ab60b13bbfca46c09bb73eb608d353
02eb68ab60b13bbfca46c09bb73eb608d35302eb68ab60b13bbfca46c09bb73eb608d353
02eb68ab60b13bbfca46c09bb73eb608d353
 
The performance of the vehicular communication-clustering process
The performance of the vehicular communication-clustering processThe performance of the vehicular communication-clustering process
The performance of the vehicular communication-clustering process
 
QoS-aware scheduling in LTE-A networks with SDN control
QoS-aware scheduling in LTE-A networks with SDN controlQoS-aware scheduling in LTE-A networks with SDN control
QoS-aware scheduling in LTE-A networks with SDN control
 
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless NetworksEfficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
 
LTE optimization
LTE optimizationLTE optimization
LTE optimization
 
MOBILITY LOAD BALANCING BASED ADAPTIVE HANDOVER IN DOWNLINK LTE SELF-ORGANIZI...
MOBILITY LOAD BALANCING BASED ADAPTIVE HANDOVER IN DOWNLINK LTE SELF-ORGANIZI...MOBILITY LOAD BALANCING BASED ADAPTIVE HANDOVER IN DOWNLINK LTE SELF-ORGANIZI...
MOBILITY LOAD BALANCING BASED ADAPTIVE HANDOVER IN DOWNLINK LTE SELF-ORGANIZI...
 
Dynamic bandwidth allocation scheme in lr pon with performance modelling and ...
Dynamic bandwidth allocation scheme in lr pon with performance modelling and ...Dynamic bandwidth allocation scheme in lr pon with performance modelling and ...
Dynamic bandwidth allocation scheme in lr pon with performance modelling and ...
 
Lte training an introduction-to-lte-basics
Lte training an introduction-to-lte-basicsLte training an introduction-to-lte-basics
Lte training an introduction-to-lte-basics
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
 
Address-light and energy aware routing protocol for wireless sensor network
Address-light and energy aware routing protocol for wireless sensor networkAddress-light and energy aware routing protocol for wireless sensor network
Address-light and energy aware routing protocol for wireless sensor network
 
40520130101003
4052013010100340520130101003
40520130101003
 
Newton-raphson method to solve systems of non-linear equations in VANET perfo...
Newton-raphson method to solve systems of non-linear equations in VANET perfo...Newton-raphson method to solve systems of non-linear equations in VANET perfo...
Newton-raphson method to solve systems of non-linear equations in VANET perfo...
 
IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...
IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...
IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...
 
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...
 
Lte
LteLte
Lte
 

More from AIRCC Publishing Corporation

Call for Papers - International Journal of Computer Science & Information Tec...
Call for Papers - International Journal of Computer Science & Information Tec...Call for Papers - International Journal of Computer Science & Information Tec...
Call for Papers - International Journal of Computer Science & Information Tec...AIRCC Publishing Corporation
 
Discover Cutting-Edge Research in Computer Science and Information Technology!
Discover Cutting-Edge Research in Computer Science and Information Technology!Discover Cutting-Edge Research in Computer Science and Information Technology!
Discover Cutting-Edge Research in Computer Science and Information Technology!AIRCC Publishing Corporation
 
Constraint-based and Fuzzy Logic Student Modeling for Arabic Grammar
Constraint-based and Fuzzy Logic Student Modeling for Arabic GrammarConstraint-based and Fuzzy Logic Student Modeling for Arabic Grammar
Constraint-based and Fuzzy Logic Student Modeling for Arabic GrammarAIRCC Publishing Corporation
 
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...AIRCC Publishing Corporation
 
Call for Articles - International Journal of Computer Science & Information T...
Call for Articles - International Journal of Computer Science & Information T...Call for Articles - International Journal of Computer Science & Information T...
Call for Articles - International Journal of Computer Science & Information T...AIRCC Publishing Corporation
 
Image Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural NetworkImage Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural NetworkAIRCC Publishing Corporation
 
International Journal of Computer Science & Information Technology (IJCSIT)
International Journal of Computer Science & Information Technology (IJCSIT)International Journal of Computer Science & Information Technology (IJCSIT)
International Journal of Computer Science & Information Technology (IJCSIT)AIRCC Publishing Corporation
 
Your Device May Know You Better Than You Know Yourself-Continuous Authenticat...
Your Device May Know You Better Than You Know Yourself-Continuous Authenticat...Your Device May Know You Better Than You Know Yourself-Continuous Authenticat...
Your Device May Know You Better Than You Know Yourself-Continuous Authenticat...AIRCC Publishing Corporation
 
A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3
A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3
A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3AIRCC Publishing Corporation
 
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...AIRCC Publishing Corporation
 
Image Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural NetworkImage Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural NetworkAIRCC Publishing Corporation
 
Use of Neuronal Networks and Fuzzy Logic to Modelling the Foot Sizes
Use of Neuronal Networks and Fuzzy Logic to Modelling the Foot SizesUse of Neuronal Networks and Fuzzy Logic to Modelling the Foot Sizes
Use of Neuronal Networks and Fuzzy Logic to Modelling the Foot SizesAIRCC Publishing Corporation
 
