SlideShare une entreprise Scribd logo
1  sur  12
Télécharger pour lire hors ligne
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.5, September 2013
DOI : 10.5121/ijcnc.2013.5513 183
PERFORMANCE ANALYSIS OF
ECONOMIC MODEL AND
RADIO RESOURCE MANAGEMENT
IN HETEROGENEOUS
WIRELESS NETWORKS
Nilkantha Chakraborty
Cognizant Technology Solution India Pvt. Ltd
Mepz Economic Zone, Chennai, Tamil Nadu, India
nil.0308@yahoo.in
ABSTRACT
Radio resource management (RRM) is the system level control of co-channel interference and other radio
transmission characteristics in wireless communication systems. In this paper we first analyze a utility
function based access selection (UFAS) method. Then we investigate a radio resource management and
network selection scheme in heterogeneous wireless network. We propose an economic model to allocate
radio resources for Code Division Multiple Access (CDMA) Networks and Wireless local Area (WLAN)
networks. Moreover we formulate and solve the optimization problem in WLAN and CDMA networks and
simulate those equations using MATLAB. Simulated results show that the proposed scheme can achieve
more number of users and more social welfare which outperform the utility function based access selection
method.
KEYWORDS
Radio resource management (RRM), UFAS, proposed economic model, maximum network welfare.
1. INTRODUCTION
The ever growing demand for multimedia services, high mobility and global connectivity has
resulted in recent years in an exploration of new technologies for wireless communication
systems. Interworking between 3G mobile system and WLAN system are gaining high interest.
As a matter of fact, 3GPP has organized task forces to investigate the interworking between
WLAN and CDMA networks. Quality of service (QOS) can provide the means to manage the
network resources. QoS allows for better use of the existing network infrastructure, improve
service to the network users and reduces the cost of providing these services. One of the main
goals of QoS is to provide priority including dedicated bandwidth, controlled jitter and latency
and improved loss characteristics. A WLAN provides wireless network communication over short
distances using radio or infrared signals instead of traditional network cabling. Network security
remains an important issue for WLANs. WLANs are built by attaching a device called the access
point (AP) to the edge of the wired network. WLAN system can be a complementary radio-access
technology to 3G systems in providing more bandwidth and economic revenues. Mobile nodes in
such heterogeneous wireless networks are expected to have the capability of selecting a proper
access network to ensure service consistency and continuity. Radio resource management (RRM)
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.5, September 2013
184
involves strategies and algorithms for controlling parameters such as transmit power, channel
allocation, data rate, error coding scheme, modulation scheme, handover criteria etc. One of the
objective is to use the limited radio spectrum resources and radio network infrastructure as
efficiently as possible. Heterogeneous network is basically used in wireless network using
different access technologies. A wireless network which provides services through wireless LAN
and is able to maintain services when switching to a cellular network is called heterogeneous
networks. We have simulated for Utility function based access selection method (UFAS). This
method has been proposed to determine which cell is most suitable for a mobile node’s service
request in heterogeneous WCDMA and WLAN networks. UFAS method achieves larger system
throughput than a Policy - Enabled (PE) handoff decision method. This method can reduce
handoff occurrence rate.
2. INTEGRATION OF WLAN AND UMTS:
In this paper, we consider the heterogeneous networking environment that is built on CDMA and
WLAN wireless-access technologies. The internetworking architecture can either be a tightly
coupled case or a loosely coupled case, as shown in Figure 1.
Figure 1. Internetworking architecture between WLAN and cellular network
Loose Coupling:
In this approach, the WLAN requires no direct links to the 3G cellular network, and less control
overhead. The gateway directly connects the WLANs to the internet backbone. The main
advantage of the loose coupling approach is the independent deployment of the two domains is
needed for internetworking i.e. less interdependency. In this implements mobile IP, authorization
and accounting service to integrate with the UMTS home AAA server. This server enables
exchanging accounting information and billing information between WLAN and UMTS
networks. In this architecture, WLAN and cellular networks are two separate access networks.
The wireless access network is attached to the internet backbone, and the UMTS network is
attached to the cellular (UMTS) core network. The overall architecture is loosely- coupled
because the data path of the WLAN is completely separated from the data path of the UMTS
network. This integration architecture facilitates billing and authentication but does not provide
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.5, September 2013
185
Radio Resource Management (RRM) or QoS support. To overcome this drawback, various
mechanism and model have been designed for WLAN and UMTS network.
Figure 2. Performance of integrated Network based on throughput using loose coupling
2.2 Tight Coupling:
In this approach, the access point (AP) of the WLAN is directly connected to the 3G cellular core
network, and these two networks have to share the entities of authentication, mobility
management, and radio-resource allocation. The main advantage of the tight coupling mechanism
is the efficient mobility management; i.e., UMTS mobility management features are applied to the
integrated networks [11]. It offers service continuity, which includes billing and AAA services.
Therefore, inter-domain seamless mobility can be achieved, while reducing handoff latency. The
gateway of the WLAN hides the detail of the WLAN network to the UMTS core network and
executes all the UMTS protocols (mobility management, authentication, authorization and
accounting) requires in a UMTS radio access network (RAN). The different network will share
the same authentication, signaling, transport and billing infrastructures independently from
protocols used at the physical layer on the radio interface. This approach however has many
drawbacks because the UMTS core network interfaces are directly exposed to the WLAN
networks. This means that the same operator must own the two networks. The disadvantage of the
tight coupling approach is that, as the data traffic of WLAN traverse via the UMTS network, they
potentially create a bottle neck in the UMTS network. Moreover, this technique is considered
more complicated than the loose coupling technique, because different wireless network protocol
stack need to be compatible for such type of integration [12].
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.5, September 2013
186
Figure 3. Performance of integrated Network based on throughput using tight coupling
3. SYSTEM MODEL
3.1 New Proposed Economic Model for Radio Resource
To evaluate network welfare of the allocated bandwidth in heterogeneous wireless network, we
have proposed a new economic model with a simulated comparison of Siris and Chens model.
Utility function has the characteristic of increasing as well as strictly concave and twice
differentiable. Suppose x is the bandwidth assigned to user and p is the price per unit bandwidth
which is paid by network service provider. If U (b) is the network utility that is attained from
bandwidth b, the function U (b) - b. p can be used to describe the welfare of a single user from
assigned radio resource. If we increase the bandwidth, the user gains more network utility but
there is a problem of optional trade off. The welfare model defined by Chen et al. [4] is given as
U (b, x) = exp (-(b-x) 2
)
=0, if b<x (1)
Where x is the desired resource mobile user and b is actual data rate.
The welfare model defined by siris is given as
U(x) = 1- e -b x
(2)
Our proposed new welfare model can be written as
Up (b, x) = exp (-6(b-x) 2
)/x 2
) (3)
It is normally seen that new call will be dropped if there is not enough bandwidth available to
meet the new call. But proposed welfare model contributes a new idea to resolve the issue.
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.5, September 2013
187
Simulated graph for three models i.e. Figure 4 is the example. Figure 4 depicts the comparison of
three different economic model based on Network Welfare.
Figure 4. Performance of various economic model using allocated bandwidth
The proposed welfare model has the following features.
• If the actual bandwidth exceeds the user request ,the user welfare decreases at a faster speed
than the welfare in the model. So there is no chance for over assignment.
• When the assigned bandwidth exactly meets the bandwidth request, the welfare of the user is the
maximum.
3.2 UFAS Mechanism
Utility function based access selection method can be classified into three parts. Cell
classification, utility function computation , target cell determination. Cell classification is to
filter out infeasible cells and depends upon following constraint. I) Signal strength constraint -
Mobile node measures the signal strength. If the received signal strength exceeds threshold value
then the cell will be feasible. II) Cell admission constraint - This constraint is used to check if the
admittance of the service request affects the QoS requirements of existing connections. III) RF
module constraint - We have designed one WCDMA and one WLAN module for an MN. MN
can choose any one from both network.
