338 research outputs found
Handover evaluation of UMTS-WiMAX networks
Recently, data traffic movement through a wireless channel is assisted by suggesting and implementing many mechanisms, to achieve the speedy increasing importunity and popularity of the wireless networks. Various wireless technologies can be copulated to develop a heterogeneous network, which is a candidate towards (4G) networks. OPNET modeler (14.5) is used to design simulation modules of the heterogeneous network. During device connection between the worldwide interoperability for microwave access (WiMAX) and universal mobile telecommunication system (UMTS) networks, Performance metrics such as; Jitter end-to-end delay (E-2-E) Throughput is used. The results of the simulation are measured to determine the efficiency of the transfer using WiMAX-UMTS according to the selected metrics. The WiMAX-UMTS has shown valuable improvement in Process Durability, reduction of E-2-E delay, and Jitter. The maximum amount of data transfer and the least amount of delay and Jitter is at 250 sec. Because of the handover operations and data transfer momentum, the worst-case passes in the network when 618 sec is the minimum amount. The efficiency of throughput for WiMAX equal to 0.092666% as for the efficiency of throughput for UMTS equal to 4.633333*10-6 % whereas the E-2-E efficiency a delay equal to 0.5466%
An Optimum Vertical Handoff Decision Algorithm for UMTS-WLAN
The integration of diverse but complementary cellular and wireless technologies in the next generation of wireless communication systems requires the design of intelligent vertical handoff decision algorithms to enable mobile users to seamlessly switch network access and experience uninterrupted service continuity anywhere and anytime. This paper provides an adaptive multiple attribute vertical handoff decision algorithm that enables wireless access network selection at a mobile terminal using fuzzy logic concepts and a genetic algorithm. A performance study using the integration of wireless wide area networks (WWANs) and wireless metropolitan area networks (WMANs) as an example shows that our proposed vertical handoff decision algorithm is able to determine when a handoff is required, and selects the best access network that is optimized to network conditions, quality of service requirements, mobile terminal conditions, user preferences, and service cost
Multibiometric security in wireless communication systems
This thesis was submitted for the degree of Doctor of Philosophy and awarded by Brunel University, 05/08/2010.This thesis has aimed to explore an application of Multibiometrics to secured wireless communications. The medium of study for this purpose included Wi-Fi, 3G, and
WiMAX, over which simulations and experimental studies were carried out to assess the performance. In specific, restriction of access to authorized users only is provided by a technique referred to hereafter as multibiometric cryptosystem. In brief, the system is built upon a complete challenge/response methodology in order to obtain a high level of security on the basis of user identification by fingerprint and further confirmation by verification of the user through text-dependent speaker recognition.
First is the enrolment phase by which the database of watermarked fingerprints with
memorable texts along with the voice features, based on the same texts, is created by sending them to the server through wireless channel.
Later is the verification stage at which claimed users, ones who claim are genuine, are verified against the database, and it consists of five steps. Initially faced by the identification level, one is asked to first present oneâs fingerprint and a memorable word, former is watermarked into latter, in order for system to authenticate the fingerprint and verify the validity of it by retrieving the challenge for accepted user.
The following three steps then involve speaker recognition including the user
responding to the challenge by text-dependent voice, server authenticating the response, and finally server accepting/rejecting the user.
In order to implement fingerprint watermarking, i.e. incorporating the memorable word as a watermark message into the fingerprint image, an algorithm of five steps has been developed. The first three novel steps having to do with the fingerprint
image enhancement (CLAHE with 'Clip Limit', standard deviation analysis and
sliding neighborhood) have been followed with further two steps for embedding, and
extracting the watermark into the enhanced fingerprint image utilising Discrete
Wavelet Transform (DWT).
In the speaker recognition stage, the limitations of this technique in wireless
communication have been addressed by sending voice feature (cepstral coefficients)
instead of raw sample. This scheme is to reap the advantages of reducing the
transmission time and dependency of the data on communication channel, together
with no loss of packet. Finally, the obtained results have verified the claims
On the Merits of Deploying TDM-based Next-Generation PON Solutions in the Access Arena As Multiservice, All Packet-Based 4G Mobile Backhaul RAN Architecture
The phenomenal growth of mobile backhaul capacity required to support the emerging fourth-generation (4G) traffic including mobile WiMAX, cellular Long-Term Evolution (LTE), and LTE-Advanced (LTE-A) requires rapid migration from today\u27s legacy circuit switched T1/E1 wireline and microwave backhaul technologies to a new fiber-supported, all-packet-based mobile backhaul infrastructure. Clearly, a cost effective fiber supported all-packet-based mobile backhaul radio access network (RAN) architecture that is compatible with these inherently distributed 4G RAN architectures is needed to efficiently scale current mobile backhaul networks. However, deploying a green fiber-based mobile backhaul infrastructure is a costly proposition mainly due to the significant cost associated with digging the trenches in which the fiber is to be laid.