Exploring the EV Charging Ecosystem and Performing an Experimental Assessment...
Exploring the EV Charging Ecosystem and Performing an Experimental Assessment...Exploring the EV Charging Ecosystem and Performing an Experimental Assessment...
Exploring the EV Charging Ecosystem and Performing an Experimental Assessment...AIRCC Publishing Corporation
 
Call for Papers - International Journal of Computer Science & Information Tec...
Call for Papers - International Journal of Computer Science & Information Tec...Call for Papers - International Journal of Computer Science & Information Tec...
Call for Papers - International Journal of Computer Science & Information Tec...AIRCC Publishing Corporation
 
Current Issue - February 2024, Volume 16, Number 1 - International Journal o...
Current Issue - February 2024, Volume 16, Number 1  - International Journal o...Current Issue - February 2024, Volume 16, Number 1  - International Journal o...
Current Issue - February 2024, Volume 16, Number 1 - International Journal o...AIRCC Publishing Corporation
 
Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Im...
Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Im...Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Im...
Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Im...AIRCC Publishing Corporation
 
Call for Articles - International Journal of Computer Science & Information T...
Call for Articles - International Journal of Computer Science & Information T...Call for Articles - International Journal of Computer Science & Information T...
Call for Articles - International Journal of Computer Science & Information T...AIRCC Publishing Corporation
 
February 2024-: Top Read Articles in Computer Science & Information Technology
February 2024-: Top Read Articles in Computer Science & Information TechnologyFebruary 2024-: Top Read Articles in Computer Science & Information Technology
February 2024-: Top Read Articles in Computer Science & Information TechnologyAIRCC Publishing Corporation
 
Call for Articles- International Journal of Computer Science & Information T...
Call for Articles-  International Journal of Computer Science & Information T...Call for Articles-  International Journal of Computer Science & Information T...
Call for Articles- International Journal of Computer Science & Information T...AIRCC Publishing Corporation
 

More from AIRCC Publishing Corporation (20)

Call for Papers - International Journal of Computer Science & Information Tec...
Call for Papers - International Journal of Computer Science & Information Tec...Call for Papers - International Journal of Computer Science & Information Tec...
Call for Papers - International Journal of Computer Science & Information Tec...
 
The Smart Parking Management System - IJCSIT
The Smart Parking Management System  - IJCSITThe Smart Parking Management System  - IJCSIT
The Smart Parking Management System - IJCSIT
 
Discover Cutting-Edge Research in Computer Science and Information Technology!
Discover Cutting-Edge Research in Computer Science and Information Technology!Discover Cutting-Edge Research in Computer Science and Information Technology!
Discover Cutting-Edge Research in Computer Science and Information Technology!
 
Constraint-based and Fuzzy Logic Student Modeling for Arabic Grammar
Constraint-based and Fuzzy Logic Student Modeling for Arabic GrammarConstraint-based and Fuzzy Logic Student Modeling for Arabic Grammar
Constraint-based and Fuzzy Logic Student Modeling for Arabic Grammar
 
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
 
Call for Articles - International Journal of Computer Science & Information T...
Call for Articles - International Journal of Computer Science & Information T...Call for Articles - International Journal of Computer Science & Information T...
Call for Articles - International Journal of Computer Science & Information T...
 
Image Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural NetworkImage Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural Network
 
International Journal of Computer Science & Information Technology (IJCSIT)
International Journal of Computer Science & Information Technology (IJCSIT)International Journal of Computer Science & Information Technology (IJCSIT)
International Journal of Computer Science & Information Technology (IJCSIT)
 
Your Device May Know You Better Than You Know Yourself-Continuous Authenticat...
Your Device May Know You Better Than You Know Yourself-Continuous Authenticat...Your Device May Know You Better Than You Know Yourself-Continuous Authenticat...
Your Device May Know You Better Than You Know Yourself-Continuous Authenticat...
 
A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3
A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3
A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3
 
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
 
Image Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural NetworkImage Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural Network
 
Use of Neuronal Networks and Fuzzy Logic to Modelling the Foot Sizes
Use of Neuronal Networks and Fuzzy Logic to Modelling the Foot SizesUse of Neuronal Networks and Fuzzy Logic to Modelling the Foot Sizes
Use of Neuronal Networks and Fuzzy Logic to Modelling the Foot Sizes
 
Exploring the EV Charging Ecosystem and Performing an Experimental Assessment...
Exploring the EV Charging Ecosystem and Performing an Experimental Assessment...Exploring the EV Charging Ecosystem and Performing an Experimental Assessment...
Exploring the EV Charging Ecosystem and Performing an Experimental Assessment...
 
Call for Papers - International Journal of Computer Science & Information Tec...
Call for Papers - International Journal of Computer Science & Information Tec...Call for Papers - International Journal of Computer Science & Information Tec...
Call for Papers - International Journal of Computer Science & Information Tec...
 
