A New Vertical Handoff Scheme for UMTS-WLAN Integrated Network

Size: px
Start display at page:

Download "A New Vertical Handoff Scheme for UMTS-WLAN Integrated Network"

Transcription

1 A New Vertical Handoff Schee for UMTS-WLAN Integrated Network Mehrdad Manaffar 1, Haidreza Bakhshi 2 1,2 Telecounication Departent, Engineering Faculty, Shahed University, Tehran, Iran. Eail: 1 Manaffar@shahed.ac.ir, 2 Bakhshi@shahed.ac.ir Abstract Designing of heterogeneous Networks involves several interworking issues, such as sealess handoff or roaing, obility anageent, security and charging probles. Aong these interworking ites, the issue of sealess handoff is of great iportance for guaranteeing service continuity and Quality of Service. In this paper, we propose a sealess handoff schee with iniu handoff delay and low packet loss during UMTS WLAN handoff. The proposed handoff schee separates Layer 2 and Layer 3 handoff processes with help of a new defined signaling essage between obile nodes, called WLAN/UMTS Zone Identification Message and perfors pre-registration and preauthentication processes before entering the coverage area of the new Network and before perforing layer 2 trigger. Key Words-- Interworking, Mobile IP, UMTS, Vertical handoff, WLAN, Interworking. I. INTRODUTION A nuber of wireless network systes have been proposed and deployed during the past few years. It is believed that ultiple standards will coexist in the sae environent for the future wireless counication syste. Providing sealess roaing between heterogeneous networks becoes ore and ore iportant in the future obile counication syste. A ultiode UMTS/WLAN terinal can access high bandwidth data services where WLAN coverage is offered, while accessing wide area networks using UMTS at other places. However, this approach alone will only allow liited ulti-access functionality. To ake the ulti-access solutions effective, several interworking issues, such as dual ode support of obile, sealess handoff or roaing, obility anageent, security and charging probles ust be considered. Aong these interworking ites, the issue of sealess handoff is of great iportance for guaranteeing service continuity and Quality of Service (QoS. Therefore, in this paper, we survey current standard techniques for Mobile IP based sealess handoff, and propose an efficient sealess handoff procedure that supports iniu handoff delay and low packet loss in the proposed architecture. With help of a new defined signaling essage between obile nodes, the proposed handoff schee perfors preregistration and pre-authentication processes before perforing Layer 2 trigger. Moreover, it uses packet buffering and forwarding functions in order to reduce packet loss during the handoff period. On the above basis, detailed signaling procedures are presented, together with syste requireents when a obile terinal oves fro UMTS to WLAN and vice-versa. Quality of Service etrics that was used to evaluate the perforance of the proposed handoff schee are Average handoff delay, Packet loss and total Signaling costs and these etrics calculated by an analytical ethod. Nuerical results show that the proposed schee perfors well with respect to handoff delay, and packet loss copared with conventional schees and signaling cost still reains in an acceptable value. This paper is organized as follows. In Section 2, a survey on Mobile IP based vertical handoff schees will be presented. In Section 3, we provide requireents details of the proposed handoff procedure together with UMTS WLAN interworking architecture and syste requireents. In Section 4, overall handoff procedure fro UMTS to WLAN and vice versa will be discussed in details. In Section 5, we will try to calculate the Quality of Service paraeters and ake perforance coparisons between proposed handoff schee and other conventional schees and provide nuerical results and finally in section 6 a conclusion will be presented. II. PREVIOUS WORKS MIP is the ost widely known obility anageent proposal and is the ost coon solution for offering sealess roaing to obile devices on the Internet [7]. Its basic operation is consisted of advertiseent, oveent detection and registration, and packet delivery processes. MIP was originally designed to operate at the Layer 3 (L3 only, without regard to the underlying link layer (L2. This

