unknown

Performance evaluation of user mobility on QoS classes in a 3G network

Abstract

The popularity of IP services is increasing and the demand for managing traffic with different QoS classes has become more challenging. The stability of the system is affected by the rate of voice traffic. Mobility allows users to be connected at all time where handover may occur as it is not always possible to be connected to the same base station. Mobility and handover cause severe interference, which affects overall throughput and capacity of the system. The system requires greater capacity with more coverage area. This study deals with the impact of user mobility on voice quality in IP based application in a 3G Network. The aim is to improve the system performance in mixed traffic environment. A mathematical model is used to analyse the impact of using different type of coder on packet end-to-end delay and packet loss. The simulation results indicate that types of coder affect the system performance. Application of scheduling based on weight and load balancing technique can improve the system performance. The deployment of scheduling based on weight and a load balancing technique have been investigated to reduce the end-to-end delay and to improve overall performance in mixed traffic environment. The results under different conditions are analysed and it is found that by applying scheduling scheme, the quality of voice communication can be improved. In addition, load balancing technique can be used to improve the performance of the system. Apart from the decrease in delay, the technique can increase the capacity of the system and the overall stability of the system can be further improved. Finally, network security is another important aspect of network administration. Security policies have to be defined and implemented so that critical sections of the network are protected against unwarranted traffic or unauthorized personnel. The impact of implementing IPSec has been tested for voice communication over IP in a 3G network. Implementing the security protocol does not significantly degrade the performance of the system.EThOS - Electronic Theses Online ServiceGBUnited Kingdo

    Similar works