Current Issue - February 2024, Volume 16, Number 1 - International Journal o...
Current Issue - February 2024, Volume 16, Number 1  - International Journal o...Current Issue - February 2024, Volume 16, Number 1  - International Journal o...
Current Issue - February 2024, Volume 16, Number 1 - International Journal o...
 
Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Im...
Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Im...Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Im...
Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Im...
 
Call for Articles - International Journal of Computer Science & Information T...
Call for Articles - International Journal of Computer Science & Information T...Call for Articles - International Journal of Computer Science & Information T...
Call for Articles - International Journal of Computer Science & Information T...
 
February 2024-: Top Read Articles in Computer Science & Information Technology
February 2024-: Top Read Articles in Computer Science & Information TechnologyFebruary 2024-: Top Read Articles in Computer Science & Information Technology
February 2024-: Top Read Articles in Computer Science & Information Technology
 
Call for Articles- International Journal of Computer Science & Information T...
Call for Articles-  International Journal of Computer Science & Information T...Call for Articles-  International Journal of Computer Science & Information T...
Call for Articles- International Journal of Computer Science & Information T...
 

Recently uploaded

GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 

Recently uploaded (20)

Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 

Performance Evaluation of LTE Network using Maximum Flow Algorithm

  • 1. International Journal of Computer Science & Information Technology (IJCSIT) Vol 12, No 4, August 2020 DOI: 10.5121/ijcsit.2020.12406 67 PERFORMANCE EVALUATION OF LTE NETWORK USING MAXIMUM FLOW ALGORITHM Bir Bahadur Khatri1 , Bulbul Ahammad1 , Md. Mezbahul Islam2 , Rahmina Rubaiat2 and Md. Imdadul Islam1 1 Department of Computer Science and Engineering, Jahangirnagar University, Savar, Dhaka, Bangladesh 2 Department of Computer Science and Engineering, MBSTU, Tangail, Bangladesh ABSTRACT In this paper, we propose a new traffic flow model of the Long Term Evaluation (LTE) network for the Evolved Universal Terrestrial Radio Access Network (E-UTRAN). Here only one Evolve Node B (eNB) nearest to the Mobility Management Entity (MME) and Serving Gateway (S-GW) will use the S1 link to bridge the E-UTRAN and Evolved Packet Core (EPC). All the eNBs of a tracking area will be connected to each other by the X2 link. Determination of capacity of a links of such a network is a challenging job since each node offers its own traffic and at the same time conveys traffic of other nodes. In this paper, we apply maximum flow algorithm including superposition theorem to solve the traffic flow of radio network. Using the total flow per subcarrier, a new traffic model is also developed in the paper. The relation among the traffic parameters: ‘blocking probability’, ‘offered traffic’, ‘instantaneous capacity’, ‘average holding time’, and ‘number of users’ are shown graphically under both QPSK and 16-QAM. The concept of the network will be helpful to improve the SINR of the received signal ofeNBslocated long distance relative to MME/S-GW. KEYWORDS Aggregate offered traffic, blocking probability, traffic channel, weighted graph and RB. 1. INTRODUCTION Traffic analysis of the LTE network is found in recent research works and few of them which are relevant to the paper is considered here. In [1] analytical model of LTE traffic is shown based on the Markov chain then the traffic model is combined with fading parameters (Rayleigh fading with MIMO) of a wireless link. The probability of forced termination and blocking of calls are plotted against call arrival rate and the number of channels. A similar analysis is found in [2], where M/M/m/m/c state transition is used to measure the blocking probability of the LTE network. An algorithm called, ‘Extended Erlang B formula’ is proposed to evaluate the performance of the network and final ‘blocking probability’ is plotted against the number of iteration of the algorithm. In [3] soft frequency reuse (SFR) performance of LTE is done by simulation, where the throughput of a cell is plotted against traffic load and cell radius. In [4] authors compare different algorithms pertinent to prioritizing traffic on LTE mobile network. Four traffic parameters: throughput, delay, packet delivery ratio and packet loss ratio are considered to compare the Quality of Service (QoS) of the network and results are shown graphically. In [5] only one traffic parameter called jitter (delay difference) is related with resource block (RB) assignment of LTE network under real time multimedia traffic. In performance evaluation they consider High Definition (HD) video stream of uplink (UE to eNB) using a simulation under Network Simulator (NS3). In [6] authors mainly focus on growth in
