338 research outputs found

    Handover evaluation of UMTS-WiMAX networks

    Get PDF
    Recently, data traffic movement through a wireless channel is assisted by suggesting and implementing many mechanisms, to achieve the speedy increasing importunity and popularity of the wireless networks. Various wireless technologies can be copulated to develop a heterogeneous network, which is a candidate towards (4G) networks. OPNET modeler (14.5) is used to design simulation modules of the heterogeneous network. During device connection between the worldwide interoperability for microwave access (WiMAX) and universal mobile telecommunication system (UMTS) networks, Performance metrics such as; Jitter end-to-end delay (E-2-E) Throughput is used. The results of the simulation are measured to determine the efficiency of the transfer using WiMAX-UMTS according to the selected metrics. The WiMAX-UMTS has shown valuable improvement in Process Durability, reduction of E-2-E delay, and Jitter. The maximum amount of data transfer and the least amount of delay and Jitter is at 250 sec. Because of the handover operations and data transfer momentum, the worst-case passes in the network when 618 sec is the minimum amount. The efficiency of throughput for WiMAX equal to 0.092666% as for the efficiency of throughput for UMTS equal to 4.633333*10-6 % whereas the E-2-E efficiency a delay equal to 0.5466%

    An Optimum Vertical Handoff Decision Algorithm for UMTS-WLAN

    Full text link
    The integration of diverse but complementary cellular and wireless technologies in the next generation of wireless communication systems requires the design of intelligent vertical handoff decision algorithms to enable mobile users to seamlessly switch network access and experience uninterrupted service continuity anywhere and anytime. This paper provides an adaptive multiple attribute vertical handoff decision algorithm that enables wireless access network selection at a mobile terminal using fuzzy logic concepts and a genetic algorithm. A performance study using the integration of wireless wide area networks (WWANs) and wireless metropolitan area networks (WMANs) as an example shows that our proposed vertical handoff decision algorithm is able to determine when a handoff is required, and selects the best access network that is optimized to network conditions, quality of service requirements, mobile terminal conditions, user preferences, and service cost

    Multibiometric security in wireless communication systems

    Get PDF
    This thesis was submitted for the degree of Doctor of Philosophy and awarded by Brunel University, 05/08/2010.This thesis has aimed to explore an application of Multibiometrics to secured wireless communications. The medium of study for this purpose included Wi-Fi, 3G, and WiMAX, over which simulations and experimental studies were carried out to assess the performance. In specific, restriction of access to authorized users only is provided by a technique referred to hereafter as multibiometric cryptosystem. In brief, the system is built upon a complete challenge/response methodology in order to obtain a high level of security on the basis of user identification by fingerprint and further confirmation by verification of the user through text-dependent speaker recognition. First is the enrolment phase by which the database of watermarked fingerprints with memorable texts along with the voice features, based on the same texts, is created by sending them to the server through wireless channel. Later is the verification stage at which claimed users, ones who claim are genuine, are verified against the database, and it consists of five steps. Initially faced by the identification level, one is asked to first present one’s fingerprint and a memorable word, former is watermarked into latter, in order for system to authenticate the fingerprint and verify the validity of it by retrieving the challenge for accepted user. The following three steps then involve speaker recognition including the user responding to the challenge by text-dependent voice, server authenticating the response, and finally server accepting/rejecting the user. In order to implement fingerprint watermarking, i.e. incorporating the memorable word as a watermark message into the fingerprint image, an algorithm of five steps has been developed. The first three novel steps having to do with the fingerprint image enhancement (CLAHE with 'Clip Limit', standard deviation analysis and sliding neighborhood) have been followed with further two steps for embedding, and extracting the watermark into the enhanced fingerprint image utilising Discrete Wavelet Transform (DWT). In the speaker recognition stage, the limitations of this technique in wireless communication have been addressed by sending voice feature (cepstral coefficients) instead of raw sample. This scheme is to reap the advantages of reducing the transmission time and dependency of the data on communication channel, together with no loss of packet. Finally, the obtained results have verified the claims

    On the Merits of Deploying TDM-based Next-Generation PON Solutions in the Access Arena As Multiservice, All Packet-Based 4G Mobile Backhaul RAN Architecture

