Techniques for Reduction of HandoverInterruption in Mobile Networks
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 3
Abstract
Handoff is the procedure providing the connection to the backbone network while a mobileterminal is moving across the boundaries of coverage of two wireless points of connection.The handover management procedure is defined by a sequence of management messages exchanged between the mobile stations and serving base station. An individual set of messages is utilized for each of the handover stages. As the messages are exchanged consequently, a short interval during which the mobile station cannot receive and/or transmit data occurs inthe case of the hard handover. This interval is called handover interruption or handoverdelay. This paper discusses about the evaluation of the handover interruptionduration. As no data transmission is enabled during the handover, a quality of serviceprovided to users is temporarily impaired. It leads to a dissatisfaction of users withconnection. The impact of handover interruption duration on the quality of service isalso investigated in this paper in the form of voice over IP communication qualityassessment.Moreover, in thispaper a novel procedure is analyzed not only from the handover interruption point of view, however its impact on a management overhead and user's throughput are also discussed
Authors and Affiliations
Shivi Saxena , S. Qamar
Enhanced cAntMinerPB Algorithm for Induction of Classification Rules using Ant Colony Approach
Abstract : Mining classification rules from data is a key mission of data mining and is getting great attention in recent years. Rule induction is a method used in data mining where the desired output is a set of R...
Detecting Anomaly IDS in Network using Bayesian Network
In a hostile area of network, it is a severe challenge to protect sink, developing flexible and adaptive security oriented approaches against malicious activities. Intrusion detection is the act of detecting, mon...
Performance Evaluation of Voice and video conferencing For WIMAX Network under Various Modulation techniques
Abstract: Worldwide interoperability for Microwave Access (WIMAX) that based on 802.16d/e Orthogonal Frequency Division Multiplexing (OFDM) and based on adaptive Physical Layer (PHY), It provides wireless broadband to fi...
Prevention of Selective Jamming Attacks by Using Packet Hiding Methods
The open nature of the wireless medium leaves it too weak to intentional interference attacks, typically defined as jamming. This intentional interference with wireless transmissions can be used as a launch &nbs...
Performance Evaluation and QoS Analysis of EEPB and PDCH Routing Protocols in Wireless Sensor Networks
Abstract : EEPB (Energy-Efficient PEGASIS-Based protocol) is a chain-based protocol. It has certain deficiencies such as it ignores the nodes energy and distance between nodes to BS when selecting the leader. It causes o...