  • 2. International Journal of Computer Science & Information Technology (IJCSIT) Vol 12, No 4, August 2020 68 mobile data traffic and enhancement of capacity of LTE network. Application of unlicensed spectrum in LTE network is considered as the best way to increase the data rate of WAN. The pros and cons of existing carried traffic improvement methods: coexistence between LTE-U and Wi-Fi, Dynamic Channel Selection, Listen Before Talk (LBT) traffic, Traffic Offloading, Resource Allocation etc. are discussed with some future issue. In [7] authors proposed traffic model of LTE-WLAN network. The state transition chain of Bianchi model is modified, where the probability of idle and busy state of the network is applied in a different way. Taking typical traffic and wireless link parameters, authors plot the probability of ‘transmission of at least one node’, ‘successful transmission’ and ‘normalized throughput’ against the ‘number of nodes’. The impact of size of the ‘minimum backoff window’ is applied on the graphs of result section, where analytical results are varied by simulation and authors claim high confidence level. In this paper, we relate the traffic model of LTE with the maximum flow algorithm. Therefore, some works on the maximum flow algorithm and their applications are mentioned in this section. The Ford Fulkerson and Edmonds-Karp algorithm are widely used in the determination of the maximum flow of a system like a computer/communication network, traffic flow, or fluid flow. The solution of the algorithm using C# is available in [8] with its complexity. In [9] authors propose an incremental maximum flow algorithm, where augmenting routing tree is used to reduce the time complexity of the algorithm. The algorithm is applicable in evaluating the capacity of a dynamic network. Another analysis is found in [10], where maximum flow is determined based on a new technique of augmenting path called draining algorithm. The algorithm works better for a near-saturated network but shows computational complexity like a conventional augmenting path for the case of regular flow networks. Analysing all the papers of this section we found three research gaps:(1) none of above papers deals with accumulation of data traffic of a tracking area of E-UTRAN to an eNB(as a sink) which is nearest to MME/S-GW then high capacity link between that eNB and EPC will carry the combined traffic flow (2) the maximum flow algorithm is applied for the first time in the E- UTRAN region of LTE network (3) the maximum flow algorithm is also modified, where superposition theorem is included with Ford-Fulkerson Algorithm of [11].If the nearest eNB fails then the second nearest eNB will act as the sink unlike the Radio Network Controller (RNC) of 3G.Objective of above modifications of existing LTE network is to improve the SINR of wireless link between eNB and EPC.In this paper three parameters: simultaneous RB of LTE (as traffic channel), the modulation scheme (QPSK and 16-QAM used in LTE), and Erlangs traffic model are combined with aid of maximum flow algorithm to measure the performance of the network. The rest of the paper is organized as section 2 deals with the proposed radio network of LTE, its traffic model, and the modified maximum flow algorithm, section 3 provides results based on a theoretical analysis of section 2 and section 4 concludes the entire analysis. 2. SYSTEM MODEL This section gives the theoretical analysis of the proposed traffic model and steps of the maximum flow algorithm (combination with superposition theorem) in the context of the proposed radio network. To make the idea clear, we first introduce the physical architecture of the conventional LTE network and the proposed radio network. 2.1. LTE Network LTE network has four important features that make the breakthrough of the previous 3G. The features are femtocell deployment, OFDMA-based physical layer access, MIMO, and elimination of radio network controller (RNC) or base station controller (BSC) of the previous generation. To
  • 3. International Journal of Computer Science & Information Technology (IJCSIT) Vol 12, No 4, August 2020 69 under standard the traffic model of the paper we first introduce the physical architecture of LTE- A as shown in fig.1, which mainly consists of two parts: E-UTRAN (radio network) and EPC (core switching part). In E-UTRAN, the eNBs are mutualy connected by the X2 link and to EPC by S1 link as found in [12-13]. The outdoor traffic is routed through macro eNB and EPC but indoor traffic is offloaded by the Internet. In this paper, we concentrated on an outdoor traffic model, where a user is connected to MME/S-GW through its nearest macro eNB. An MME serves a large number of eNBs under a tracking area. A user first sends its paging message to MME through its eNB before establishing a connection. The MME verifies the authenticator of the user with the help of a database called, Home Subscriber Server (HSS). After authentication an S1 link is established