21 research outputs found

    Common Radio Resource Management: Joint Call Admission Control And Traffic Offloading Method

    Get PDF
    The concept of Common Radio Resource Management (CRRM) has been proposed by 3GPP in order to efficiently manage the common pool of radio resources that are available for each of the existing radio access technologies in the heterogeneous wireless networks (HWNs). The main challenge of CRRM for HWNs is to search the best connection for the demanded services, enabling calls transference from one interface to another seamlessly and utilizing the availability of all radio resources. Thus, this thesis proposes a joint call admission control (JCAC) and traffic offloading algorithms in the CRRM for an integrated cellular and mobile network. The contributions of this work are threefold. First, a user mobility model in the wireless overlay network is proposed

    A calculation of WLAN dwell time model for wireless network selection

    Get PDF
    In an integrated wireless and mobile network, selecting a desired a network is an important issue. Parameters such as system load, service characteristics and user mobility are the main criteria in network selection strategy. In this paper, we devise a mobility estimation method for a Mobile Node (MN) during initial network selection and Vertical Handover (VHO). The method relies on a new prediction dwelling time and the Call Holding Time (CHT) of a user. By comparing the predicted dwelling time with the CHT, a MN is able to make decision which network is suitable to be used in order to minimize the VHO. The proposed theoretical model has been validated by the MonteCarlo experiments. The simulation results demonstrate the validity of the proposed method

    Replica maintenance strategy for data grid

    Get PDF
    Data Grid is an infrastructure that manages huge amount of data files, and provides intensive computational resources across geographically distributed collaboration.Increasing the performance of such system can be achieved by improving the overall resource usage, which includes network and storage resources.Improving network resource usage is achieved by good utilization of network bandwidth that is considered as an important factor affecting job execution time.Meanwhile, improving storage resource usage is achieved by good utilization of storage space usage. Data replication is one of the methods used to improve the performance of data access in distributed systems by replicating multiple copies of data files in the distributed sites.Having distributed the replicas to various locations, they need to be monitored.As a result of dynamic changes in the data grid environment, some of the replicas need to be relocated.In this paper we proposed a maintenance replica placement strategy termed as Unwanted Replica Deletion Strategy (URDS) as a part of Replica maintenance service.The main purpose of the proposed strategy is to find the placement of unwanted replicas to be deleted.OptorSim is used to evaluate the performance of the proposed strategy. The simulation results show that URDS requires less execution time and consumes less network usage and has a best utilization of storage space usage compared to existing approaches

    Analysis of internet traffic in educational network based on users' preferences

    Get PDF
    The demand for Internet services and network resources in Educational networks are increasing rapidly.Specifically, the revolution of web 2.0 "also referred to as the Read-Write Web" has changed the way of information exchange and distribution. Although web 2.0 has gained attraction in all sectors of the education industry, but it results in high-traffic loads on networks which often leads to the Internet users" dissatisfaction.Therefore, analyzing Internet traffic becomes an urgent need to provide high-quality service, monitoring bandwidth usage.In this study, we focus on analyzing the Internet traffic in Universiti Utara Malaysia (UUM) main campus. We performed measurement analysis form the application level characteristics based on users' preferences.A total of three methodological steps are carried out to meet the objective of this study namely data collection, data analysis and data presentation.The finding shows that social networks are the most web applications visited in UUM.These findings lead to facilitate the enhancement of Educational network performance and Internet bandwidth strategies

    A Calculation of WLAN Dwell Time Model for Wireless Network Selection

    Get PDF
    In an integrated wireless and mobile network, selecting a desired a network is an important issue. Parameters such as system load, service characteristics and user mobility are the main criteria in network selection strategy. In this paper, we devise a mobility estimation method for a Mobile Node (MN) during initial network selection and Vertical Handover (VHO). The method relies on a new prediction dwelling time and the Call Holding Time (CHT) of a user. By comparing the predicted dwelling time with the CHT, a MN is able to make decision which network is suitable to be used in order to minimize the VHO. The proposed theoretical model has been validated by the MonteCarlo experiments. The simulation results demonstrate the validity of the proposed method

