Performance Measurement Model of Mobile User Connectivity in Femtocell/Macrocell Networks using Fractional Frequency Re-use Scheme
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2018, Vol 9, Issue 5
Abstract
Technologies are traversing to its new dimensions every day. As part of this progression, mobile cellular system is at the summit of its constant advancement. The usage of Femtocells in mobile cellular system has created a massive impact on its architecture. Likewise, the incorporation of femtocells in macrocells for 4G mobile network communication services (like-voice calls, data services, etc.) among mobile stations within few meters has been one of the promising approaches. There is a femto access point (FAP) in Femtocell which handles the authorization of the user around it. Among the three various access methods, FAP allows only the authorized users except the macro cell users in Closed Access Method (CAM). But for Open Access Method (OAM), any type of crossing macrocell user within the radio coverage of femtocell and the femtocell users can get FAP access. To reduce the cross-tier interferences OAM is more efficient, because it deals with both type of users within the femtocell coverage. This paper proposes a performance measurement model for mobile connection probability depending on the mobility factor of mobile users and the communication range in femtocell/ macrocell networks. Furthermore, a derivation has been done to get the optimum result from the outage and connectivity probability under different number of femtocells and mobile users. Finally, to maximum the spectral efficiency for the probable frequency allocation, a Fractional Frequency Re-use scheme among the networks has been proposed.
Authors and Affiliations
Mehrin Anannya, Riad Mashrub Shourov
Evaluating M-Learning in Saudi Arabia Universities using Concerns-Based Adoption Model Level of use Framework
Numerous studies have evaluated aspects of m-learning use in Saudi Arabia, mostly focused on technology use and its impact on students, or technology challenges and promises. Few studies have explored features of m-learn...
Creating a Complete Model of an Intrusion Detection System effective on the LAN
the Intrusion Detection Systems (IDS) are now an essential component in the structure of network security. The logs of connections and network activity, with a large amount of information, can be used to detect int...
MMO: Multiply-Minus-One Rule for Detecting & Ranking Positive and Negative Opinion
Hit and hot issue about reviews of any product is sentiment classification. Not only manufacturing company of the reviewed product takes decision about its quality, but the customers’ purchase of the product is also base...
Artificial Potential Field Algorithm Implementation for Quadrotor Path Planning
Potential field algorithm introduced by Khatib is well-known in path planning for robots. The algorithm is very simple yet provides real-time path planning and effective to avoid robot’s collision with obstacles. The pur...
Towards Evaluating Web Spam Threats and Countermeasures
Web spam is a deceiving technique that aims to get high ranks for the retrieved web pages at the top Search Engine Result Pages (SERPs). This paper provides an evaluation for the web spam threats and countermeasures. It...