between eNB and the S-GW. The Serving Gateway (S-GW) route the internal traffic of the network. The Packet Data Network Gateway (P-GW) is responsible for routing traffic of external network under a trusted group of 3GPP where Evolved Packet Data Gateway (ePDG) does the work for the untrusted user group of 3GPP. Fig.1: Physical architecture of LTE In this paper, we propose a new radio network of LTE, where eNBs are connected by X2 links like the conventional network, and the entire traffic carried by the eNBs will be accumulated at a node nearest to the MME/S-GW. The nearest node is indicated by n will be connected to the MME/S-GW by a high capacity S1 link as shown in fig.2. The combined traffic of the E-UTRAN is applied to EPC by the high capacity link has the capacity of C. Here all the eNBs can be considered as the sources and the noden where entire traffic is collected can be thought as the sink, hence maximum flow algorithm is applicable for such network. Fig.2:Universal Terrestrial Radio Access Network (UTRAN) of LTE Femto Macro Radio tower S-GW and MME HSS P-GW ePDG Trusted non 3GPP access Untrusted non 3GPP access E-UTRAN EPC W8 9 W4 8 W3 6 W5 8 W2 5 W1 4 W2 3 W7 9 W7 8 W6 7 W1 5 W1 2 S- GW C 1 C 2 C 3 C 4 C 5 C 6 C 7 C 8 n C
  • 4. International Journal of Computer Science & Information Technology (IJCSIT) Vol 12, No 4, August 2020 70 2.1. Traffic Model In fig.2 if the offered traffic of itheNB is Ai then the aggregate offered traffic experienced on sink node will be, hT n i i tAA  1 (1) Where λT → arrival rate of resource block (RB) in RB/ms and the→ service time of an RB in ms. We know the duration of an RB is 0.5 ms and the number of symbols in 0.5ms is 7 under normal cyclic prefix (CP). In QPSK each symbol carries 2 bits, therefore the number of bits per RB per subcarrier is 2×7=14 bits. Now the bit rate/subcarrier =14/0.5 =28Kbps =0.028 Mbps. The aggregate offered traffic, A = λTth=0.5th The node n is anchored with the core switch hence node n is considered as the sink of the maximum flow algorithm as found in [14-15]. The nodes i = 1, 2, 3,…,n-1 are the sources and we have only one node n works as the sink, therefore the Ford-Fulkerson Algorithm in determination maximum flow needs some modification. In this paper, we propose the following modified algorithm where we add the superposition theorem with amaximum flow algorithm. 2.2. Maximum Flow Algorithm with Superposition Theorem (a) Determine the weighted graph of the connected eNBs of the tracking area. (b) Initialize all the edges with weight Wij between node i and j with the unit of Mbps. (c) Take the node 1 as the source and make all the nodes of the network inactive (simply repeater) and the node n works as the sink; provided node n is connected to MME/S-GW. (d) Determine maximum flow Y1 from node 1 to n; where the offered data of node 1 is C1 Mbps. (e) Record all the used capacity Uij and remaining capacity Rij of each edge. (f) If Y1 <C1 then enhance the remaining capacity of links to secure Y1 ≥ C1. (g) Repeat steps (c) to (e) for the node 2 with offered data rate of C2 Mbps to secure maximum flow of Y2 ≥ C1+C2. (h) Repeat steps (c) to (e) to support the aggregate data flow of all sources to sink,   m i iCY 1 Let the total flow is found as C Mbps/subcarrier. Since the bit rate/subcarrier of a RB under QPSK is 0.028 Mbps (as found before) therefore the number of RBs carried by the network simultaneously will be,      028.0 C N . Let the field survey provides that each user on an average claims m RB per call. If the capacity of the network is N RBs then the number of channel of the network will be, N k m        .
  • 5. International Journal of Computer Science & Information Technology (IJCSIT) Vol 12, No 4, August 2020 71 Each user on the network generates average of s calls/min, m RB are used on each call and the duration of a call is th min. The offered traffic per user in terms of RB is, a = (s.m)th= smth The total offered traffic, A= aM=smthM. Example-1 Let M = 200, m=3 RB/call/user, th =1.5 mins and s = 1/60 min. If the current capacity of the network is 25 RB then find the offered traffic and number of channel. A= smthM= (1/60)×3×(1.5) 200=15 Erls. The number of channels, N k m        = 8 3 25       The blocking probability using Erlangs B formula of [16-17], 0 !( , ) ! k k i i A kB A k A i   (2) If B(A, k) is weighted with the symbol error rate (SER) of QPSK and 16-QAM we get the relation between network traffic and SNR of the link (UE and eNB). 