These, along with the inevitable trend towards all-IP/Ethernet transport protocols and packet switched networks, have prompted many carriers around the world to consider the potential of utilizing the existing fiber-based Passive Optical Network (PON) access infrastructure as an all-packet-based converged fixed-mobile optical access networking transport architecture to backhaul both mobile and typical wireline traffic. Passive Optical Network (PON)-based fiber-to-the-curb/home (FTTC/FTTH) access networks are being deployed around the globe based on two Time-Division Multiplexed (TDM) standards: ITU G.984 Gigabit PON (GPON) and IEEE 802.ah Ethernet PON (EPON). A PON connects a group of Optical Network Units (ONUs) located at the subscriber premises to an Optical Line Terminal (OLT) located at the service provider\u27s facility.
It is the purpose of this thesis to examine the technological requirements and assess the performance analysis and feasibility for deploying TDM-based next-generation (NG) PON solutions in the access arena as multiservice, all packet-based 4G mobile backhaul RAN and/or converged fixed-mobile optical networking architecture. Specifically, this work proposes and devises a simple and cost-effective 10G-EPON-based 4G mobile backhaul RAN architecture that efficiently transports and supports a wide range of existing and emerging fixed-mobile advanced multimedia applications and services along with the diverse quality of service (QoS), rate, and reliability requirements set by these services. The techno-economics merits of utilizing PON-based 4G RAN architecture versus that of traditional 4G (mobile WiMAX and LTE) RAN will be thoroughly examine and quantified.
To achieve our objective, we utilize the existing fiber-based PON access infrastructure with novel ring-based distribution access network and wireless-enabled OLT and ONUs as the multiservice packet-based 4G mobile backhaul RAN infrastructure. Specifically, to simplify the implementation of such a complex undertaking, this work is divided into two sequential phases. In the first phase, we examine and quantify the overall performance of the standalone ring-based 10G-EPON architecture (just the wireline part without overlaying/incorporating the wireless part (4G RAN)) via modeling and simulations. We then assemble the basic building blocks, components, and sub-systems required to build up a proof-of-concept prototype testbed for the standalone ring-based EPON architecture. The testbed will be used to verify and demonstrate the performance of the standalone architecture, specifically, in terms of power budget, scalability, and reach.
In the second phase, we develop an integrated framework for the efficient interworking between the two wireline PON and 4G mobile access technologies, particularly, in terms of unified network control and management (NCM) operations. Specifically, we address the key technical challenges associated with tailoring a typically centralized PON-based access architecture to interwork with and support a distributed 4G RAN architecture and associated radio NCM operations. This is achieved via introducing and developing several salient-networking innovations that collectively enable the standalone EPON architecture to support a fully distributed 4G mobile backhaul RAN and/or a truly unified NG-PON-4G access networking architecture. These include a fully distributed control plane that enables intercommunication among the access nodes (ONUs/BSs) as well as signaling, scheduling algorithms, and handoff procedures that operate in a distributed manner.
Overall, the proposed NG-PON architecture constitutes a complete networking paradigm shift from the typically centralized PON\u27s architecture and OLT-based NCM operations to a new disruptive fully distributed PON\u27s architecture and NCM operations in which all the typically centralized OLT-based PON\u27s NCM operations are migrated to and independently implemented by the access nodes (ONUs) in a distributed manner. This requires migrating most of the typically centralized wireline and radio control and user-plane functionalities such as dynamic bandwidth allocation (DBA), queue management and packet scheduling, handover control, radio resource management, admission control, etc., typically implemented in today\u27s OLT/RNC, to the access nodes (ONUs/4G BSs).
It is shown that the overall performance of the proposed EPON-based 4G backhaul including both the RAN and Mobile Packet Core (MPC) {Evolved Packet Core (EPC) per 3GPP LTE\u27s standard} is significantly augmented compared to that of the typical 4G RAN, specifically, in terms of handoff capability, signaling overhead, overall network throughput and latency, and QoS support. Furthermore, the proposed architecture enables redistributing some of the intelligence and NCM operations currently centralized in the MPC platform out into the access nodes of the mobile RAN. Specifically, as this work will show, it enables offloading sizable fraction of the mobile signaling as well as actual local upstream traffic transport and processing (LTE bearers switch/set-up, retain, and tear-down and associated signaling commands from the BSs to the EPC and vice-versa) from the EPC to the access nodes (ONUs/BSs). This has a significant impact on the performance of the EPC. First, it frees up a sizable fraction of the badly needed network resources as well as processing on the overloaded centralized serving nodes (AGW) in the MPC. Second, it frees up capacity and sessions on the typically congested mobile backhaul from the BSs to the EPC and vice-versa
An efficient scheduling for diverse QoS requirements in WiMAX
WiMAX is one of the most important broadband wireless technologies and is anticipated to be a viable alternative to traditional wired broadband techniques due to its cost efficiency. Being an emerging technology, WiMAX supports multimedia applications such as voice over IP (VoIP), voice conference and online gaming. It is necessary to provide Quality of Service (QoS) guaranteed with different characteristics, quite challenging, however, for Broadband Wireless Access (BWA) networks. Therefore, an effective scheduling is critical for the WiMAX system. Many traffic scheduling algorithms are available for wireless networks, e.g. Round Robin, Proportional Fairness (PF) scheme and Integrated Cross-layer scheme (ICL). Among these conventional schemes, some cannot differentiate services, while some can fulfill the service differentiation with a high-complexity implementation.
