Implementation of Soft Handover in IEEE 802.16e
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2013, Vol 2, Issue 8
Abstract
The demand for high data rates is increasing day by day, so to fulfill this requirement a new technology is introduced named WiMAX IEEE 802.16e standard. IEEE 802.16e standard is the enhanced version of IEEE 802.16 standard. WiMAX is based on Wireless Metropolitan Area Networking (WMAN) standards developed by the IEEE 802.16 group. WIMAX enables the delivery of broadband wireless services anytime, anywhere. In this paper we are discussing about different handover schemes and generating performance parameters mainly throughput, end to end delay, packet delivery fraction for Soft handover and Hard handover using network simulator NS-2. Index Terms— WiMAX IEEE 802.16e, QOS, hard handover, soft handover, throughput, end to end delay, packet delivery fraction.
Authors and Affiliations
Neeraj Kumar , Sukhraj Singh , Deepak Punetha
A Combined Approach to Part-of-Speech Tagging Using Features Extraction and Hidden Markov Model
Words are characterized by its features. In an inflectional language, category of a word can be express by its tense, aspect and modality (TAM). Extracting features from an inflected word, one can categorised it wi...
Rule Based Technique detecting Security attack for Wireless Sensor network using fuzzy logic
This paper represents the rule based technique which helps to detect the security attack in the Wireless Sensor network .There are many type of security attack which effects on the wireless sensor network. To demonst...
Optimal Design RRC Pulse Shape Polyphase FIR Decimation Filter for Multi-Standard Wireless Transceivers
Pulse Shaping Filters or Root Raised Cosine (RRC) low pass filters emerges as one of the hottest topic in field of Wireless Communication technology. Low pass filters are used for decimation and for interpolation. When...
Routing Issues for Trust Based Framework in Mobile Ad Hoc Networks
The execution and survival of ad hoc networks depends on cooperative and trusting nature of the distributed nodes. There is a common assumption in the routing protocols that all nodes are trustworthy and cooperative....
Comparative Study of Two-way Finite Automata and Turing machine
Two-way finite Automata are termed as read only Turing machine. Two way finite automata is one of variant of Turing machine, which is blessed with an infinite tape, and could be used by tape head to read or write i...