The utility function of a cell for an MN service can be defined as [5]
U(s) = f R, n (s) * f D, n (s) *f E, n (s) *f V, n (s)
(4)
Where f x, n (s), x=R, D, E, and V denote evaluation functions for data rate, delay, packet error rate
(PER), and mobility respectively.
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.5, September 2013
188
The function f R, n (s) is defined by
f R, n (s) = G((1+α)R n(s);R*(s)) when R n(s)<R*(s)
= 0; otherwise (5)
G (・) is given by
G(x; µ) = exp [-(x- µ) 2
/ (2* µ 2
)]
The function f D, n (s) and f E, n (s) is defined by
f D, n (s) = G((1+ α)D n(s);D*(s)) when D n(s)<D*(s)
= 0; otherwise (6)
f E, n (s) = G((1+ α)B n(s);B*(s)) when B n(s)<B*(s)
= 0; otherwise (7)
3.3 Radio Resource allocation in CDMA uplink
Consider the QoS requirement of the best effort traffic, in which mobile users are only concerned
with the average throughput of successful data transmissions. Therefore, the effective throughput
is given by the product ri pi (γi) of the transmission rate ri and the probability of successful packet
transmission pi (γi). The welfare from mobile user i can be written [2] as B (ri pi (γi), Ri pi (φi))
where Ri is the requested bandwidth by mobile user i and φi is the target SINR to guarantee the
BER/PER QoS requirement.
Obviously, pi (γi) depends on the received SINR γi
i.e., we have pi (γi) = (1 – BER (γi)) n
(8)
Where n is the length of one packet, and BER (γi) is the BER at SINR γi.
BER has been given as
BER=1/2[1-1/ට1 ൅
ଵ
ଶ஢మஓ౟
൅
ଶ
ଷ୐
ቂቀ1 ൅
୒
ହ
ቁ MK െ 1ቃ]
(9)
Where L means the process gain, N is the number of interference cells, M is the number of multi-
paths, K is the number of active users, and σ2
is the power of the Rayleigh envelope. Proposed
economic model for CDMA Uplink can be formulated as
Maximize ܵ௖൫‫ݎ‬௜,ߛ௜|‫׊‬௜൯ ൌ ∑ ‫ܤ‬௜൫‫ݎ‬௜‫݌‬௜ሺߛ௜ሻ, ܴ௜‫݌‬௜ሺ‫׎‬௜ሻ൯ேೌ
௜ୀଵ
‫ݎ‬௜ ൒ 0 ߛ௜ ൒ ‫׎‬௜ ∑ ‫ݎ‬௜ ߛ௜௜ ൑
ௐ
ఈ
ሺ10ሻ
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.5, September 2013
189
From, we know that the maximum network welfare can be achieved only when perfect power
control makes the SINR γi equal to φi to provide the BER QoS guarantee for mobile user i.
The Lagrangian multiplier method can be applied to obtain the unique solution with the constraint
given by
∑ ‫ݎ‬௜ ‫׎‬௜௜ ൌ
ௐ
ఈ
(11)
Because of the monotonicity of the proposed economic model with respect to the actual assigned
bandwidth. Appling Lagrangian formula we have the relationship between all parameters.
Equation can be written as
n ൌ 4σଶ
γ୧ ቊ൬ට1 ൅
ଵ
ଶ஢మஓ౟
൅
ଶ
ଷ୐
ቂቀ1 ൅
୒
ହ
ቁ MK െ 1ቃ൰
ଷ
൅ 1 ൅
ଵ
ଶ஢మஓ౟
൅
ଶ
ଷ୐
ቂቀ1 ൅
୒
ହ
ቁ MK െ 1ቃቋ
(12)
3.4 Radio Resource allocation and network welfare in a WLAN system
Similar to the CDMA network, we analyze in detail the resource-usage constraint in the WLAN,
which corresponds to the maximum throughput under the optimum collision probability.
The channel utilization has been formulated as [6]:
Rୱሺpሻ ൌ
୮౩ሺ୮ሻ୘౩
୮౟ሺ୮ሻ஢౩ା ୮౩ሺ୮ሻ୘౩ା ୮ౙሺ୮ሻ୘ౙ
(13)
where σs is the length of a back-off time slot and Ts and Tc represent the average time period that
is associated with one successful transmission and one collision, respectively.
We know,
Ts = rts + cts + data + ack + 3si fs + di fs
Tc = rts + cts + si fs + di fs
Where rts, cts, data, ack, si fs, and di fs represent the average time of the RTS message, CTS
message, data
transmission period, acknowledgement message, short interframe space, and distributed inter-
frame
space, respectively. To optimize the network it can be formulate on the basis of Lagrangian
multiplier
method [1].
So it can be formulated as
S୵ሺr୧, R୧ሻ ൌ ∑ exp ൬െ
ସሺன౗ି ∑ ୖ౟
ౣ
౟ సభ ሻమ ୖ౟
మ
൫∑ ୖ౟
మౣ
౟సభ ൯
మ ൰୫
୧ୀଵ
(14)
ωa is total available bandwidth in network.
4. SIMULATION RESULTS AND DISCUSSIONS
4.1. Simulation Assumptions and Parameters
Table 1. Parameters based on CDMA Technology
Process gain(L) 1023
Number of multipath(N) 4
Chip rate(w) 3.84
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.5, September 2013
190
Table 2. Parameters based on UFAS Mechanism
Required Data rate (bps) 2000
Measurement value of Data rate(bps) 5000
Required delay(msec) 300
Measurement value of delay(msec) 100
Required PER .05
Measurement value of PER .02
Radius of cell 300
Number of cell 19
Table 3. Parameters based on WLAN Technology
4.2. Evaluation Based on Performance
Here, we carry out simulated results for both CDMA and WLAN networks. New proposed
economic model has been implemented to evaluate the performance. Figure 5 depicts three
scenarios as well as two comparisons. Maximum value for Network Social Welfare increases with
higher values of Scaling factor and decreases hyperbolically against increasing value of signal
quality. Beta remains unchanged at this point of time. On the other scenario, Maximum Network
Social Welfare increases with lower values of Beta maintaining SF as unchanged. Figure 6 and 7
are simulated delay and PER performance in UFAS mechanism. UFAS selects the suitable cell
according to PER, data rate, delay, and mobility. It is possible
that a cell with mildly lower channel quality (higher PER) has better system throughput or the less
number of handoffs. In case of coupled heterogeneous networks we have assumed 12 users at the
beginning. Performance of both the maximum network social welfare and the maximum number
of users are analyzed here. From Figure 8, the point can be noted that our new proposed
mechanism can increase the network social welfare by about 12% through admitting more users.
Single network access mechanism can also improve the network welfare .Figure 9 indicates that
our new proposed RRM and access mechanism can have near about 20% more users than the
UFAS mechanism. In case of CDMA network, when the number of mobile users gradually
increases, the total social welfare of heterogeneous network is investigated.
Scaling factor .5
The power of Rayleigh envelop 2
Average time to Request to send(msec) 20
Average time to Clear to send (msec) 20
Average time to Data transmission period(msec) 2
Average time to Acknowledgement(msec) 15
Number of mobile user 20
Required bandwidth 500
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.5, September 2013
191
Figure 5. Performance of Maximum welfare ratio using different interference ratio in CDMA
Figure 6. Performance of Delay in UFAS Mechanism
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.5, September 2013
192
Figure 7. Performance of PER in UFAS Mechanism
Figure 8. Performance of various mechanism using different guarantee of signal quality
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.5, September 2013
193
Figure 9. Performance of proposed RRM and UFAS mechanism using total social welfare
5. CONCLUSIONS
In this paper, radio-resource usage constraint is allocated to mobile users based on our new
proposed economic model. Perfect signal quality is required to maximize the network social
welfare. Expression for network welfare based on CDMA and WLAN has been mentioned above.
Simulated results for heterogeneous network have concluded that the proposed RRM mechanism
achieves maximum network welfare and provides better services compared with other schemes.
REFERENCES
[1] H. Jiang, W. Zhuang, X. Shen, and Q. Bi, “Quality-of-service provisioning and efficient resource
utilization in CDMA cellular communications, ”IEEE J. Sel. Areas Commun., vol. 24, no. 1, pp. 4–
15, Jan. 2006.
[2] Y. Chen, N. Yang, and C. Chang, “A utility function-based access selection method for heterogeneous
WCDMA and WLAN networks,” in Proc. IEEE PIMRC, 2007, pp. 1–5.
[3] Wei Song, Hai Jiang, Weihua Zhuang, and Xuemin (Sherman) Shen, University of Waterloo
Resource Management for QoS Support inCellular/WLAN Interworking.
[4] X. Pei, G. Zhu, Q. Wang, D. Qu, and J. Liu, “Economic model-basedradio resource management with
QoS guarantees in the CDMA uplink,”Eur. Trans. Telecommun., vol. 20, pp. 1–9, Apr. 2009.
[5] Xuebing Pei, Tao Jiang, Member, IEEE, Daiming Qu, Guangxi Zhu, Senior Member, IEEE, and Jian
Liu Radio-Resource Management and Access-Control Mechanism Based on a Novel Economic
Model in Heterogeneous Wireless Networks, IEEE TRANSACTIONS ON VEHICULAR
TECHNOLOGY, VOL. 59, NO. 6, JULY 2010.
[6] P. Wang, H. Jiang, and W. Zhuang, “Capacity improvement and analysis for voice/data traffic over
WLANs,” IEEE Trans. Wireless Commun., vol. 6, no. 4, pp. 1530–1541, Apr. 2007.
[7] M. Buddhikot et al., “Integration of 802.11 and Third-Generation Wireless Data Networks,” Proc.
IEEE INFOCOM, vol. 1, Apr. 2003, pp. 503–12.
[8] B. Moon and H. Aghvami, “DiffServ Extension for QoS Provisioning in IP Mobility Environments,”
IEEEWireless Commun., vol. 10, no. 5, Oct. 2003, pp. 38–44.
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.5, September 2013
194
[9] Q. Zhang et al., “Efficient Mobility Management for Vertical Handoff between WWAN and
WLAN,” IEEE Commun. Mag., vol. 41, no. 11, Nov. 2003, pp. 102–08.
[10] T. Klein and S.-J. Han, “Assignment Strategies for Mobile Data Users in Hierarchical Overlay
Networks:Performance of Optimal and Adaptive Strategies,” IEEE JSAC, vol. 22, no. 5, June 2004,
pp. 849–61.
[11] Safdar Rizvi, Asif Aziz, N.M. Saad, Nasrullah Armi & Mohd Zuki Yusoff, “Tight Coupling
Internetworking Between UMTS and WLAN: Challenges, Design Architectures and Simulation
Analysis” International Journal of Computer Networks (IJCN), Volume (3):issue(2) : 2011 116 .
[12] Salawu Nathaniel, Elizabeth NonyeOnwuka, Abolarinwa Joshua Adegboyega, dauda Umar Suleiman
“Networks integration between WirelessLAN and UMTS Networks- A Brief Study” Journal of
Emerging Trends in Computing and Information Sciences Vol. 4, No. 5 May 2013.
AUTHOR
Nilkantha Chakraborty received B.Tech. degree in Electronics and Communication
from West Bengal University of Technology and M.Tech. in Communication from VIT
University, Tamil Nadu. He is currently working at Cognizant technology solution. His
research interests include wireless communication, networking.