3. RESULTS In LTE two types of modulation schemes: QPSK and 16-QAM are used. When users are adjacent to eNB then they receive strong SNR and the system use 16-QAM (4 bits/symbol) again when users are at cell boundary experience huge fading then use QPSK scheme (2bits/symbol). Therefore throughput is higher when users are closed to eNB. In the section, we first consider the case of the QPSK scheme. The weighted graph of fig.3 is the interconnected eNBs, where each node corresponds to eNB and the edges are the wireless link among eNBs. Here we assume that each node offers the data of 2Mbps/subcarrier. This is not the typical value of the offered load of the LTE network, we only assume it to verify the profile of traffic parameters. The weight of each edge is the channel capacity (in Mbps) of that link. Here we use nine eNBs and found the maximum flow from the ith node to sink node 9 (using Matlab 18) as shown in Table I. We consider, the number of users M = 50, 100 and 200, average RB /call m =5, average arrival rate per user: (1/60)/min, and the modulation scheme of QPSK. Fig.4(a)-(c) show the variation of ‘blocking probability’ against ‘offered average RB /call’ taking ‘average holding time’ as a parameter. Here blocking probability increases with an increase in ‘offered average RB /call’, ‘number of users’, and ‘holding time’. The rise of all curves is found exponential and mutually parallel. Actually ‘offered average RB /call’ m is proportional to offered traffic at the same time inversely proportional to the number of channels hence fig.4 shows the curves equivalent to offered traffic vs. blocking probability (B) of Erlang’s model. For all the curves of fig.4, we consider a network of low capacity i.e. C = 2.2 Gbps, therefore the blocking probability is found very high. In a practical network, capacity C is thousands of times higher than the value used for fig.4 hence practical blocking probability is very low.
  • 6. International Journal of Computer Science & Information Technology (IJCSIT) Vol 12, No 4, August 2020 72 Fig.3 Equivalent weighted graph of interconnected eNBs of LTE (a) M = 50 (b) M = 100 2 4 6 8 10 12 0 0.2 0.4 0.6 0.8 1 Holding time = 2 mins Holding time = 3 mins Holding time = 4 mins Number of RB/call (m) BlockingProbability 2 4 6 8 10 12 0 0.2 0.4 0.6 0.8 1 Holding time = 2 mins Holding time = 3 mins Holding time = 4 mins Number of RB/call (m) BlockingProbability
  • 7. International Journal of Computer Science & Information Technology (IJCSIT) Vol 12, No 4, August 2020 73 (c) M =200 Fig.4 Variation of offered RB/call (m) against blocking probability The variation of blocking probability against the ‘simultaneous capacity of RB’ taking ‘average holding time’ as a parameter is shown in fig.5. Three graphs are shown for m = 2, 3, and 4. The ‘simultaneous capacity of RB’ is equivalent to the number of channels hence the curves of fig.5 are equivalent to the curve of ‘number of channels’ vs. blocking probability. The blocking probability decreases with an increase in the ‘simultaneous capacity of RB’ but reveres relation is found with ‘average holding time’. The blocking probability also increases with an increase in m is also visualized from fig.5 (a)-(c). (a) m = 2 2 4 6 8 10 12 0 0.2 0.4 0.6 0.8 1 Holding time = 2 mins Holding time = 3 mins Holding time = 4 mins Number of RB/call (m) BlockingProbability 60 80 100 120 140 0.05 0.1 0.15 Holding time = 2 mins Holding time = 3 mins Holding time = 4 mins Number of Simultaneous RB (N) BlockingProbability
  • 8. International Journal of Computer Science & Information Technology (IJCSIT) Vol 12, No 4, August 2020 74 (b) m = 3 (c) m = 4 Fig.5 Variation of the number of simultaneous RB (N) against blocking probability Next, we consider a network of higher capacity as shown in fig.6; where we assume that each node offers the data of 4 Mbps/subcarrier. Using the maximum flow algorithm, we got the flow of data from the ith node to sink node 9 is shown in table II. Let the number of users is M = 50, 100, and 200 and the capacity C = 9 Gbps. Now our aim is to observe the impact of incrementof capacity from source to sink like before. The blocking probability is found lower than the previous case as shown in fig.7 (a)-(c). 60 80 100 120 140 0.2 0.4 0.6 Holding time = 2 mins Holding time = 3 mins Holding time = 4 mins Number of Simultaneous RB (N) BlockingProbability 60 80 100 120 140 0.2 0.4 0.6 Holding time = 2 mins Holding time = 3 mins Holding time = 4 mins Number of Simultaneous RB (N) BlockingProbability
  • 9. International Journal of Computer Science & Information Technology (IJCSIT) Vol 12, No 4, August 2020 75 Fig.6 Equivalent weighted graph of interconnected eNBs of LTE of higher capacity (a) M = 50 (b) M = 100 2 4 6 8 10 12 0 0.1 0.2 0.3 0.4 Holding time = 2 mins Holding time = 3 mins Holding time = 4 mins Number of RB/call (m) BlockingProbability 2 4 6 8 10 12 0 0.2 0.4 0.6 0.8 Holding time = 2 mins Holding time = 3 mins Holding time = 4 mins Number of RB/call (m) BlockingProbability
  • 10. International Journal of Computer Science & Information Technology (IJCSIT) Vol 12, No 4, August 2020 76 (c) M = 200 Fig.7 Variation of offered RB/call (m) against blocking probability under QPSK Table-I: Maximum flow per subcarrier Source Sink Maximum flow (Mbps/subcarrier) 1 9 2.2 2 3.3 3 3.3 4 2 5 2 6 2.2 7 3.3 8 3.3 Table-II: Maximum flow per subcarrier Source Sink Maximum flow (Mbps/subcarrier) 1 9 9 2 15 3 11 4 9 5 4 6 13 7 17 8 18 (a) M = 50 2 4 6 8 10 12 0 0.2 0.4 0.6 0.8 1 Holding time = 2 mins Holding time = 3 mins Holding time = 4 mins Number of RB/call (m) BlockingProbability 2 4 6 8 10 12 0 0.2 0.4 0.6 0.8 Holding time = 2 mins Holding time = 3 mins Holding time = 4 mins Number of RB/call (m) BlockingProbability
