Bandwidth allocation mechanisms in the next mobile generation: A practical Approach
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 6
Abstract
Abstract: This paper presents an algorithm for bandwidth management in integrated LTE network and WLAN. The proposed algorithm also suitable for multimedia network (image, telephone and videophone). A software tool is implemented to simulate the proposed algorithm it is basedon windows for randomdistribution numbers such as Poisson distribution functionfor traffic generation and uniform distribution for mobile location using MATLAB. The parameters taken in this proposed simulation model are: number of user, type of traffic, user class and user bandwidth. The results of the simulation indicate that the new algorithmincreases the bandwidth availability in the lower data rate network and this reduces the congestion in the high data network.
Authors and Affiliations
Sara Salman SelimanAlsafi , Ashraf Gasim Elsid Abdalla , AminBabiker A/Nabi Mustafa
Speech Recognition System – A Review
Abstract:Language is the most important means of communication and speech is its main medium. In human to machine interface, speech signal is transformed into analog and digital wave form which can be understood by machi...
A Survey Paper on Steganalysis F5 Algorithm
Steganography is a technique which used for securing the secret information from the illegal activity. Steganalysis is technique of finding the hidden text from the stego image. A Steganalysis based on the ...
Prevention and Detection of Wormhole Attack in Mobile Adhoc Network Using Clustering and RTT
Abstract: A security constraint in mobile adhoc network is very critical task. Some critical security issue such as black hole attack, wormhole attack, sinkhole attack, prevention and detection of attack is major challen...
A Exploratory Review on Soft Computing SegmentationTechniques
Abstract: Segmentation is a process to divides the images into its regions or objects that have similar featuresor characteristics. Segmentation has no single standard procedure and it is very difficult in non-trivial im...
A Review of DOS Attacks in Cloud Computing
Abstract: Cloud computing is an emerging trend in the field of IT providing scalable and flexible services to the end users on demand. Cloud offers services in three levels namely infrastructure, platform and software to...