Contenu connexe

Tendances

Analysis of Communication Schemes for Advanced Metering Infrastructure (AMI)
Analysis of Communication Schemes for Advanced Metering Infrastructure (AMI)Analysis of Communication Schemes for Advanced Metering Infrastructure (AMI)
Analysis of Communication Schemes for Advanced Metering Infrastructure (AMI)Desong Bian
 
RESOURCE ALLOCATION TECHNIQUE USING LOAD MATRIX METHOD IN WIRELESS CELLULAR S...
RESOURCE ALLOCATION TECHNIQUE USING LOAD MATRIX METHOD IN WIRELESS CELLULAR S...RESOURCE ALLOCATION TECHNIQUE USING LOAD MATRIX METHOD IN WIRELESS CELLULAR S...
RESOURCE ALLOCATION TECHNIQUE USING LOAD MATRIX METHOD IN WIRELESS CELLULAR S...cscpconf
 
LINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORK
LINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORKLINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORK
LINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORKijwmn
 
Ns 2 based simulation environment for performance evaluation of umts architec...
Ns 2 based simulation environment for performance evaluation of umts architec...Ns 2 based simulation environment for performance evaluation of umts architec...
Ns 2 based simulation environment for performance evaluation of umts architec...Makhdoom Waseem Hashmi
 
Ijarcet vol-2-issue-7-2277-2280
Ijarcet vol-2-issue-7-2277-2280Ijarcet vol-2-issue-7-2277-2280
Ijarcet vol-2-issue-7-2277-2280Editor IJARCET
 
Performance analysis of massive multiple input multiple output for high speed...
Performance analysis of massive multiple input multiple output for high speed...Performance analysis of massive multiple input multiple output for high speed...
Performance analysis of massive multiple input multiple output for high speed...IJECEIAES
 
Optimization of base station location in 3 g networks using mads and fuzzy c ...
Optimization of base station location in 3 g networks using mads and fuzzy c ...Optimization of base station location in 3 g networks using mads and fuzzy c ...
Optimization of base station location in 3 g networks using mads and fuzzy c ...Alexander Decker
 
Channel Capacity Maximization using NQHN Approach at Heterogeneous Network
Channel Capacity Maximization using NQHN Approach at Heterogeneous NetworkChannel Capacity Maximization using NQHN Approach at Heterogeneous Network
Channel Capacity Maximization using NQHN Approach at Heterogeneous NetworkIJECEIAES
 
論文-A Novel Cross-layer Mesh Router Placement Scheme for Wireless Mesh Networks
論文-A Novel Cross-layer Mesh Router Placement Scheme for Wireless Mesh Networks論文-A Novel Cross-layer Mesh Router Placement Scheme for Wireless Mesh Networks
論文-A Novel Cross-layer Mesh Router Placement Scheme for Wireless Mesh NetworksHarvey Chang
 
Last mile mobile hybrid optical wireless access network routing enhancement
Last mile mobile hybrid optical wireless access network routing enhancementLast mile mobile hybrid optical wireless access network routing enhancement
Last mile mobile hybrid optical wireless access network routing enhancementjournalBEEI
 
Spectrum sharing in cognitive radio networks
Spectrum sharing in cognitive radio networks Spectrum sharing in cognitive radio networks
Spectrum sharing in cognitive radio networks IJECEIAES
 
NEW TECHNOLOGY FOR MACHINE TO MACHINE COMMUNICATION IN SOFTNET TOWARDS 5G
NEW TECHNOLOGY FOR MACHINE TO MACHINE COMMUNICATION IN SOFTNET TOWARDS 5GNEW TECHNOLOGY FOR MACHINE TO MACHINE COMMUNICATION IN SOFTNET TOWARDS 5G
NEW TECHNOLOGY FOR MACHINE TO MACHINE COMMUNICATION IN SOFTNET TOWARDS 5Gijwmn
 
Opnet based simulation and investigation of wimax network using different qo s
Opnet based simulation and investigation of wimax network using different qo sOpnet based simulation and investigation of wimax network using different qo s
Opnet based simulation and investigation of wimax network using different qo seSAT Publishing House
 
Dynamic resource allocation for opportunistic software-defined IoT networks: s...
Dynamic resource allocation for opportunistic software-defined IoT networks: s...Dynamic resource allocation for opportunistic software-defined IoT networks: s...
Dynamic resource allocation for opportunistic software-defined IoT networks: s...IJECEIAES
 

Tendances (18)

Analysis of Communication Schemes for Advanced Metering Infrastructure (AMI)
Analysis of Communication Schemes for Advanced Metering Infrastructure (AMI)Analysis of Communication Schemes for Advanced Metering Infrastructure (AMI)
Analysis of Communication Schemes for Advanced Metering Infrastructure (AMI)
 
K1802036171
K1802036171K1802036171
K1802036171
 
RESOURCE ALLOCATION TECHNIQUE USING LOAD MATRIX METHOD IN WIRELESS CELLULAR S...
RESOURCE ALLOCATION TECHNIQUE USING LOAD MATRIX METHOD IN WIRELESS CELLULAR S...RESOURCE ALLOCATION TECHNIQUE USING LOAD MATRIX METHOD IN WIRELESS CELLULAR S...
RESOURCE ALLOCATION TECHNIQUE USING LOAD MATRIX METHOD IN WIRELESS CELLULAR S...
 
LINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORK
LINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORKLINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORK
LINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORK
 
10
1010
10
 
Ns 2 based simulation environment for performance evaluation of umts architec...
Ns 2 based simulation environment for performance evaluation of umts architec...Ns 2 based simulation environment for performance evaluation of umts architec...
Ns 2 based simulation environment for performance evaluation of umts architec...
 
Ijarcet vol-2-issue-7-2277-2280
Ijarcet vol-2-issue-7-2277-2280Ijarcet vol-2-issue-7-2277-2280
Ijarcet vol-2-issue-7-2277-2280
 
Performance analysis of massive multiple input multiple output for high speed...
Performance analysis of massive multiple input multiple output for high speed...Performance analysis of massive multiple input multiple output for high speed...
Performance analysis of massive multiple input multiple output for high speed...
 
Optimization of base station location in 3 g networks using mads and fuzzy c ...
Optimization of base station location in 3 g networks using mads and fuzzy c ...Optimization of base station location in 3 g networks using mads and fuzzy c ...
Optimization of base station location in 3 g networks using mads and fuzzy c ...
 
Channel Capacity Maximization using NQHN Approach at Heterogeneous Network
Channel Capacity Maximization using NQHN Approach at Heterogeneous NetworkChannel Capacity Maximization using NQHN Approach at Heterogeneous Network
Channel Capacity Maximization using NQHN Approach at Heterogeneous Network
 
論文-A Novel Cross-layer Mesh Router Placement Scheme for Wireless Mesh Networks
論文-A Novel Cross-layer Mesh Router Placement Scheme for Wireless Mesh Networks論文-A Novel Cross-layer Mesh Router Placement Scheme for Wireless Mesh Networks
論文-A Novel Cross-layer Mesh Router Placement Scheme for Wireless Mesh Networks
 
Last mile mobile hybrid optical wireless access network routing enhancement
Last mile mobile hybrid optical wireless access network routing enhancementLast mile mobile hybrid optical wireless access network routing enhancement
Last mile mobile hybrid optical wireless access network routing enhancement
 
J011137479
J011137479J011137479
J011137479
 
Spectrum sharing in cognitive radio networks
Spectrum sharing in cognitive radio networks Spectrum sharing in cognitive radio networks
Spectrum sharing in cognitive radio networks
 
NEW TECHNOLOGY FOR MACHINE TO MACHINE COMMUNICATION IN SOFTNET TOWARDS 5G
NEW TECHNOLOGY FOR MACHINE TO MACHINE COMMUNICATION IN SOFTNET TOWARDS 5GNEW TECHNOLOGY FOR MACHINE TO MACHINE COMMUNICATION IN SOFTNET TOWARDS 5G
NEW TECHNOLOGY FOR MACHINE TO MACHINE COMMUNICATION IN SOFTNET TOWARDS 5G
 
03
0303
03
 
Opnet based simulation and investigation of wimax network using different qo s
Opnet based simulation and investigation of wimax network using different qo sOpnet based simulation and investigation of wimax network using different qo s
Opnet based simulation and investigation of wimax network using different qo s
 
Dynamic resource allocation for opportunistic software-defined IoT networks: s...
Dynamic resource allocation for opportunistic software-defined IoT networks: s...Dynamic resource allocation for opportunistic software-defined IoT networks: s...
Dynamic resource allocation for opportunistic software-defined IoT networks: s...
 

En vedette

Secure routing and data transmission in mobile
Secure routing and data transmission in mobileSecure routing and data transmission in mobile
Secure routing and data transmission in mobileIJCNCJournal
 
Analyzing peer selection policies for
Analyzing peer selection policies forAnalyzing peer selection policies for
Analyzing peer selection policies forIJCNCJournal
 
Threats and Anti-threats Strategies for Social Networking Websites
Threats and Anti-threats Strategies for Social Networking WebsitesThreats and Anti-threats Strategies for Social Networking Websites
Threats and Anti-threats Strategies for Social Networking WebsitesIJCNCJournal
 
Cloud computing challenges with emphasis on amazon ec2 and windows azure
Cloud computing challenges with emphasis on amazon ec2 and windows azureCloud computing challenges with emphasis on amazon ec2 and windows azure
Cloud computing challenges with emphasis on amazon ec2 and windows azureIJCNCJournal
 
Modified q aware scheduling algorithm for improved fairness in 802.16 j networks
Modified q aware scheduling algorithm for improved fairness in 802.16 j networksModified q aware scheduling algorithm for improved fairness in 802.16 j networks
Modified q aware scheduling algorithm for improved fairness in 802.16 j networksIJCNCJournal
 
I AM 4 VHO: New Approach to improve Seamless Vertical Handover in Heterogeneo...
I AM 4 VHO: New Approach to improve Seamless Vertical Handover in Heterogeneo...I AM 4 VHO: New Approach to improve Seamless Vertical Handover in Heterogeneo...
I AM 4 VHO: New Approach to improve Seamless Vertical Handover in Heterogeneo...IJCNCJournal
 
New research directions in the area of
New research directions in the area ofNew research directions in the area of
New research directions in the area ofIJCNCJournal
 
A novel real time video and data capture of vehicular accident in intelligent...
A novel real time video and data capture of vehicular accident in intelligent...A novel real time video and data capture of vehicular accident in intelligent...
A novel real time video and data capture of vehicular accident in intelligent...IJCNCJournal
 
Interworking qos management subsystem into ims based architecture multi provi...
Interworking qos management subsystem into ims based architecture multi provi...Interworking qos management subsystem into ims based architecture multi provi...
Interworking qos management subsystem into ims based architecture multi provi...IJCNCJournal
 
A NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNN
A NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNNA NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNN
A NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNNIJCNCJournal
 
Name a naming mechanism for delay disruption tolerant network
Name a naming mechanism for delay disruption tolerant networkName a naming mechanism for delay disruption tolerant network
Name a naming mechanism for delay disruption tolerant networkIJCNCJournal
 
Domain partitioned element management systems employing mobile agents for dis...
Domain partitioned element management systems employing mobile agents for dis...Domain partitioned element management systems employing mobile agents for dis...
Domain partitioned element management systems employing mobile agents for dis...IJCNCJournal
 
AN IDE FOR ANDROID MOBILE PHONES WITH EXTENDED FUNCTIONALITIES USING BEST DEV...
AN IDE FOR ANDROID MOBILE PHONES WITH EXTENDED FUNCTIONALITIES USING BEST DEV...AN IDE FOR ANDROID MOBILE PHONES WITH EXTENDED FUNCTIONALITIES USING BEST DEV...
AN IDE FOR ANDROID MOBILE PHONES WITH EXTENDED FUNCTIONALITIES USING BEST DEV...IJCNCJournal
 
A novel hierarchical ant based qos aware intelligent routing scheme for manets
A novel hierarchical ant based qos aware intelligent routing scheme for manetsA novel hierarchical ant based qos aware intelligent routing scheme for manets
A novel hierarchical ant based qos aware intelligent routing scheme for manetsIJCNCJournal
 
RISK ASSESSMENT ALGORITHM IN WIRELESS SENSOR NETWORKS USING BETA DISTRIBUTION
RISK ASSESSMENT ALGORITHM IN WIRELESS SENSOR NETWORKS USING BETA DISTRIBUTIONRISK ASSESSMENT ALGORITHM IN WIRELESS SENSOR NETWORKS USING BETA DISTRIBUTION
RISK ASSESSMENT ALGORITHM IN WIRELESS SENSOR NETWORKS USING BETA DISTRIBUTIONIJCNCJournal
 