This thesis proposes a novel scheduling algorithm for Orthogonal Frequency Division Multiplex/Time Division Multiple Access (OFDM/TDMA)-based systems, which extends the PF scheme to multiple service types with diverse QoS requirements. The design objective is to provide differentiated services according to their QoS requirements, while the objective can be achieved by adjusting only one unique parameter, the time window for evaluating the average throughput. By extensive simulation, it is shown that the proposed scheduling algorithm exploits the advantage of the PF scheme, enhancing the throughput, and distinguishes the services in terms of the average delay. Afterward, we prove the superiority of the new scheme over the conventional ones by showing simulation results
Recommended from our members
An Emergent Architecture for Scaling Decentralized Communication Systems (DCS)
With recent technological advancements now accelerating the mobile and wireless Internet solution space, a ubiquitous computing Internet is well within the research and industrial community's design reach - a decentralized system design, which is not solely driven by static physical models and sound engineering principals, but more dynamically, perhaps sub-optimally at initial deployment and socially-influenced in its evolution. To complement today's Internet system, this thesis proposes a Decentralized Communication System (DCS) architecture with the following characteristics: flat physical topologies with numerous compute oriented and communication intensive nodes in the network with many of these nodes operating in multiple functional roles; self-organizing virtual structures formed through alternative mobility scenarios and capable of serving ad hoc networking formations; emergent operations and control with limited dependency on centralized control and management administration. Today, decentralized systems are not commercially scalable or viable for broad adoption in the same way we have to come to rely on the Internet or telephony systems. The premise in this thesis is that DCS can reach high levels of resilience, usefulness, scale that the industry has come to experience with traditional centralized systems by exploiting the following properties: (i.) network density and topological diversity; (ii.) self-organization and emergent attributes; (iii.) cooperative and dynamic infrastructure; and (iv.) node role diversity. This thesis delivers key contributions towards advancing the current state of the art in decentralized systems. First, we present the vision and a conceptual framework for DCS. Second, the thesis demonstrates that such a framework and concept architecture is feasible by prototyping a DCS platform that exhibits the above properties or minimally, demonstrates that these properties are feasible through prototyped network services. Third, this work expands on an alternative approach to network clustering using hierarchical virtual clusters (HVC) to facilitate self-organizing network structures. With increasing network complexity, decentralized systems can generally lead to unreliable and irregular service quality, especially given unpredictable node mobility and traffic dynamics. The HVC framework is an architectural strategy to address organizational disorder associated with traditional decentralized systems. The proposed HVC architecture along with the associated promotional methodology organizes distributed control and management services by leveraging alternative organizational models (e.g., peer-to-peer (P2P), centralized or tiered) in hierarchical and virtual fashion. Through simulation and analytical modeling, we demonstrate HVC efficiencies in DCS structural scalability and resilience by comparing static and dynamic HVC node configurations against traditional physical configurations based on P2P, centralized or tiered structures. Next, an emergent management architecture for DCS exploiting HVC for self-organization, introduces emergence as an operational approach to scaling DCS services for state management and policy control. In this thesis, emergence scales in hierarchical fashion using virtual clustering to create multiple tiers of local and global separation for aggregation, distribution and network control. Emergence is an architectural objective, which HVC introduces into the proposed self-management design for scaling and stability purposes. Since HVC expands the clustering model hierarchically and virtually, a clusterhead (CH) node, positioned as a proxy for a specific cluster or grouped DCS nodes, can also operate in a micro-capacity as a peer member of an organized cluster in a higher tier. As the HVC promotional process continues through the hierarchy, each tier of the hierarchy exhibits emergent behavior. With HVC as the self-organizing structural framework, a multi-tiered, emergent architecture enables the decentralized management strategy to improve scaling objectives that traditionally challenge decentralized systems. The HVC organizational concept and the emergence properties align with and the view of the human brain's neocortex layering structure of sensory storage, prediction and intelligence. It is the position in this thesis, that for DCS to scale and maintain broad stability, network control and management must strive towards an emergent or natural approach. While today's models for network control and management have proven to lack scalability and responsiveness based on pure centralized models, it is unlikely that singular organizational models can withstand the operational complexities associated with DCS. In this work, we integrate emergence and learning-based methods in a cooperative computing manner towards realizing DCS self-management. However, unlike many existing work in these areas which break down with increased network complexity and dynamics, the proposed HVC framework is utilized to offset these issues through effective separation, aggregation and asynchronous