  • 11. International Journal of Computer Science & Information Technology (IJCSIT) Vol 12, No 4, August 2020 77 (b) M = 100 (c) M = 200 Fig.8 Variation of RB/call against B under 16-QAM In 16-QAM the number of simultaneous RB carried by the network becomes,      056.0 C N i.e. half of QPSK. Therefore the performance is deteriorated under 16-QAM visualized from fig. 8. HereN is taken as the number of traffic channels of Erlang’s model of the previous section, which is half compared to QPSK but throughput remains the same since each symbol of 16-QAM carries twice the bits of QPSK. Therefore the RR/call i.e. m under 16-QAM is just half of QPSK to keep the same throughput hence performance remains the same like fig. 7. If we could relate the traffic model with SNR of link then we could get better performance under 16-QAM at higher SNR. 4. CONCLUSIONS In this paper, we relate the simultaneous RB, modulation scheme, and traffic parameters to measure the performance of the LTE network. The traffic model used here is M/M/n, in future we will develop M/G/n/K model applicable for RB of both fixed and variable length. Here we consider QPSK and 16-QAM under the awgn scheme. To get a more realistic result we have to consider small scale fading environments like Rayleigh or Nakagami-m case. The entire result of the paper is analytical, in the future we will develop a simulation model with fading parameters. 2 4 6 8 10 12 0 0.2 0.4 0.6 0.8 1 Holding time = 2 mins Holding time = 3 mins Holding time = 4 mins Number of RB/call (m) BlockingProbability 2 4 6 8 10 12 0 0.2 0.4 0.6 0.8 1 Holding time = 2 mins Holding time = 3 mins Holding time = 4 mins Number of RB/call (m) BlockingProbability
  • 12. International Journal of Computer Science & Information Technology (IJCSIT) Vol 12, No 4, August 2020 78 REFERENCES [1] Jesmin Akhter, Abu Sayed Md. MostafizurRahaman, Md. Imdadul Islam, M. R. Amin, ‘Traffic Modelling of Low Dense Femtocellular Network for Long Term Evolution,’ Journal of Computer and Communications, pp.88-101, Vol.7, No.12, December 2019 [2] Ma Lin, Wei Shouming and Qiang Wei, ‘A Novel Traffic Analysis Method For PoC over LTE Based on Retrial Calling Model,’ 2011 6th International ICST Conference on Communications and Networking in China (CHINACOM), 17-19 Aug. 2011, pp.771-774, Harbin, China [3] H. Hidayat, Al KautsarPermana, I. Ridwany, and Iskandar, ‘Cell Capacity Prediction with Traffic Load Effect for Soft Frequency Reuse (SFR) Technique in LTE – A Network,’ The 11th International Conference on Telecommunication Systems, Services, and Applications, 26-27 Oct. 2017, 26-27 October 2017, Lombok-Indonesia [4] Haka, V. Aleksieva and H. Valchanov, ‘Comparative Analysis of Traffic Prioritisation Algorithms by LTE Base Station Scheduler,’ 2020 21st International Symposium on Electrical Apparatus & Technologies (SIELA), pp. 1-4, 3-6 June 2020, Bourgas, Bulgaria [5] M. Sahu, ‘Delay Jitter Analysis for Uplink Traffic in LTE Systems,’ 2019 11th International Conference on Communication Systems & Networks (COMSNETS), pp. 504-506, 7-11 Jan. 2019, Bengaluru, India [6] R. Liu, Q. Chen, G. Yu, G. Y. Li and Z. Ding, ‘Resource Management in LTE-U Systems: Past, Present, and Future,’ IEEE Open Journal of Vehicular Technology, vol. 1, pp. 1-17, Oct’ 2020 [7] Bulbul Ahammad, Risala T. Khan and Md. Imdadul Islam, ‘WLAN-LTE Integrated Traffic Model under Unlicensed Spectrum,’ International Journal of Computer Science and Information Security (IJCSIS), vol. 17, no. 3, pp.85-100, March 2019 [8] Fatima Sapundzhi and MetodiPopstoilov, ‘C# implementation of the maximum flow problem,’ 2019 27th National Conference with International Participation (TELECOM),pp. 62-65,30-31 Oct. 2019, Sofia, Bulgaria [9] Y. Wang, J. Ling, S. Zhou, Y. Liu, W. Liao and B. Zhang, ‘A Study on Rapid Incremental Maximum Flow Algorithm in Dynamic Network,’ 2018 1st International Cognitive Cities Conference (IC3), pp. 7-11, 7-9 Aug. 2018, Okinawa, Japan [10] Jiyang Dong, Wei Li, CongboCai, Zhong Chen, ‘Draining Algorithm for the Maximum Flow Problem,’ 2009 International Conference on Communications and Mobile Computing, pp.197-200, 6- 8 Jan. 2009, Yunnan, China [11] Ruipeng Bai1 ,HuiGuo, Zhenzhong Wang, Yanlong Zhang, Fan Zhang and Lei Chen, ‘FPGA Interconnect Resources Test Based on A Improved Ford-Fulkerson Algorithm,’ 2018 IEEE 4th Information Technology and Mechatronics Engineering Conference (ITOEC 2018), pp.251-258, 14- 16 Dec. 2018, Chongqing, China [12] Jesmin Akhter, Md. Imdadul Islam, ASM M Rahaman and M R Amin, ‘Performance Evaluation of Femtocell Based LTE Network under the Concept of Cross-layer Optimization,’International Journal of Computer Science and Information Security, pp. 52-60, vol. 14, no. 7, July 2016 [13] Jesmin Akhter, Md. Imdadul Islam, ASM M Rahaman and M R Amin, ‘The MIMO Performance of LTE Network under