    Full text link
    The phenomenal growth of mobile backhaul capacity required to support the emerging fourth-generation (4G) traffic including mobile WiMAX, cellular Long-Term Evolution (LTE), and LTE-Advanced (LTE-A) requires rapid migration from today\u27s legacy circuit switched T1/E1 wireline and microwave backhaul technologies to a new fiber-supported, all-packet-based mobile backhaul infrastructure. Clearly, a cost effective fiber supported all-packet-based mobile backhaul radio access network (RAN) architecture that is compatible with these inherently distributed 4G RAN architectures is needed to efficiently scale current mobile backhaul networks. However, deploying a green fiber-based mobile backhaul infrastructure is a costly proposition mainly due to the significant cost associated with digging the trenches in which the fiber is to be laid. These, along with the inevitable trend towards all-IP/Ethernet transport protocols and packet switched networks, have prompted many carriers around the world to consider the potential of utilizing the existing fiber-based Passive Optical Network (PON) access infrastructure as an all-packet-based converged fixed-mobile optical access networking transport architecture to backhaul both mobile and typical wireline traffic. Passive Optical Network (PON)-based fiber-to-the-curb/home (FTTC/FTTH) access networks are being deployed around the globe based on two Time-Division Multiplexed (TDM) standards: ITU G.984 Gigabit PON (GPON) and IEEE 802.ah Ethernet PON (EPON). A PON connects a group of Optical Network Units (ONUs) located at the subscriber premises to an Optical Line Terminal (OLT) located at the service provider\u27s facility. It is the purpose of this thesis to examine the technological requirements and assess the performance analysis and feasibility for deploying TDM-based next-generation (NG) PON solutions in the access arena as multiservice, all packet-based 4G mobile backhaul RAN and/or converged fixed-mobile optical networking architecture. Specifically, this work proposes and devises a simple and cost-effective 10G-EPON-based 4G mobile backhaul RAN architecture that efficiently transports and supports a wide range of existing and emerging fixed-mobile advanced multimedia applications and services along with the diverse quality of service (QoS), rate, and reliability requirements set by these services. The techno-economics merits of utilizing PON-based 4G RAN architecture versus that of traditional 4G (mobile WiMAX and LTE) RAN will be thoroughly examine and quantified. To achieve our objective, we utilize the existing fiber-based PON access infrastructure with novel ring-based distribution access network and wireless-enabled OLT and ONUs as the multiservice packet-based 4G mobile backhaul RAN infrastructure. Specifically, to simplify the implementation of such a complex undertaking, this work is divided into two sequential phases. In the first phase, we examine and quantify the overall performance of the standalone ring-based 10G-EPON architecture (just the wireline part without overlaying/incorporating the wireless part (4G RAN)) via modeling and simulations. We then assemble the basic building blocks, components, and sub-systems required to build up a proof-of-concept prototype testbed for the standalone ring-based EPON architecture. The testbed will be used to verify and demonstrate the performance of the standalone architecture, specifically, in terms of power budget, scalability, and reach. In the second phase, we develop an integrated framework for the efficient interworking between the two wireline PON and 4G mobile access technologies, particularly, in terms of unified network control and management (NCM) operations. Specifically, we address the key technical challenges associated with tailoring a typically centralized PON-based access architecture to interwork with and support a distributed 4G RAN architecture and associated radio NCM operations. This is achieved via introducing and developing several salient-networking innovations that collectively enable the standalone EPON architecture to support a fully distributed 4G mobile backhaul RAN and/or a truly unified NG-PON-4G access networking architecture. These include a fully distributed control plane that enables intercommunication among the access nodes (ONUs/BSs) as well as signaling, scheduling algorithms, and handoff procedures that operate in a distributed manner. Overall, the proposed NG-PON architecture constitutes a complete networking paradigm shift from the typically centralized PON\u27s architecture and OLT-based NCM operations to a new disruptive fully distributed PON\u27s architecture and NCM operations in which all the typically centralized OLT-based PON\u27s NCM operations are migrated to and independently implemented by the access nodes (ONUs) in a distributed manner. This requires migrating most of the typically centralized wireline and radio control and user-plane functionalities such as dynamic bandwidth allocation (DBA), queue management and packet scheduling, handover control, radio resource management, admission control, etc., typically implemented in today\u27s OLT/RNC, to the access nodes (ONUs/4G BSs). It is shown that the overall performance of the proposed EPON-based 4G backhaul including both the RAN and Mobile Packet Core (MPC) {Evolved Packet Core (EPC) per 3GPP LTE\u27s standard} is significantly augmented compared to that of the typical 4G RAN, specifically, in terms of handoff capability, signaling overhead, overall network throughput and latency, and QoS support. Furthermore, the proposed architecture enables redistributing some of the intelligence and NCM operations currently centralized in the MPC platform out into the access nodes of the mobile RAN. Specifically, as this work will show, it enables offloading sizable fraction of the mobile signaling as well as actual local upstream traffic transport and processing (LTE bearers switch/set-up, retain, and tear-down and associated signaling commands from the BSs to the EPC and vice-versa) from the EPC to the access nodes (ONUs/BSs). This has a significant impact on the performance of the EPC. First, it frees up a sizable fraction of the badly needed network resources as well as processing on the overloaded centralized serving nodes (AGW) in the MPC. Second, it frees up capacity and sessions on the typically congested mobile backhaul from the BSs to the EPC and vice-versa

