Reduction of Error in Handoff Initiation Time Calculation for Next-Generation Wireless Systems
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 6
Abstract
Recent research in wireless communications technologies has focused to the development of Next-generation wireless ystems (NGWS) which integrate various existing wireless networks technologies, each of which is optimized for some specific services such as WLANs, WiMAX, General Packet Radio Service (GPRS) and Universal Mobile elecommunications System (UMTS). The most important and challenging issue is to realize seamless handoffs with small handoff latency and packet loss to ensure the Quality of Service (QoS) in NGWS. In this paper, we propose a handoff anagement architecture using relative signal strength of the present and neighboring base stations to calculate the handoff initiation time. To take the right decision of handoff initiation time we use mobile’s speed, handoff signaling delay information and also the size of the present and neighboring cell and reduce the errors associated with them. The performance analysis shows that the approach ensures uccessful handoff and reduces call blocking probability.
Authors and Affiliations
Debabrata Sarddar , Arnab Raha , Tapas Jana , Shovan Maity , Utpal Biswas , M. K. Naskar
Mobile Wireless Enhanced Routing Protocol in Adhoc Networks
Adhoc network consists of peer-to-peer communicating nodes that are highly mobile. As such, an ad-hoc network lacks nfrastructure and the topology of the network changes ynamically. The task of routing data from a source...
The Trust-Based MAC-Layer Security Protocol for Mobile Ad hoc Networks
In this paper, we develop a trust based security protocol based on a MAC-layer approach which attains confidentiality and authentication of packets in both routing and link layers of MANETs. In the first phase of the pro...
Semantic Inference Model For DatabaseInference Detection Violation
Database Security has become a major problem in modern day’s applications. Generally for Information security everybody tries to protect sensitive data by using different security techniques. Despite these security measu...
Optimal Feed Forward MLPArchitecture for Off-Line Cursive Numeral Recognition
The purpose of this work is to analyze the performance of back-propagation feed-forward algorithm using various different activation functions for the neurons of hidden and output layer and varying the number of neurons...
An Useful Information Extraction using Image Mining Techniques from Remotely Sensed Image (RSI)
Information extraction using mining techniques from remote sensing image (RSI) is rapidly gaining attention among researchers and decision makers because of its potential in application oriented studies. Knowledge disco...