A Novel Approach to Implement Fixed to Mobile Convergence in Mobile Adhoc Networks
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2011, Vol 2, Issue 1
Abstract
Fixed to Mobile Convergence, FMC is one of the most celebrated applications of wireless networks, where a telephonic call from some fixed telephonic infrastructure is forwarded to a mobile device. Problem of extending the reach of fixed telephony over a mobile ad-hoc network working in license free ISM band has been eluding the research fraternity. Major hindrance to FMC implementation comes from very nature of mobile ad-hoc networks. Due to the dynamic nature and limited node range in mobile ad-hoc networks, it is very difficult to realize QoS dependent applications, like FMC, over them. In this work authors are proposing complete system architecture to implement fixed to mobile convergence in a mobile ad-hoc network. The mobile ad-hoc network in the problem can hold a number of telephonic calls simultaneously. The proposed system is then implemented using network simulator, ns2. The results obtained are then compared with the predefined standards for implementation of FMC.
Authors and Affiliations
Dr. P. K. Suri, Sandeep Maan
Global Citation Impact rather than Citation Count
The progressing bloom in the tome of scientific literature available today debars researchers from efficiently shrewd the relevant from irrelevant content. Researchers are persistently engrossed in impactful papers, auth...
Virtual Identity Approaches Evaluation for Anonymous Communication in Cloud Environments
Since the era’s of Cloud computing beginning, the Identity Management is considered as a permanent challenge especially for the hybrid IT environments that permit for many users’ applications to share the same data cente...
Devising a Secure Architecture of Internet of Everything (IoE) to Avoid the Data Exploitation in Cross Culture Communications
The communication infrastructure among various interconnected devices has revolutionized the process of collecting and sharing information. This evolutionary paradigm of collecting, storing and analyzing data streams is...
HIDING AN IMAGE INSIDE ANOTHER IMAGE USING VARIABLE-RATE STEGANOGRAPHY
A new algorithm is presented for hiding a secret image in the least significant bits of a cover image. The images used may be color or grayscale images. The number of bits used for hiding changes according to pixel neigh...
Stable Beneficial Group Activity Formation
Computational models are one of the very powerful tools for expressing everyday situations that are derived from human interactions. In this paper, an investigation of the problem of forming beneficial groups based on th...