1,479 research outputs found

    Enhancing QoS and QoE in IMS Enabled Next Generation Networks

    Full text link
    Managing network complexity, accommodating greater numbers of subscribers, improving coverage to support data services (e.g. email, video, and music downloads), keeping up to speed with fast-changing technology, and driving maximum value from existing networks - all while reducing CapEX and OpEX and ensuring Quality of Service (QoS) for the network and Quality of Experience (QoE) for the user. These are just some of the pressing business issues faced by mobileservice providers, summarized by the demand to "achieve more, for less." The ultimate goal of optimization techniques at the network and application layer is to ensure End-user perceived QoS. The next generation networks (NGN), a composite environment of proven telecommunications and Internet-oriented mechanisms have become generally recognized as the telecommunications environment of the future. However, the nature of the NGN environment presents several complex issues regarding quality assurance that have not existed in the legacy environments (e.g., multi-network, multi-vendor, and multi-operator IP-based telecommunications environment, distributed intelligence, third-party provisioning, fixed-wireless and mobile access, etc.). In this Research Paper, a service aware policy-based approach to NGN quality assurance is presented, taking into account both perceptual quality of experience and technologydependant quality of service issues. The respective procedures, entities, mechanisms, and profiles are discussed. The purpose of the presented approach is in research, development, and discussion of pursuing the end-to-end controllability of the quality of the multimedia NGN-based communications in an environment that is best effort in its nature and promotes end user's access agnosticism, service agility, and global mobility.Comment: 11 Page

    A Quality of Service Based Model for Supporting Mobile Secondary Users in Cognitive Radio Technology

    Get PDF
    Current wireless networks are characterized by a static spectrum allocation policy, where governmental agencies assign wireless spectrum to license holders on a long-term basis for large geographical regions. The operators claim that the spectrum bands for mobile operation are highly occupied. Even then, a significant amount of licensed spectrum remains underutilized. Cognitive radio senses the radio environment with a twofold objective: identify those subbands of the radio spectrum that are underutilized by the primary (i.e., legacy) users and providing the means for making those bands available for employment by secondary (i.e., unlicensed) users. For unlicensed communication, the Quality of Service parameters need to be considered. Quality of Service comprises of channel availability, accessibility, and maintainability. Assessment of vacant channels of licensed band in a geographical region is termed as availability. An analysis of the collected data lead to arrive at the conclusion that more than one-eighth part of resources of each band are nearly permanently vacant, which is enough to design in-band common control signaling methods for cognitive radio. Measurement result plot of vacant channels in cities with known population will help to assess availability of vacant channels for any city and hence, measurement complexity can be avoided. The strategy to occupy the vacant channels without disturbing the primary user operation is referred as accessibility (or selection). Accessibility of a channel is dependent on blocking probability (or Quality of Service) measured in duration of minutes instead of hours. Instantaneous blocking probability has been calculated based on current minute occupancy for all available channels as reference. A comprehensive prediction model is employed in the proposed work to compute the instantaneous blocking probability both on immediate minute occupancy basis and its preceding 60 min basis from time of request by SU. Validation through actual data establishes that channelized blocking probability estimation model has lower error value compared to estimation through prediction models of other researchers. It was also observed that hourly basis prediction model has constant blocking probability value during clock hour, whereas minutewise Grade of Service (GoS) prediction model addresses the local peak demand and hence leads to a stringent GoS estimation. On secondary user request for vacant channel, the cognitive radio network needs to evaluate the expected holding time of the particular Secondary User and to ensure channel maintainability (or allocation), and it shall predict that the allotted channel shall be able to provide interruption-free service for holding time duration. Minutewise channel occupancy traffic is bumpy in nature; hence, the present work predicts call arrival rate using Holt Winter’s method. Also, at the instant of SU channel request, the channel allocation processor inputs all PU channel status minutewise, calculates actual mean residual lifetime (MRL) in minutes for each vacant channel and selects the channel with highest predicted free time. A simulation program runs on data collected from mobile switch of cellular network, which creates pseudo-live environment for channel allocation. The present work has compared the mean residual lifetime (MRL) method with the other researchers using probabilistic method of channel allocation and MRL method has been established as more accurate. The selection and allocation process with defined blocking probability model has been verified retrieving big data from data warehouse

    Full-Service MAC Protocol for Metro-Reach GPONs

    Get PDF
    “This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder." “Copyright IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.”An advanced medium access control protocol is presented demonstrating dynamic bandwidth allocation for long-reach gigabit-capable passive optical networks (GPONs). The protocol enables the optical line terminal to overlap the idle time slots in each packet transmission cycle with a virtual polling cycle to increase the effective transmission bandwidth. Contrasting the new scheme with developed algorithms, network modeling has exhibited significant improvement in channel throughput, mean packet delay, and packet loss rate in the presence of class-of-service and service-level differentiation. In particular, the displayed 34% increase in the overall channel throughput and 30 times reduction in mean packet delay for service-level 1 and service-level 2 optical network units (ONUs) at accustomed 50% ONU load constitutes the highest extended-reach GPON performance reported up to date.Peer reviewe

    Internet of Things-aided Smart Grid: Technologies, Architectures, Applications, Prototypes, and Future Research Directions

    Full text link
    Traditional power grids are being transformed into Smart Grids (SGs) to address the issues in existing power system due to uni-directional information flow, energy wastage, growing energy demand, reliability and security. SGs offer bi-directional energy flow between service providers and consumers, involving power generation, transmission, distribution and utilization systems. SGs employ various devices for the monitoring, analysis and control of the grid, deployed at power plants, distribution centers and in consumers' premises in a very large number. Hence, an SG requires connectivity, automation and the tracking of such devices. This is achieved with the help of Internet of Things (IoT). IoT helps SG systems to support various network functions throughout the generation, transmission, distribution and consumption of energy by incorporating IoT devices (such as sensors, actuators and smart meters), as well as by providing the connectivity, automation and tracking for such devices. In this paper, we provide a comprehensive survey on IoT-aided SG systems, which includes the existing architectures, applications and prototypes of IoT-aided SG systems. This survey also highlights the open issues, challenges and future research directions for IoT-aided SG systems

    A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends

    Full text link
    This paper examines the security vulnerabilities and threats imposed by the inherent open nature of wireless communications and to devise efficient defense mechanisms for improving the wireless network security. We first summarize the security requirements of wireless networks, including their authenticity, confidentiality, integrity and availability issues. Next, a comprehensive overview of security attacks encountered in wireless networks is presented in view of the network protocol architecture, where the potential security threats are discussed at each protocol layer. We also provide a survey of the existing security protocols and algorithms that are adopted in the existing wireless network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term evolution (LTE) systems. Then, we discuss the state-of-the-art in physical-layer security, which is an emerging technique of securing the open communications environment against eavesdropping attacks at the physical layer. We also introduce the family of various jamming attacks and their counter-measures, including the constant jammer, intermittent jammer, reactive jammer, adaptive jammer and intelligent jammer. Additionally, we discuss the integration of physical-layer security into existing authentication and cryptography mechanisms for further securing wireless networks. Finally, some technical challenges which remain unresolved at the time of writing are summarized and the future trends in wireless security are discussed.Comment: 36 pages. Accepted to Appear in Proceedings of the IEEE, 201
    • 

    corecore