My direct a middleware for p2 p mobile social networks
My direct a middleware for p2 p mobile social networksMy direct a middleware for p2 p mobile social networks
My direct a middleware for p2 p mobile social networksIJCNCJournal
 
Automated re allocator of replicas
Automated re allocator of replicasAutomated re allocator of replicas
Automated re allocator of replicasIJCNCJournal
 
Distributed vertex cover
Distributed vertex coverDistributed vertex cover
Distributed vertex coverIJCNCJournal
 

En vedette (19)

Secure routing and data transmission in mobile
Secure routing and data transmission in mobileSecure routing and data transmission in mobile
Secure routing and data transmission in mobile
 
Analyzing peer selection policies for
Analyzing peer selection policies forAnalyzing peer selection policies for
Analyzing peer selection policies for
 
Threats and Anti-threats Strategies for Social Networking Websites
Threats and Anti-threats Strategies for Social Networking WebsitesThreats and Anti-threats Strategies for Social Networking Websites
Threats and Anti-threats Strategies for Social Networking Websites
 
Cloud computing challenges with emphasis on amazon ec2 and windows azure
Cloud computing challenges with emphasis on amazon ec2 and windows azureCloud computing challenges with emphasis on amazon ec2 and windows azure
Cloud computing challenges with emphasis on amazon ec2 and windows azure
 
Ijcnc050209
Ijcnc050209Ijcnc050209
Ijcnc050209
 
Modified q aware scheduling algorithm for improved fairness in 802.16 j networks
Modified q aware scheduling algorithm for improved fairness in 802.16 j networksModified q aware scheduling algorithm for improved fairness in 802.16 j networks
Modified q aware scheduling algorithm for improved fairness in 802.16 j networks
 
I AM 4 VHO: New Approach to improve Seamless Vertical Handover in Heterogeneo...
I AM 4 VHO: New Approach to improve Seamless Vertical Handover in Heterogeneo...I AM 4 VHO: New Approach to improve Seamless Vertical Handover in Heterogeneo...
I AM 4 VHO: New Approach to improve Seamless Vertical Handover in Heterogeneo...
 
New research directions in the area of
New research directions in the area ofNew research directions in the area of
New research directions in the area of
 
A novel real time video and data capture of vehicular accident in intelligent...
A novel real time video and data capture of vehicular accident in intelligent...A novel real time video and data capture of vehicular accident in intelligent...
A novel real time video and data capture of vehicular accident in intelligent...
 
Interworking qos management subsystem into ims based architecture multi provi...
Interworking qos management subsystem into ims based architecture multi provi...Interworking qos management subsystem into ims based architecture multi provi...
Interworking qos management subsystem into ims based architecture multi provi...
 
A NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNN
A NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNNA NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNN
A NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNN
 
Name a naming mechanism for delay disruption tolerant network
Name a naming mechanism for delay disruption tolerant networkName a naming mechanism for delay disruption tolerant network
Name a naming mechanism for delay disruption tolerant network
 
Domain partitioned element management systems employing mobile agents for dis...
Domain partitioned element management systems employing mobile agents for dis...Domain partitioned element management systems employing mobile agents for dis...
Domain partitioned element management systems employing mobile agents for dis...
 
AN IDE FOR ANDROID MOBILE PHONES WITH EXTENDED FUNCTIONALITIES USING BEST DEV...
AN IDE FOR ANDROID MOBILE PHONES WITH EXTENDED FUNCTIONALITIES USING BEST DEV...AN IDE FOR ANDROID MOBILE PHONES WITH EXTENDED FUNCTIONALITIES USING BEST DEV...
AN IDE FOR ANDROID MOBILE PHONES WITH EXTENDED FUNCTIONALITIES USING BEST DEV...
 
A novel hierarchical ant based qos aware intelligent routing scheme for manets
A novel hierarchical ant based qos aware intelligent routing scheme for manetsA novel hierarchical ant based qos aware intelligent routing scheme for manets
A novel hierarchical ant based qos aware intelligent routing scheme for manets
 
RISK ASSESSMENT ALGORITHM IN WIRELESS SENSOR NETWORKS USING BETA DISTRIBUTION
RISK ASSESSMENT ALGORITHM IN WIRELESS SENSOR NETWORKS USING BETA DISTRIBUTIONRISK ASSESSMENT ALGORITHM IN WIRELESS SENSOR NETWORKS USING BETA DISTRIBUTION
RISK ASSESSMENT ALGORITHM IN WIRELESS SENSOR NETWORKS USING BETA DISTRIBUTION
 
My direct a middleware for p2 p mobile social networks
My direct a middleware for p2 p mobile social networksMy direct a middleware for p2 p mobile social networks
My direct a middleware for p2 p mobile social networks
 
Automated re allocator of replicas
Automated re allocator of replicasAutomated re allocator of replicas
Automated re allocator of replicas
 
Distributed vertex cover
Distributed vertex coverDistributed vertex cover
Distributed vertex cover
 

Similaire à Performance analysis of economic model and radio resource management in heterogeneous wireless networks

Spectrum Sharing between Cellular and Wi-Fi Networks based on Deep Reinforcem...
Spectrum Sharing between Cellular and Wi-Fi Networks based on Deep Reinforcem...Spectrum Sharing between Cellular and Wi-Fi Networks based on Deep Reinforcem...
Spectrum Sharing between Cellular and Wi-Fi Networks based on Deep Reinforcem...IJCNCJournal
 
Spectrum Sharing between Cellular and Wi-Fi Networks based on Deep Reinforcem...
Spectrum Sharing between Cellular and Wi-Fi Networks based on Deep Reinforcem...Spectrum Sharing between Cellular and Wi-Fi Networks based on Deep Reinforcem...
Spectrum Sharing between Cellular and Wi-Fi Networks based on Deep Reinforcem...IJCNCJournal
 
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNs
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNsA Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNs
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNsijsrd.com
 
LINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORK
LINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORKLINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORK
LINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORKijwmn
 
IRJET- Review Paper on Call Admission Control with Bandwidth Reservation Sche...
IRJET- Review Paper on Call Admission Control with Bandwidth Reservation Sche...IRJET- Review Paper on Call Admission Control with Bandwidth Reservation Sche...
IRJET- Review Paper on Call Admission Control with Bandwidth Reservation Sche...IRJET Journal
 
ADHOCFTSIM: A Simulator of Fault Tolerence In the AD-HOC Networks
ADHOCFTSIM: A Simulator of Fault Tolerence In the AD-HOC NetworksADHOCFTSIM: A Simulator of Fault Tolerence In the AD-HOC Networks
ADHOCFTSIM: A Simulator of Fault Tolerence In the AD-HOC Networksijwmn
 
International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...ijcseit
 
Candidate solutions to improve Wireless Mesh Networks WMNs performance to mee...
Candidate solutions to improve Wireless Mesh Networks WMNs performance to mee...Candidate solutions to improve Wireless Mesh Networks WMNs performance to mee...
Candidate solutions to improve Wireless Mesh Networks WMNs performance to mee...ijcseit
 
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...eSAT Journals
 
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...eSAT Publishing House
 
QoS controlled capacity offload optimization in heterogeneous networks
QoS controlled capacity offload optimization in heterogeneous networksQoS controlled capacity offload optimization in heterogeneous networks
QoS controlled capacity offload optimization in heterogeneous networksjournalBEEI
 
A smart clustering based approach to
A smart clustering based approach toA smart clustering based approach to
A smart clustering based approach toIJCNCJournal
 
AN EFFICIENT SPECTRUM SHARING METHOD BASED ON GENETIC ALGORITHM IN HETEROGENE...
AN EFFICIENT SPECTRUM SHARING METHOD BASED ON GENETIC ALGORITHM IN HETEROGENE...AN EFFICIENT SPECTRUM SHARING METHOD BASED ON GENETIC ALGORITHM IN HETEROGENE...
AN EFFICIENT SPECTRUM SHARING METHOD BASED ON GENETIC ALGORITHM IN HETEROGENE...IJCNCJournal
 