    An interaction between SCTP and on demand MANET routing protocols

    Get PDF
    Mobile Ad hoc Network (MANET) is a wireless network of mobile nodes that has no fixed routers.In MANET, mobile nodes can communicate via the wireless interface while nodes are moving freely without using the network infrastructure.Nowadays the performance of a new existence Internet protocol technology, that is Stream Control Transportation Protocol ( SCTP) in a MANET Routing Protocol still unknown.The general objective of this research is to analyze and make the comparative performance of SCTP with Ad-hoc On-demand Distance Vector (AODV) and Dynamic Source Routing protocol (DSR) using Network Simulator (NS-2).Specifically, this research is to measure the behavior of SCTP in terms of throughput and smoothness and; to determine routing protocol in Mobile Ad-hoc Network (MANET) either it has significant effect in SCTP.This research used Network Simulator 2 (NS-2), type of the traffic is Constant Bit Rate ( CBR) and packet size is 1000.The data sent consists of five speeds at 5 m/s, 10 m/s, 15 m/s, 20 m/s, 25 m/s, and then these speeds are used in AODV and DSR simulation.The result, of our study suggested that the SCTP throughput over AODV is higher than DSR and the smoothness of SCTP over DSR was higher than AODV for the five types of speed.In addition, there was no significant impact on throughput between AODV and DSR as the percentage difference was small (i.e., 0 to 2.4%).Furthermore, the speed of node movement does not significant affect the smoothness

    An interaction between congestion-control based transport protocols and MANET routing protocols

    Get PDF
    Problem statement: Although many efforts have been done on studying the behaviour of TCP in MANET, but the behaviour of TFRC remain unclear in MANET. The purpose of this research is two folds.First, we studied the behaviour of TFRC and TCP over AODV and DSR as the underlying routing protocols in terms of throughput, delay and jitter.The second objective was to identify whether MANET routing protocols have an impact on transport protocols or not.Approach: Network Simulator 2 (NS-2) was used to conduct all of the experiments, i.e., TFRC over AODV, TFRC over DSR, TCP over AODV and TCP over DSR.We created 30 nodes on a 1000×1000 m location area and each node was assigned CBR traffic, transport protocol and routing protocol.In order to simulate the nodes mobility, we implemented a Random Waypoint mobility model with varying speeds of 5, 10, 15 and 20 m sec−1 (m/sec) with a 10 sec pause time.Results: We observed that TFRC throughput increases almost 55% when using DSR as its routing protocol, but TCP throughput has no significant difference with different underlying protocols.However, in terms of jitter and delay, both routing protocols, i.e., AODV and DSR have the impact of more than 50% on TFRC and TCP. Conclusion/Recommendations: The results obtained also show us that TFRC or TCP should choose AODV as its routing protocol because it has less jitter which is one of the critical performance metrics for multimedia applications

    Improving vehicular ad hoc networks (VANET) communication performance by using time gap following distance (TGFD) model

    Get PDF
    Today, there is a growing research study of IEEE 802.11p as one of option to help the drivers to travel more safely.Message dissemination protocols are primordial for safety vehicular applications. Periodic safety message (PSM) and Warning safety message (WSM) are two types of safety messages which may be exchanged between vehicles. In this paper we investigate the feasibility of deploying safety applications based on periodic message dissemination through simulation study with safety requirements as our priority concern.Vehicles are supposed to issue these messages constantly to inform their neighboring vehicles about their current status and use received messages for preventing possible unsafe situations on time. As reliability is the main concern in periodic message dissemination, a new metric called TGFD (Time Gap Following Distance) is defined which gives us more accurate benchmark for evaluating QoS in safety applications specifically.Thus, in order to improve the performance, the effective transmission TGFD studied

    Driver Drowsiness Detection and Monitoring System (DDDMS)

    Get PDF
    —The purpose of this paper is to develop a driver drowsiness and monitoring system that could act as an assistant to the driver during the driving process. The system is aimed at reducing fatal crashes caused by driver’s drowsiness and distraction. For drowsiness, the system operates by analysing eye blinks and yawn frequency of the driver while for distraction, the system works based on the head pose estimation and eye tracking. The alarm will be triggered if any of these conditions occur. Main part of the implementation of this system will be using python with computer vision, while Raspberry Pi, which is uniquely designed, for the hardware platform and the speaker for alarming. In short, this driver drowsiness monitoring system can always monitor drivers so as to avoid accidents in real time
    corecore