processing of both distributed state and policy. Using modeling techniques, we demonstrate that such architecture is feasible and can improve the operational robustness of DCS. The modeling emphasis focuses on demonstrating the operational advantages of an HVC-based organizational strategy for emergent management services (i.e., reachability, availability or performance). By integrating the two approaches, the DCS architecture forms a scalable system to address the challenges associated with traditional decentralized systems. The hypothesis is that the emergent management system architecture will improve the operational scaling properties of DCS-based applications and services. Additionally, we demonstrate structural flexibility of HVC as an underlying service infrastructure to build and deploy DCS applications and layered services. The modeling results demonstrate that an HVC-based emergent management and control system operationally outperforms traditional structural organizational models. In summary, this thesis brings together the above contributions towards delivering a scalable, decentralized system for Internet mobile computing and communications
Multibiometric security in wireless communication systems
This thesis has aimed to explore an application of Multibiometrics to secured wireless communications. The medium of study for this purpose included Wi-Fi, 3G, and WiMAX, over which simulations and experimental studies were carried out to assess the performance. In specific, restriction of access to authorized users only is provided by a technique referred to hereafter as multibiometric cryptosystem. In brief, the system is built upon a complete challenge/response methodology in order to obtain a high level of security on the basis of user identification by fingerprint and further confirmation by verification of the user through text-dependent speaker recognition. First is the enrolment phase by which the database of watermarked fingerprints with memorable texts along with the voice features, based on the same texts, is created by sending them to the server through wireless channel. Later is the verification stage at which claimed users, ones who claim are genuine, are verified against the database, and it consists of five steps. Initially faced by the identification level, one is asked to first present oneâs fingerprint and a memorable word, former is watermarked into latter, in order for system to authenticate the fingerprint and verify the validity of it by retrieving the challenge for accepted user. The following three steps then involve speaker recognition including the user responding to the challenge by text-dependent voice, server authenticating the response, and finally server accepting/rejecting the user. In order to implement fingerprint watermarking, i.e. incorporating the memorable word as a watermark message into the fingerprint image, an algorithm of five steps has been developed. The first three novel steps having to do with the fingerprint image enhancement (CLAHE with 'Clip Limit', standard deviation analysis and sliding neighborhood) have been followed with further two steps for embedding, and extracting the watermark into the enhanced fingerprint image utilising Discrete Wavelet Transform (DWT). In the speaker recognition stage, the limitations of this technique in wireless communication have been addressed by sending voice feature (cepstral coefficients) instead of raw sample. This scheme is to reap the advantages of reducing the transmission time and dependency of the data on communication channel, together with no loss of packet. Finally, the obtained results have verified the claims.EThOS - Electronic Theses Online ServiceGBUnited Kingdo
Performance analysis of energy detection algorithm in cognitive radio
Rapid growth of wireless applications and services has made it essential to address spectrum scarcity problem. if we were scan a portion of radio spectrum including revenue-rich urban areas, we find that some frequency bands in the spectrum are largely unoccupied most of the time, some other frequency bands are partially occupied and the remaining frequency bands are heavily used. This leads to a underutilization of radio spectrum, Cognitive radio (CR) technology attempts alleviate this problem through improved utilization of radio spectrum.
Cognitive radio is a form of wireless communication in which a transceiver can intelligently detect which RF communication channels are in use and which are not, and instantly move into vacant channels while avoiding occupied ones. This optimizes the use of available radio-frequency (RF) spectrum while minimizing interference to other users. There two types of cognitive radio, full cognitive radio and spectrum-sensing cognitive radio. Full cognitive radio takes into account all parameters that a wireless node or network can be aware of. Spectrum-sensing cognitive radio is used to detect channels in the radio frequency spectrum. Spectrum sensing is a fundamental requirement in cognitive radio network. Many signal detection techniques can be used in spectrum sensing so as to enhance the detection probability.
In this thesis we analyze the performance of energy detector spectrum sensing algorithm in cognitive radio. By increasing the some parameters, the performance of algorithm can be improved as shown in the simulation results. In cognitive radio systems, secondary users should determine correctly whether the primary user is absent or not in a certain spectrum within a short detection period. Spectrum detection schemes based on fixed threshold are sensitive to noise uncertainty, the energy detection based on dynamic threshold can improve the antagonism of noise uncertainty; get a good performance of detection while without increasing the computer complexity uncertainty and improves detection performance for schemes are sensitive to noise uncertainty in lower signal-to-noise and large noise uncertainty environments
- âŠ