Power Control Technique for Efficient Call Admission Control in Advanced Wirless Networks
Journal Title: International Journal on Computer Science and Engineering - Year 2012, Vol 4, Issue 6
Abstract
In 4G networks, call admission control techniques have been proposed to provide Quality of Service (QoS) in a network by restricting the access to network resources. Power control is essential in call admission control in order to provide fair access to all users, improve battery lifetime and system performance. But the existing call admission control algorithms rarely consider the power controlling techniques in the handoff process for different traffic classes. In this paper, we propose to develop a power controlled call admission control scheme for handoff in the advanced wireless networks. The incoming call measures the initial interference on it and then the base station starts transmitting the packets to the new call. The new call is rejected when the interference reaches a threshold value. Whenever an existing call meets the power constraint, the transmit power is decremented based on the traffic class and incoming call obtains this information by monitoring the interference received on it. The convergence of the power control algorithm is checked and the power levels of all incoming calls are adjusted. From our simulation results we prove that this power control technique provides efficient handoff in the 4G networks by increasing the throughput and reducing the delay of the existing users.
Authors and Affiliations
Ch. Sreenivasa Rao , Dr. K. Chenna Keshava Reddy , Dr. D. Srinivasa Rao
CIRS: A State-Conscious Concurrency Control Protocol for Replicated Real-Time Databases
Replication [5] is the technique of using multiple copies of a server or a resource for better availability and erformance.Each copy is called a replica. The main goal of replication is to improve availability, since a...
A Secured and Improved Dynamic ID based Remote User Authentication Scheme using Smart Card and Hash Function for Distributed Systems
Authentication is a major concern for accessing remote service residing over on server in an distributed systems. It is difficult to remember different identities and passwords for users. In order to solve the flaws enco...
Trust Based Decision Making System on MANET
Ad hoc networks are new model of networks offering unrestricted mobility without any underlying infrastructure. Mobile ad hoc are gaining popularity because of availability of low cost mobile devices and its ability to p...
An Index Based Skip Search Multiple Pattern Matching Algorithm
DNA Pattern matching, the problem of finding sub sequences within a long DNA sequence has many applications in computational biology. As the sequences can be long, matching can be an expensive operation, especially as ap...
Color and Texture Based Identification and Classification of food Grains using different Color Models and Haralick features
This paper presents the study on identification and classification of food grains using different color models such as L*a*b, HSV, HSI and YCbCr by combining color and texture features without performing preprocessing. T...