Downlink beamforming and admissin control for spectrum sharing cognitive radi...
Downlink beamforming and admissin control for spectrum sharing cognitive radi...Downlink beamforming and admissin control for spectrum sharing cognitive radi...
Downlink beamforming and admissin control for spectrum sharing cognitive radi...acijjournal
 
Downlink beamforming and admissin control for spectrum sharing cognitive radi...
Downlink beamforming and admissin control for spectrum sharing cognitive radi...Downlink beamforming and admissin control for spectrum sharing cognitive radi...
Downlink beamforming and admissin control for spectrum sharing cognitive radi...acijjournal
 
Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...
Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...
Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...Waqas Tariq
 
Energy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A ReviewEnergy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A Reviewtheijes
 
J031101064069
J031101064069J031101064069
J031101064069theijes
 
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...pijans
 

Similaire à Performance analysis of economic model and radio resource management in heterogeneous wireless networks (20)

Spectrum Sharing between Cellular and Wi-Fi Networks based on Deep Reinforcem...
Spectrum Sharing between Cellular and Wi-Fi Networks based on Deep Reinforcem...Spectrum Sharing between Cellular and Wi-Fi Networks based on Deep Reinforcem...
Spectrum Sharing between Cellular and Wi-Fi Networks based on Deep Reinforcem...
 
Spectrum Sharing between Cellular and Wi-Fi Networks based on Deep Reinforcem...
Spectrum Sharing between Cellular and Wi-Fi Networks based on Deep Reinforcem...Spectrum Sharing between Cellular and Wi-Fi Networks based on Deep Reinforcem...
Spectrum Sharing between Cellular and Wi-Fi Networks based on Deep Reinforcem...
 
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNs
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNsA Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNs
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNs
 
LINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORK
LINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORKLINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORK
LINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORK
 
IRJET- Review Paper on Call Admission Control with Bandwidth Reservation Sche...
IRJET- Review Paper on Call Admission Control with Bandwidth Reservation Sche...IRJET- Review Paper on Call Admission Control with Bandwidth Reservation Sche...
IRJET- Review Paper on Call Admission Control with Bandwidth Reservation Sche...
 
ADHOCFTSIM: A Simulator of Fault Tolerence In the AD-HOC Networks
ADHOCFTSIM: A Simulator of Fault Tolerence In the AD-HOC NetworksADHOCFTSIM: A Simulator of Fault Tolerence In the AD-HOC Networks
ADHOCFTSIM: A Simulator of Fault Tolerence In the AD-HOC Networks
 
International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...
 
Candidate solutions to improve Wireless Mesh Networks WMNs performance to mee...
Candidate solutions to improve Wireless Mesh Networks WMNs performance to mee...Candidate solutions to improve Wireless Mesh Networks WMNs performance to mee...
Candidate solutions to improve Wireless Mesh Networks WMNs performance to mee...
 
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
 
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
 
QoS controlled capacity offload optimization in heterogeneous networks
QoS controlled capacity offload optimization in heterogeneous networksQoS controlled capacity offload optimization in heterogeneous networks
QoS controlled capacity offload optimization in heterogeneous networks
 
A smart clustering based approach to
A smart clustering based approach toA smart clustering based approach to
A smart clustering based approach to
 
M1802037781
M1802037781M1802037781
M1802037781
 
AN EFFICIENT SPECTRUM SHARING METHOD BASED ON GENETIC ALGORITHM IN HETEROGENE...
AN EFFICIENT SPECTRUM SHARING METHOD BASED ON GENETIC ALGORITHM IN HETEROGENE...AN EFFICIENT SPECTRUM SHARING METHOD BASED ON GENETIC ALGORITHM IN HETEROGENE...
AN EFFICIENT SPECTRUM SHARING METHOD BASED ON GENETIC ALGORITHM IN HETEROGENE...
 
Downlink beamforming and admissin control for spectrum sharing cognitive radi...
Downlink beamforming and admissin control for spectrum sharing cognitive radi...Downlink beamforming and admissin control for spectrum sharing cognitive radi...
Downlink beamforming and admissin control for spectrum sharing cognitive radi...
 
Downlink beamforming and admissin control for spectrum sharing cognitive radi...
Downlink beamforming and admissin control for spectrum sharing cognitive radi...Downlink beamforming and admissin control for spectrum sharing cognitive radi...
Downlink beamforming and admissin control for spectrum sharing cognitive radi...
 
Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...
Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...
Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...
 
Energy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A ReviewEnergy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A Review
 
J031101064069
J031101064069J031101064069
J031101064069
 
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
 

Plus de IJCNCJournal

Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
 
April 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsApril 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
 
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficIJCNCJournal
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficIJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
 
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...IJCNCJournal
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
 
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...IJCNCJournal
 
March 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsMarch 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
 
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...IJCNCJournal
 
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...IJCNCJournal
 
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemSensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemIJCNCJournal
 

Plus de IJCNCJournal (20)

Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
 
April 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsApril 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & Communications
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
 
March 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsMarch 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & Communications
 
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
 
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
 
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemSensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
 

Dernier

Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 

Dernier (20)

Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 

Performance analysis of economic model and radio resource management in heterogeneous wireless networks

