8 research outputs found

    A Vertical Handover Algorithm in Integrated Macrocell Femtocell Networks

    Get PDF
    The explosion in wireless telecommunication technologies has lead to a huge increase in the number of mobile users. The greater dependency on the mobile devices has raised the user’s expectations to always remain best connected. In the process, the user is always desiring good signal strength even at certain black spots and indoors. Moreover, the exponential growth of the number of mobile devices has overloaded macrocells. Femtocells have emerged out as a good promising solution for complete coverage indoors and for offloading macrocell. Therefore, a new handover strategy between femtocells and macrocell is proposed in this paper. The proposed handover algorithm is mainly based on calculating equivalent received signal strength along with dynamic margin for performing handover. The simulation results of proposed algorithm are compared with the traditional algorithm. The proposed strategy shows improvement in two major performance parameters namely reduction in unnecessary handovers and Packet Loss Ratio. The quantitative analysis further shows 55.27% and 23.03% reduction in packet loss ratio and 61.85% and 36.78% reduction in unnecessary handovers at a speed of 120kmph and 30kmph respectively. Moreover, the proposed algorithm proves to be an efficient solution for both slow and fast moving vehicles

    Enhanced whale optimization based traffic forecasting for SDMN based traffic

    No full text
    In today’s scenario the number of mobile devices is increasing by leaps and bounds and hence the networks are highly congested. To use the existing networks efficiently, the insight into the amount of traffic beforehand, would be highly beneficial. Mobile traffic forecasting would enable Software Defined Mobile Network (SDMN) to use network resources and bandwidth effectively. Therefore, this paper aims to forecast mobile traffic for SDMN using nature-inspired​ optimization techniques. The data taken is captured using Wireshark. In order to accurately predict network traffic, this paper considers Least Square Support Vector Machine (LSSVM) function estimation based training model with Whale Optimization Algorithm (WOA). The proposed technique increases the probability of global search by optimizing kernel parameters namely, regularization and kernel width. The parameters: Mean Square Error (MSE), True Positive Rate (TPR), True Negative Rate (TNR),​ accuracy and precision are evaluated for the proposed optimization algorithm. The results of the proposed algorithm Least Square Support Vector Machine-Enhanced Whale Optimization Algorithm (LSSVM-EWOA) for traffic forecasting are compared with Least Square Support Vector Machine-Whale Optimization Algorithm (LSSVM-WOA). The accuracy of prediction of the proposed model is 98.10%, which confirmed the effectiveness and the actual use of the proposed model

    Anita & Nupur Prakash Performance Analysis of Mobile Security Protocols: Encryption and Authentication

    No full text
    Due to extremely high demand of mobile phones among people, over the years there has been a great demand for the support of various applications and security services. 2G and 3G provide two levels of security through: encryption and authentication. This paper presents performance analysis and comparison between the algorithms in terms of time complexity. The parameters considered for comparison are processing power and input size. Security features may have adverse effect on quality of services offered to the end users and the system capacity. The computational cost overhead that the security protocols and algorithms impose on lightweight end users devices is analyzed. The results of analysis reveal the effect of authentication and encryption algorithms of 2G and 3G on system performance defined in terms of throughput which will further help in quantifying the overhead caused due to security

    Movement Models Based Performance Comparison of Routing Protocols in Delay Tolerant Networks

    No full text
    ABSTRACT: Delay-tolerant networks have the great potential to connecting devices and regions of the world that are being presently under-served by current networks
    corecore