LTE Techniques in 4G Wireless System Using Protocol Stack
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 4
Abstract
LTE, an acronym for Long-Term Evolution. 4G LTE is a standard for wireless broadband technology designed to support roaming Internet access via cell phones and handheld devices. Due to the requirements on high data rate and low latency for broadband wireless communication systems, LTE air-interface protocol stacks to be designed and implemented with high data processing efficiency. LTE user equipment (UE), this paper analyzes the main challenges in the link-layer protocol stack design and application, including the data handling efficiency, synchronic, flexibility and portability. Authentication service is one of the most essential services in LTE networks. A memory access optimization and lightweighted thread model are proposed to improve the data processing efficiency. QoS Proposal to overcome such as channel capacity, latency, delay, Jitter, Packet loss, large RTTs. Voice over LTE is a methodology and group of technologies for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet. VoIP support the necessary protocols and features required for VoIP streaming including the implementation of Real Time Protocol (RTP) and an IP stack. In this paper, we survey and compare LTE security for Mobile Access Border security (RAN-to-EPC/S1), Internet Border security (EPC-to-Internet/SGi) and Partner Border security (EPC-to-EPC / S8).
Authors and Affiliations
E. Thirumalai Nambi, M. Rajeev Kumar
Survey of Data Mining Tools and Techniques for Customer Relationship Management (CRM)
The domain of Customer Relationship Management (CRM) has been gaining significance in various business management processes. CRM includes all the series of action that an organization uses to create and establish good...
A Novel Semi-Blind Watermark Extraction Algorithm
in this paper, a novel algorithm for semi-blind watermark extraction is proposed. Though watermark embedding is done using a non-blind watermarking scheme, the detection method proposed extracts the watermark without th...
Efficient Video Watermarking Scheme for Secure Transmission
Here we proposed an efficient video watermarking technique for secure transmission is presented. We use discrete wavelet transform for this watermarking process. Here the input video sequence is segmented and partitione...
Relation Between Nature, Time Travel Man & Future Computer
Every - thing is possible in this universe, as we know that energy / atom can neither be created nor destroy & energy can be transfer from one form to another form. So, on the basis of this theory – i will try to search...
Eccentrically Loaded Strip Footing on Oil Contaminated Kanhan Sand
Onshore and offshore oil spills contaminate soil. In addition to environmental concerns for ground water pollution and other possible effects, the geotechnical properties of the contaminated soil such as the shear stren...