  • 1. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.5, September 2013 DOI : 10.5121/ijcnc.2013.5513 183 PERFORMANCE ANALYSIS OF ECONOMIC MODEL AND RADIO RESOURCE MANAGEMENT IN HETEROGENEOUS WIRELESS NETWORKS Nilkantha Chakraborty Cognizant Technology Solution India Pvt. Ltd Mepz Economic Zone, Chennai, Tamil Nadu, India nil.0308@yahoo.in ABSTRACT Radio resource management (RRM) is the system level control of co-channel interference and other radio transmission characteristics in wireless communication systems. In this paper we first analyze a utility function based access selection (UFAS) method. Then we investigate a radio resource management and network selection scheme in heterogeneous wireless network. We propose an economic model to allocate radio resources for Code Division Multiple Access (CDMA) Networks and Wireless local Area (WLAN) networks. Moreover we formulate and solve the optimization problem in WLAN and CDMA networks and simulate those equations using MATLAB. Simulated results show that the proposed scheme can achieve more number of users and more social welfare which outperform the utility function based access selection method. KEYWORDS Radio resource management (RRM), UFAS, proposed economic model, maximum network welfare. 1. INTRODUCTION The ever growing demand for multimedia services, high mobility and global connectivity has resulted in recent years in an exploration of new technologies for wireless communication systems. Interworking between 3G mobile system and WLAN system are gaining high interest. As a matter of fact, 3GPP has organized task forces to investigate the interworking between WLAN and CDMA networks. Quality of service (QOS) can provide the means to manage the network resources. QoS allows for better use of the existing network infrastructure, improve service to the network users and reduces the cost of providing these services. One of the main goals of QoS is to provide priority including dedicated bandwidth, controlled jitter and latency and improved loss characteristics. A WLAN provides wireless network communication over short distances using radio or infrared signals instead of traditional network cabling. Network security remains an important issue for WLANs. WLANs are built by attaching a device called the access point (AP) to the edge of the wired network. WLAN system can be a complementary radio-access technology to 3G systems in providing more bandwidth and economic revenues. Mobile nodes in such heterogeneous wireless networks are expected to have the capability of selecting a proper access network to ensure service consistency and continuity. Radio resource management (RRM)
  • 2. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.5, September 2013 184 involves strategies and algorithms for controlling parameters such as transmit power, channel allocation, data rate, error coding scheme, modulation scheme, handover criteria etc. One of the objective is to use the limited radio spectrum resources and radio network infrastructure as efficiently as possible. Heterogeneous network is basically used in wireless network using different access technologies. A wireless network which provides services through wireless LAN and is able to maintain services when switching to a cellular network is called heterogeneous networks. We have simulated for Utility function based access selection method (UFAS). This method has been proposed to determine which cell is most suitable for a mobile node’s service request in heterogeneous WCDMA and WLAN networks. UFAS method achieves larger system throughput than a Policy - Enabled (PE) handoff decision method. This method can reduce handoff occurrence rate. 2. INTEGRATION OF WLAN AND UMTS: In this paper, we consider the heterogeneous networking environment that is built on CDMA and WLAN wireless-access technologies. The internetworking architecture can either be a tightly coupled case or a loosely coupled case, as shown in Figure 1. Figure 1. Internetworking architecture between WLAN and cellular network Loose Coupling: In this approach, the WLAN requires no direct links to the 3G cellular network, and less control overhead. The gateway directly connects the WLANs to the internet backbone. The main advantage of the loose coupling approach is the independent deployment of the two domains is needed for internetworking i.e. less interdependency. In this implements mobile IP, authorization and accounting service to integrate with the UMTS home AAA server. This server enables exchanging accounting information and billing information between WLAN and UMTS networks. In this architecture, WLAN and cellular networks are two separate access networks. The wireless access network is attached to the internet backbone, and the UMTS network is attached to the cellular (UMTS) core network. The overall architecture is loosely- coupled because the data path of the WLAN is completely separated from the data path of the UMTS network. This integration architecture facilitates billing and authentication but does not provide
  • 3. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.5, September 2013 185 Radio Resource Management (RRM) or QoS support. To overcome this drawback, various mechanism and model have been designed for WLAN and UMTS network. Figure 2. Performance of integrated Network based on throughput using loose coupling 2.2 Tight Coupling: In this approach, the access point (AP) of the WLAN is directly connected to the 3G cellular core network, and these two networks have to share the entities of authentication, mobility management, and radio-resource allocation. The main advantage of the tight coupling mechanism is the efficient mobility management; i.e., UMTS mobility management features are applied to the integrated networks [11]. It offers service continuity, which includes billing and AAA services. Therefore, inter-domain seamless mobility can be achieved, while reducing handoff latency. The gateway of the WLAN hides the detail of the WLAN network to the UMTS core network and executes all the UMTS protocols (mobility management, authentication, authorization and accounting) requires in a UMTS radio access network (RAN). The different network will share the same authentication, signaling, transport and billing infrastructures independently from protocols used at the physical layer on the radio interface. This approach however has many drawbacks because the UMTS core network interfaces are directly exposed to the WLAN networks. This means that the same operator must own the two networks. The disadvantage of the tight coupling approach is that, as the data traffic of WLAN traverse via the UMTS network, they potentially create a bottle neck in the UMTS network. Moreover, this technique is considered more complicated than the loose coupling technique, because different wireless network protocol stack need to be compatible for such type of integration [12].
  • 4. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.5, September 2013 186 Figure 3. Performance of integrated Network based on throughput using tight coupling 3. SYSTEM MODEL 3.1 New Proposed Economic Model for Radio Resource To evaluate network welfare of the allocated bandwidth in heterogeneous wireless network, we have proposed a new economic model with a simulated comparison of Siris and Chens model. Utility function has the characteristic of increasing as well as strictly concave and twice differentiable. Suppose x is the bandwidth assigned to user and p is the price per unit bandwidth which is paid by network service provider. If U (b) is the network utility that is attained from bandwidth b, the function U (b) - b. p can be used to describe the welfare of a single user from assigned radio resource. If we increase the bandwidth, the user gains more network utility but there is a problem of optional trade off. The welfare model defined by Chen et al. [4] is given as U (b, x) = exp (-(b-x) 2 ) =0, if b<x (1) Where x is the desired resource mobile user and b is actual data rate. The welfare model defined by siris is given as U(x) = 1- e -b x (2) Our proposed new welfare model can be written as Up (b, x) = exp (-6(b-x) 2 )/x 2 ) (3) It is normally seen that new call will be dropped if there is not enough bandwidth available to meet the new call. But proposed welfare model contributes a new idea to resolve the issue.
  • 5. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.5, September 2013 187 Simulated graph for three models i.e. Figure 4 is the example. Figure 4 depicts the comparison of three different economic model based on Network Welfare. Figure 4. Performance of various economic model using allocated bandwidth The proposed welfare model has the following features. • If the actual bandwidth exceeds the user request ,the user welfare decreases at a faster speed than the welfare in the model. So there is no chance for over assignment. • When the assigned bandwidth exactly meets the bandwidth request, the welfare of the user is the maximum. 3.2 UFAS Mechanism Utility function based access selection method can be classified into three parts. Cell classification, utility function computation , target cell determination. Cell classification is to filter out infeasible cells and depends upon following constraint. I) Signal strength constraint - Mobile node measures the signal strength. If the received signal strength exceeds threshold value then the cell will be feasible. II) Cell admission constraint - This constraint is used to check if the admittance of the service request affects the QoS requirements of existing connections. III) RF module constraint - We have designed one WCDMA and one WLAN module for an MN. MN can choose any one from both network. The utility function of a cell for an MN service can be defined as [5] U(s) = f R, n (s) * f D, n (s) *f E, n (s) *f V, n (s) (4) Where f x, n (s), x=R, D, E, and V denote evaluation functions for data rate, delay, packet error rate (PER), and mobility respectively.