Rayleigh Fading Environment,’ International Journal of Computer Science and Information Security, pp. 88-94, vol. 14, no. 8, August 2016 [14] Lifeng Zhao and XiaowanMeng, ‘An Improved Algorithm for Solving Maximum Flow Problem,’ 2012 8th International Conference on Natural Computation (ICNC 2012), pp.1016-1018, 29-31 May 2012, Chongqing, China [15] Bo Hong and Zhengyu He, ‘An Asynchronous Multithreaded Algorithm for the Maximum Network Flow Problem with Nonblocking Global Relabeling Heuristic,’ IEEE Transactions on Parallel and Distributed Systems, pp.1025-1033, vol. 22, no. 6, June 2011 [16] Ali Mustafa Elshawesh, Mohamed Abdulali, ‘Dimensioning of Circuit Switched Networks by using Simulation Code based on Erlang (B) formula,’ 2014 Global Summit on Computer & Information Technology (GSCIT), pp. 1-5, 14-16 June 2014, Sousse, Tunisia [17] James K. Tamgno, Mamadou Alpha Barry, Simplice E. Gnang, Claude Lishou, ‘Estimating Number of Organs using Erlang's B & C-Formulas,’2017 19th International Conference on Advanced Communication Technology (ICACT), pp.858-864, 19-22 Feb. 2017, Bongpyeong, South Korea
  • 13. International Journal of Computer Science & Information Technology (IJCSIT) Vol 12, No 4, August 2020 79 AUTHORS Birbahadur Khatri completed his B.Sc. in Computer Science and Engineering from Jahangirnagar University, Savar, Dhaka in 2015 and M.Sc. in the same discipline from the same University in 2016. He worked as a programming trainer in Green University of Bangladesh and as a software engineer at Newscred in Bangladesh from 2017 to 2018. Currently, he is working as a software engineer at Google in UK since 2019. He has excellent computer programming problem solving skill. He took part in many competitive programming contests both onsite and online and has a very good contest rating in Codeforces. He is very enthusiastic at research work and his fields of interest are algorithm analysis and constructive algorithm design, wireless communication and machine learning. Bulbul Ahammad completed his B.Sc. in Computer Science and Engineering from Jahangirnagar University, Savar, Dhaka in 2015 and M.Sc. in the same discipline from the same University in 2016. He worked as a lecturer at the department of Computer Science and Engineering in Daffodil International University from 1st January,2017 to 24th June 2019. He has been at the Department of Computer Science and Engineering as a lecturer in Jahangirnagar University since 25th June, 2019. He took part in many competitive programming contests and has a very good skill in solving constructive computer programming problem. He has a great enthusiasm for innovative research work and his fields of research interest are machine learning, algorithm analysis and design, image processing and wireless communication. Md. Mezbahul Islam received his B.Sc. (Honors) and M.Sc. in Computer Science and Engineering from Jahangirnagar University, Dhaka, Bangladesh in 2015 and 2017 respectively. He has been working as a faculty in the Department of Computer Science and Engineering, MawlanaBhashani Science and Technology University, Tangail, Bangladesh since April 2017. His research is focused in the fields of Image Processing, Pattern Recognition, Wireless Network and Machine Learning. Rahmina Rubaiat completed her B.Sc. (Honors) and M.Sc. in Computer Science and Engineering from Jahangirnagar University, Dhaka, Bangladesh in 2015 and 2017 respectively. She worked as a faculty in the Department of Computer Science and Engineering, Brac University, Dhaka, Bangladesh since October 2015 to June 2019. Currently, she is working as a faculty member in the department of Computer Science and Engineering, MawlanaBhashani Science and Technology University, Tangail, Bangladesh since June 2019. Her research focused in the fields of Image Processing, Data Science, Pattern Recognition and Wireless Network. Md. Imdadul Islam has completed his B.Sc. and M.Sc Engineering in Electrical and Electronic Engineering from Bangladesh University of Engineering and Technology, Dhaka, Bangladesh in 1993 and 1998 respectively and has completed his Ph.D degree from the Department of Computer Science and Engineering, Jahangirnagar University, Dhaka, Bangladesh in the field of network traffic in 2010. He is now working as a Professor at the Department of Computer Science and Engineering, Jahangirnagar University, Savar, Dhaka, Bangladesh. Previously, he worked as an Assistant Engineer in Sheba Telecom (Pvt.) LTD (A joint venture company between Bangladesh and Malaysia, for Mobile cellular and WLL), from Sept.1994 to July 1996. Dr Islam has a very good field experience in installation and design of mobile cellular network, Radio Base Stations and Switching Centers for both mobile and WLL. His research field is network traffic, wireless communications, wavelet transform, adaptive filter theory, ANFIS, neural network, deep learning and machine learning. He has more than hundred and eighty research papers in national and international journals and conference proceedings.