Simulation of Performance Execution Procedure to Improve Seamless Vertical Handover in Heterogeneous Networks
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2014, Vol 5, Issue 6
Abstract
One challenge of wireless networks integration is the ubiquitous wireless access abilities which provide the seamless handover for any moving communication device between different types of technologies (3GPP and non-3GPP) such as Global System for Mobile Communication (GSM), Wireless Fidelity (Wi-Fi), Worldwide Interoperability for Microwave Access (WiMAX), Universal Mobile Telecommunications System (UMTS) and Long Term Evolution (LTE). This challenge is important as Mobile Users (MUs) are becoming increasingly demanding for services regardless of technological complexities associated with it. To fulfill these requirements for seamless Vertical Handover (VHO) two main interworking architectures have been proposed by European Telecommunication Standards Institute (ETSI) for integration between different types of technologies; namely, loose and tight coupling. On the other hand, Media Independent Handover IEEE 802.21 (MIH) is a framework which has been proposed by IEEE Group to provide seamless VHO between the aforementioned technologies by utilizing these interworking architectures to facilitate and complement their works. The paper presents the design and the simulation of a Mobile IPv4 (MIPv4) based procedure for loose coupling architecture with MIH to optimize performance in heterogeneous wireless networks. The simulation results show that the proposed procedure provides seamless VHO with minimal latency and zero packet loss ratio.
Authors and Affiliations
Omar Khattab
Automatic Approach for Word Sense Disambiguation Using Genetic Algorithms
Word sense disambiguation (WSD) is a significant field in computational linguistics as it is indispensable for many language understanding applications. Automatic processing of documents is made difficult because of the...
Framework for Digital Data Access Control from Internal Threat in the Public Sector
Information management is one of the main challenges in the public sector because the information is often exposed to threat risks, particularly internal ones. Information theft or misuse, which is attributed to human fa...
Protein Sequence Matching Using Parametric Spectral Estimate Scheme
Putative protein sequences decoded from the messenger ribonucleic acid (mRNA) sequences are composed of twenty amino acids with different physical-chemical properties, such as hydrophobicity and hydrophilicity (uncharged...
FPGA Implementation of Parallel Particle Swarm Optimization Algorithm and Compared with Genetic Algorithm
In this paper, a digital implementation of Particle Swarm Optimization algorithm (PSO) is developed for implementation on Field Programmable Gate Array (FPGA). PSO is a recent intelligent heuristic search method in which...
Transform Domain Fingerprint Identification Based on DTCWT
The physiological biometric characteristics are better compared to behavioral biometric identification of human beings to identify a person. In this paper, we propose Transform Domain Fingerprint Identification Bas...