  • 6. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.5, September 2013 188 The function f R, n (s) is defined by f R, n (s) = G((1+α)R n(s);R*(s)) when R n(s)<R*(s) = 0; otherwise (5) G (・) is given by G(x; µ) = exp [-(x- µ) 2 / (2* µ 2 )] The function f D, n (s) and f E, n (s) is defined by f D, n (s) = G((1+ α)D n(s);D*(s)) when D n(s)<D*(s) = 0; otherwise (6) f E, n (s) = G((1+ α)B n(s);B*(s)) when B n(s)<B*(s) = 0; otherwise (7) 3.3 Radio Resource allocation in CDMA uplink Consider the QoS requirement of the best effort traffic, in which mobile users are only concerned with the average throughput of successful data transmissions. Therefore, the effective throughput is given by the product ri pi (γi) of the transmission rate ri and the probability of successful packet transmission pi (γi). The welfare from mobile user i can be written [2] as B (ri pi (γi), Ri pi (φi)) where Ri is the requested bandwidth by mobile user i and φi is the target SINR to guarantee the BER/PER QoS requirement. Obviously, pi (γi) depends on the received SINR γi i.e., we have pi (γi) = (1 – BER (γi)) n (8) Where n is the length of one packet, and BER (γi) is the BER at SINR γi. BER has been given as BER=1/2[1-1/ට1 ൅ ଵ ଶ஢మஓ౟ ൅ ଶ ଷ୐ ቂቀ1 ൅ ୒ ହ ቁ MK െ 1ቃ] (9) Where L means the process gain, N is the number of interference cells, M is the number of multi- paths, K is the number of active users, and σ2 is the power of the Rayleigh envelope. Proposed economic model for CDMA Uplink can be formulated as Maximize ܵ௖൫‫ݎ‬௜,ߛ௜|‫׊‬௜൯ ൌ ∑ ‫ܤ‬௜൫‫ݎ‬௜‫݌‬௜ሺߛ௜ሻ, ܴ௜‫݌‬௜ሺ‫׎‬௜ሻ൯ேೌ ௜ୀଵ ‫ݎ‬௜ ൒ 0 ߛ௜ ൒ ‫׎‬௜ ∑ ‫ݎ‬௜ ߛ௜௜ ൑ ௐ ఈ ሺ10ሻ
  • 7. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.5, September 2013 189 From, we know that the maximum network welfare can be achieved only when perfect power control makes the SINR γi equal to φi to provide the BER QoS guarantee for mobile user i. The Lagrangian multiplier method can be applied to obtain the unique solution with the constraint given by ∑ ‫ݎ‬௜ ‫׎‬௜௜ ൌ ௐ ఈ (11) Because of the monotonicity of the proposed economic model with respect to the actual assigned bandwidth. Appling Lagrangian formula we have the relationship between all parameters. Equation can be written as n ൌ 4σଶ γ୧ ቊ൬ට1 ൅ ଵ ଶ஢మஓ౟ ൅ ଶ ଷ୐ ቂቀ1 ൅ ୒ ହ ቁ MK െ 1ቃ൰ ଷ ൅ 1 ൅ ଵ ଶ஢మஓ౟ ൅ ଶ ଷ୐ ቂቀ1 ൅ ୒ ହ ቁ MK െ 1ቃቋ (12) 3.4 Radio Resource allocation and network welfare in a WLAN system Similar to the CDMA network, we analyze in detail the resource-usage constraint in the WLAN, which corresponds to the maximum throughput under the optimum collision probability. The channel utilization has been formulated as [6]: Rୱሺpሻ ൌ ୮౩ሺ୮ሻ୘౩ ୮౟ሺ୮ሻ஢౩ା ୮౩ሺ୮ሻ୘౩ା ୮ౙሺ୮ሻ୘ౙ (13) where σs is the length of a back-off time slot and Ts and Tc represent the average time period that is associated with one successful transmission and one collision, respectively. We know, Ts = rts + cts + data + ack + 3si fs + di fs Tc = rts + cts + si fs + di fs Where rts, cts, data, ack, si fs, and di fs represent the average time of the RTS message, CTS message, data transmission period, acknowledgement message, short interframe space, and distributed inter- frame space, respectively. To optimize the network it can be formulate on the basis of Lagrangian multiplier method [1]. So it can be formulated as S୵ሺr୧, R୧ሻ ൌ ∑ exp ൬െ ସሺன౗ି ∑ ୖ౟ ౣ ౟ సభ ሻమ ୖ౟ మ ൫∑ ୖ౟ మౣ ౟సభ ൯ మ ൰୫ ୧ୀଵ (14) ωa is total available bandwidth in network. 4. SIMULATION RESULTS AND DISCUSSIONS 4.1. Simulation Assumptions and Parameters Table 1. Parameters based on CDMA Technology Process gain(L) 1023 Number of multipath(N) 4 Chip rate(w) 3.84
  • 8. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.5, September 2013 190 Table 2. Parameters based on UFAS Mechanism Required Data rate (bps) 2000 Measurement value of Data rate(bps) 5000 Required delay(msec) 300 Measurement value of delay(msec) 100 Required PER .05 Measurement value of PER .02 Radius of cell 300 Number of cell 19 Table 3. Parameters based on WLAN Technology 4.2. Evaluation Based on Performance Here, we carry out simulated results for both CDMA and WLAN networks. New proposed economic model has been implemented to evaluate the performance. Figure 5 depicts three scenarios as well as two comparisons. Maximum value for Network Social Welfare increases with higher values of Scaling factor and decreases hyperbolically against increasing value of signal quality. Beta remains unchanged at this point of time. On the other scenario, Maximum Network Social Welfare increases with lower values of Beta maintaining SF as unchanged. Figure 6 and 7 are simulated delay and PER performance in UFAS mechanism. UFAS selects the suitable cell according to PER, data rate, delay, and mobility. It is possible that a cell with mildly lower channel quality (higher PER) has better system throughput or the less number of handoffs. In case of coupled heterogeneous networks we have assumed 12 users at the beginning. Performance of both the maximum network social welfare and the maximum number of users are analyzed here. From Figure 8, the point can be noted that our new proposed mechanism can increase the network social welfare by about 12% through admitting more users. Single network access mechanism can also improve the network welfare .Figure 9 indicates that our new proposed RRM and access mechanism can have near about 20% more users than the UFAS mechanism. In case of CDMA network, when the number of mobile users gradually increases, the total social welfare of heterogeneous network is investigated. Scaling factor .5 The power of Rayleigh envelop 2 Average time to Request to send(msec) 20 Average time to Clear to send (msec) 20 Average time to Data transmission period(msec) 2 Average time to Acknowledgement(msec) 15 Number of mobile user 20 Required bandwidth 500
  • 9. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.5, September 2013 191 Figure 5. Performance of Maximum welfare ratio using different interference ratio in CDMA Figure 6. Performance of Delay in UFAS Mechanism
  • 10. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.5, September 2013 192 Figure 7. Performance of PER in UFAS Mechanism Figure 8. Performance of various mechanism using different guarantee of signal quality
  • 11. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.5, September 2013 193 Figure 9. Performance of proposed RRM and UFAS mechanism using total social welfare 5. CONCLUSIONS In this paper, radio-resource usage constraint is allocated to mobile users based on our new proposed economic model. Perfect signal quality is required to maximize the network social welfare. Expression for network welfare based on CDMA and WLAN has been mentioned above. Simulated results for heterogeneous network have concluded that the proposed RRM mechanism achieves maximum network welfare and provides better services compared with other schemes. REFERENCES [1] H. Jiang, W. Zhuang, X. Shen, and Q. Bi, “Quality-of-service provisioning and efficient resource utilization in CDMA cellular communications, ”IEEE J. Sel. Areas Commun., vol. 24, no. 1, pp. 4– 15, Jan. 2006. [2] Y. Chen, N. Yang, and C. Chang, “A utility function-based access selection method for heterogeneous WCDMA and WLAN networks,” in Proc. IEEE PIMRC, 2007, pp. 1–5. [3] Wei Song, Hai Jiang, Weihua Zhuang, and Xuemin (Sherman) Shen, University of Waterloo Resource Management for QoS Support inCellular/WLAN Interworking. [4] X. Pei, G. Zhu, Q. Wang, D. Qu, and J. Liu, “Economic model-basedradio resource management with QoS guarantees in the CDMA uplink,”Eur. Trans. Telecommun., vol. 20, pp. 1–9, Apr. 2009. [5] Xuebing Pei, Tao Jiang, Member, IEEE, Daiming Qu, Guangxi Zhu, Senior Member, IEEE, and Jian Liu Radio-Resource Management and Access-Control Mechanism Based on a Novel Economic Model in Heterogeneous Wireless Networks, IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 59, NO. 6, JULY 2010. [6] P. Wang, H. Jiang, and W. Zhuang, “Capacity improvement and analysis for voice/data traffic over WLANs,” IEEE Trans. Wireless Commun., vol. 6, no. 4, pp. 1530–1541, Apr. 2007. [7] M. Buddhikot et al., “Integration of 802.11 and Third-Generation Wireless Data Networks,” Proc. IEEE INFOCOM, vol. 1, Apr. 2003, pp. 503–12. [8] B. Moon and H. Aghvami, “DiffServ Extension for QoS Provisioning in IP Mobility Environments,” IEEEWireless Commun., vol. 10, no. 5, Oct. 2003, pp. 38–44.
  • 12. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.5, September 2013 194 [9] Q. Zhang et al., “Efficient Mobility Management for Vertical Handoff between WWAN and WLAN,” IEEE Commun. Mag., vol. 41, no. 11, Nov. 2003, pp. 102–08. [10] T. Klein and S.-J. Han, “Assignment Strategies for Mobile Data Users in Hierarchical Overlay Networks:Performance of Optimal and Adaptive Strategies,” IEEE JSAC, vol. 22, no. 5, June 2004, pp. 849–61. [11] Safdar Rizvi, Asif Aziz, N.M. Saad, Nasrullah Armi & Mohd Zuki Yusoff, “Tight Coupling Internetworking Between UMTS and WLAN: Challenges, Design Architectures and Simulation Analysis” International Journal of Computer Networks (IJCN), Volume (3):issue(2) : 2011 116 . [12] Salawu Nathaniel, Elizabeth NonyeOnwuka, Abolarinwa Joshua Adegboyega, dauda Umar Suleiman “Networks integration between WirelessLAN and UMTS Networks- A Brief Study” Journal of Emerging Trends in Computing and Information Sciences Vol. 4, No. 5 May 2013. AUTHOR Nilkantha Chakraborty received B.Tech. degree in Electronics and Communication from West Bengal University of Technology and M.Tech. in Communication from VIT University, Tamil Nadu. He is currently working at Cognizant technology solution. His research interests include wireless communication, networking.