    An efficient scheduling for diverse QoS requirements in WiMAX

    Get PDF
    WiMAX is one of the most important broadband wireless technologies and is anticipated to be a viable alternative to traditional wired broadband techniques due to its cost efficiency. Being an emerging technology, WiMAX supports multimedia applications such as voice over IP (VoIP), voice conference and online gaming. It is necessary to provide Quality of Service (QoS) guaranteed with different characteristics, quite challenging, however, for Broadband Wireless Access (BWA) networks. Therefore, an effective scheduling is critical for the WiMAX system. Many traffic scheduling algorithms are available for wireless networks, e.g. Round Robin, Proportional Fairness (PF) scheme and Integrated Cross-layer scheme (ICL). Among these conventional schemes, some cannot differentiate services, while some can fulfill the service differentiation with a high-complexity implementation. This thesis proposes a novel scheduling algorithm for Orthogonal Frequency Division Multiplex/Time Division Multiple Access (OFDM/TDMA)-based systems, which extends the PF scheme to multiple service types with diverse QoS requirements. The design objective is to provide differentiated services according to their QoS requirements, while the objective can be achieved by adjusting only one unique parameter, the time window for evaluating the average throughput. By extensive simulation, it is shown that the proposed scheduling algorithm exploits the advantage of the PF scheme, enhancing the throughput, and distinguishes the services in terms of the average delay. Afterward, we prove the superiority of the new scheme over the conventional ones by showing simulation results

    Multibiometric security in wireless communication systems

    Get PDF
    This thesis has aimed to explore an application of Multibiometrics to secured wireless communications. The medium of study for this purpose included Wi-Fi, 3G, and WiMAX, over which simulations and experimental studies were carried out to assess the performance. In specific, restriction of access to authorized users only is provided by a technique referred to hereafter as multibiometric cryptosystem. In brief, the system is built upon a complete challenge/response methodology in order to obtain a high level of security on the basis of user identification by fingerprint and further confirmation by verification of the user through text-dependent speaker recognition. First is the enrolment phase by which the database of watermarked fingerprints with memorable texts along with the voice features, based on the same texts, is created by sending them to the server through wireless channel. Later is the verification stage at which claimed users, ones who claim are genuine, are verified against the database, and it consists of five steps. Initially faced by the identification level, one is asked to first present one’s fingerprint and a memorable word, former is watermarked into latter, in order for system to authenticate the fingerprint and verify the validity of it by retrieving the challenge for accepted user. The following three steps then involve speaker recognition including the user responding to the challenge by text-dependent voice, server authenticating the response, and finally server accepting/rejecting the user. In order to implement fingerprint watermarking, i.e. incorporating the memorable word as a watermark message into the fingerprint image, an algorithm of five steps has been developed. The first three novel steps having to do with the fingerprint image enhancement (CLAHE with 'Clip Limit', standard deviation analysis and sliding neighborhood) have been followed with further two steps for embedding, and extracting the watermark into the enhanced fingerprint image utilising Discrete Wavelet Transform (DWT). In the speaker recognition stage, the limitations of this technique in wireless communication have been addressed by sending voice feature (cepstral coefficients) instead of raw sample. This scheme is to reap the advantages of reducing the transmission time and dependency of the data on communication channel, together with no loss of packet. Finally, the obtained results have verified the claims.EThOS - Electronic Theses Online ServiceGBUnited Kingdo

    Performance analysis of energy detection algorithm in cognitive radio

    Get PDF
    Rapid growth of wireless applications and services has made it essential to address spectrum scarcity problem. if we were scan a portion of radio spectrum including revenue-rich urban areas, we find that some frequency bands in the spectrum are largely unoccupied most of the time, some other frequency bands are partially occupied and the remaining frequency bands are heavily used. This leads to a underutilization of radio spectrum, Cognitive radio (CR) technology attempts alleviate this problem through improved utilization of radio spectrum. Cognitive radio is a form of wireless communication in which a transceiver can intelligently detect which RF communication channels are in use and which are not, and instantly move into vacant channels while avoiding occupied ones. This optimizes the use of available radio-frequency (RF) spectrum while minimizing interference to other users. There two types of cognitive radio, full cognitive radio and spectrum-sensing cognitive radio. Full cognitive radio takes into account all parameters that a wireless node or network can be aware of. Spectrum-sensing cognitive radio is used to detect channels in the radio frequency spectrum. Spectrum sensing is a fundamental requirement in cognitive radio network. Many signal detection techniques can be used in spectrum sensing so as to enhance the detection probability. In this thesis we analyze the performance of energy detector spectrum sensing algorithm in cognitive radio. By increasing the some parameters, the performance of algorithm can be improved as shown in the simulation results. In cognitive radio systems, secondary users should determine correctly whether the primary user is absent or not in a certain spectrum within a short detection period. Spectrum detection schemes based on fixed threshold are sensitive to noise uncertainty, the energy detection based on dynamic threshold can improve the antagonism of noise uncertainty; get a good performance of detection while without increasing the computer complexity uncertainty and improves detection performance for schemes are sensitive to noise uncertainty in lower signal-to-noise and large noise uncertainty environments

    ICTs, Climate Change and Development: Themes and Strategic Actions

    Get PDF
    • 

    corecore