8 research outputs found

    A Vertical Handover Algorithm in Integrated Macrocell Femtocell Networks

    Get PDF
    The explosion in wireless telecommunication technologies has lead to a huge increase in the number of mobile users. The greater dependency on the mobile devices has raised the user’s expectations to always remain best connected. In the process, the user is always desiring good signal strength even at certain black spots and indoors. Moreover, the exponential growth of the number of mobile devices has overloaded macrocells. Femtocells have emerged out as a good promising solution for complete coverage indoors and for offloading macrocell. Therefore, a new handover strategy between femtocells and macrocell is proposed in this paper. The proposed handover algorithm is mainly based on calculating equivalent received signal strength along with dynamic margin for performing handover. The simulation results of proposed algorithm are compared with the traditional algorithm. The proposed strategy shows improvement in two major performance parameters namely reduction in unnecessary handovers and Packet Loss Ratio. The quantitative analysis further shows 55.27% and 23.03% reduction in packet loss ratio and 61.85% and 36.78% reduction in unnecessary handovers at a speed of 120kmph and 30kmph respectively. Moreover, the proposed algorithm proves to be an efficient solution for both slow and fast moving vehicles

    Performance Analysis of Intersection Based Algorithm in VANET with Traffic Light Considerations

    Get PDF
    ABSTRACT: Vehicular Ad hoc Networks is an emerging technology. In Vehicular safety algorithm, the source vehicle that detects an accident can generate a warning message and propagate it to the succeeding vehicles to notify drivers before they reach to the potential danger zone on the road. The main application of VANET is in Intelligent Transportation System providing various applications such safety and non-safety related services. VANET is subclass of Mobile Ad hoc Network. Dynamic topology change and high speeds of nodes creates a distinction from MANET. In this paper we discuss the impact of traffic light employed at intersections on the routing process. This paper proposes an effective and reliable routing protocol that takes traffic lights into consideration. KEYWORDS: ITS, GPSR, MANET, V2I, V2V, VANET I . INTRODUCTION During the last few years vehicular communication is attracting growing attention from both academic and industrial point of view. This is because of its applications ranging from road safety to traffic control and up to infotainment. Vehicular ad-hoc networks (VANETs) are self organized networks built up from moving vehicles. VANETs are instantiation of Mobile Ad-hoc Networks (MANETs). As in MANETs, packet forwarding in VANET takes place through multi hop relaying. But certain features distinguish VANETs from MANETs. These include high mobility of nodes, frequent network partition, constraints on roadways, etc. These characteristics pose technical challenges to implement high performance Vehicular networks. Possible applications [1-2] can be generally classified as safety and non safety applications. Safety applications include cooperative driving, accident avoidance etc. Non-safety applications include traffic information, toll service, internet access, games, entertainment etc. Success of VANET applications depends on how data is routed between nodes. The history of VANET routing protocols starts with MANET routing protocols such as Ad-hoc On Demand Distance Vector routing (AODV) Designing a routing protocol for urban environment is quite challenging task since the traffic lights deployed at intersections divide the road in to different segments. The nodes move at constrained speeds through these segments. In such an environment intersection based routing protocols are highly reliable. In intersection based routing, when vehicles move on straight road, they forward by greedy forwarding. When they reach an intersection a decision is made whether to forward in same direction or to perpendicular direction. Many intersection based routing protocols have been proposed to carry efficient routing in VANET. But only few protocols consider traffic lights. The communication in the VANET appears in such forms i.e. Intra-Vehicle (InV), Vehicle-to-Vehicle (V2V), and Vehicle-to-Infrastructure (V2I) communications [5]. This communication takes place with the help of communicatio

    Enhanced whale optimization based traffic forecasting for SDMN based traffic

    No full text
    In today’s scenario the number of mobile devices is increasing by leaps and bounds and hence the networks are highly congested. To use the existing networks efficiently, the insight into the amount of traffic beforehand, would be highly beneficial. Mobile traffic forecasting would enable Software Defined Mobile Network (SDMN) to use network resources and bandwidth effectively. Therefore, this paper aims to forecast mobile traffic for SDMN using nature-inspired​ optimization techniques. The data taken is captured using Wireshark. In order to accurately predict network traffic, this paper considers Least Square Support Vector Machine (LSSVM) function estimation based training model with Whale Optimization Algorithm (WOA). The proposed technique increases the probability of global search by optimizing kernel parameters namely, regularization and kernel width. The parameters: Mean Square Error (MSE), True Positive Rate (TPR), True Negative Rate (TNR),​ accuracy and precision are evaluated for the proposed optimization algorithm. The results of the proposed algorithm Least Square Support Vector Machine-Enhanced Whale Optimization Algorithm (LSSVM-EWOA) for traffic forecasting are compared with Least Square Support Vector Machine-Whale Optimization Algorithm (LSSVM-WOA). The accuracy of prediction of the proposed model is 98.10%, which confirmed the effectiveness and the actual use of the proposed model

    Anita & Nupur Prakash Performance Analysis of Mobile Security Protocols: Encryption and Authentication

    No full text
    Due to extremely high demand of mobile phones among people, over the years there has been a great demand for the support of various applications and security services. 2G and 3G provide two levels of security through: encryption and authentication. This paper presents performance analysis and comparison between the algorithms in terms of time complexity. The parameters considered for comparison are processing power and input size. Security features may have adverse effect on quality of services offered to the end users and the system capacity. The computational cost overhead that the security protocols and algorithms impose on lightweight end users devices is analyzed. The results of analysis reveal the effect of authentication and encryption algorithms of 2G and 3G on system performance defined in terms of throughput which will further help in quantifying the overhead caused due to security

    Movement Models Based Performance Comparison of Routing Protocols in Delay Tolerant Networks

    No full text
    ABSTRACT: Delay-tolerant networks have the great potential to connecting devices and regions of the world that are being presently under-served by current networks
    corecore