2 approach iplies a clear separation between L2 and L3 handoff functionality but ay lead to unacceptable handoff latencies. Indeed, the essages generated by the registration process need soe tie to propagate through the network, and the obile node (MN is unable to send or receive packets during that tie [6]. For these reasons, the IETF s obile IP workgroup has proposed so-called low latency handoff schees, which are distinguished as Pre- Registration and Post- Registration handoff. In preregistration handoff, the network assists the MN in perforing an L3 handoff before the L2 handoff is copleted [3]. In post-registration handoff, the L3 registration occurs after the L2 handoff has been copleted. This technique uses a bidirectional edge tunnel (BET to support low latency and low packet loss during the change of the L2 attachent point of the MN [8]. Fig.1. Different UMTS-WLAN Interworking Architecture. III. PROPOSED HANDOFF SHEME Pre-registration and post-registration handoff schees are difficult to apply to the UMTS-WLAN interworking architecture currently under consideration because their operation was originally based on the MIP and they deal with only the registration procedure [3]. However, in the event of handoff between heterogeneous networks, both the registration process and the authentication process ust be included in the entire handoff procedure [9]. Therefore, we use a new handoff procedure taking into account actual handoff situations and network requireents in an integrated UMTS/WLAN network [10]. In this section, we describe the network architectures presented in [7] which is suitable for UMTS-WLAN interworking and explain in detail the operation of the proposed sealess handoff schee and handoff requireents. A. Interworking Architecture The considered network architecture for UMTS LAN interworking is based on interworking network odels of 3GPP standards docuents [2,7]. In [2], several necessary network entities are introduced for UMTS WLAN interworking and WLAN interworking reference odels are presented. After due consideration of the network architectures presented in current 3GPP standards, we were able to design the network architecture for the proposed sealess handoff schee, as shown in Fig. 1. B. WLAN/UMTS Zone Identification Message (ZIM The proposed handoff schee uses a prediction algorith to decide when to switch fro one access technology to the other. Fig.2. UMTS cell with a WLAN coverage area inside. To do this, all the obile nodes in a UMTS cell with coverage of one or ore WLAN networks inside, on a regular basis broadcast a specific signal, known as WLAN/UMTS Zone Identification Message (ZIM, to notify the other neighbor nodes, network type they are connected to. In ZIM signal, obile nodes inside WLAN coverage area e.g. MN2, broadcasts SSID of the WLAN service set which it is connected to, its own coordinates received fro GPS, WLAN access point s coordinates and the power of the received signal fro WLAN access point at their own coordinate and obile nodes inside the UMTS cell and outside the WLAN coverage area e.g. MN3, just broadcast the network type they are connected to which is UMTS network. As far as Accurate location deterination is alost ipossible without external location deterination systes and because of existence of the low cost GPS devices nowadays, we suppose that obile nodes will have an accurate GPS syste on their user equipent boards. In Fig. 2 a UMTS cell with a WLAN coverage area inside, is showed. As it can be seen sees a obile node (MN1 have a packet switched connection with UMTS network and in its trajectory inside the UMTS cell he/she is going to enter the WLAN coverage area. In all the conventional handoff schees proposed in section 2 of this paper, MN1 will wait until it enters the WLAN coverage area and the received signal strength fro WLAN access point reaches to the Receiving Threshold (Sensitivity of the MN1 s receiver

3 and then start to handoff the connection for UMTS to WLAN network to use the bandwidth and high data rate on WLAN network. In proposed handoff schee MN1, before entering the WLAN coverage area, will receive a ZIM signal fro one of the nodes inside WLAN area and will start to perfor the handoff procedure before the strength of received signal fro WLAN access point reaches to the MN1 s receiving threshold.. Handoff Decision Algorith In this section we are going to discuss about the propagation odel and received power of ZIM signal in different distances fro the node broadcasts it. There are three different propagation odels: free space odel, tworay ground reflection odel and the shadowing odel. These odels are used to predict the received signal power of each packet. In the free space odel, the world is assued to be flat and a direct path exists between the transitter and receiver. The receiving power P Rx depends only on the transitted power P Tx, the gain of the transit and receive antennas (G t,g r, the wavelength λ, the distance between both nodes d and a syste-wide loss coefficient L: P PTxGtGrλ = 2 16π d L Rx, Fx 2 2 The shadowing odel is an iproved version of the free space odel. It considers the existence of direct and indirect rays between the two nodes and it introduces a crossover distance d 0 after which the reflecting rays ay destructively interfere with the direct ray and drastically reduce the field strength. The power is coputed as: d PRx, SH [ db ] = PRx, FS [ db ] n log( N(0, σ (2 d 0 n is called the path-loss exponent and σ the shadow deviation. This odel also introduces a crossover distance d 0 after which the reflecting rays ay destructively interfere with the direct ray and drastically reduce the field strength. λ is the wavelength, G t and G r are the transitting and receiving antenna gain and L is the syste loss. Positioning ourselves in the worst of the cases we have chosen a value of 4 for n and a value of 7 for σ, as we are working inside buildings. When MN1 receives ZIM signal it calculates the exact direct distance between MN2 and WLAN access point (d using the coordinates of these two nodes received in ZIM signal. Then, MN1 calculates the border of the WLAN coverage area or in other words the radius (R of the WLAN coverage area. This is possible by using the equations (1 and (2 and also considering the MN1 s receiving sensitivity. In this radius fro WLAN access point, received signal fro WLAN access network will reach to the MN1 s (1 receiver s sensitivity. Once MN1 calculated the radius of WLAN coverage area and considering that MN1 knows the direct distance between itself and WLAN access point using the coordinates received fro GPS, it is going to calculate the exact tie it is going to pass the WLAN border. This value will be calculated regularly according to the GPS location update frequency and considering the MN1 s velocity at the oent. The calculated value will be copared with a specific threshold value (T threshold. If it is equal or less than Threshold, then the handover process will be initiated by MN1 otherwise the obile node will wait to reach to this threshold. This threshold value will help the obile node to choose the approxiately best tie to start the handoff process by considering its velocity and position. The threshold value itself could be deterined adaptively according to the WLAN and UMTS cell traffic. IV. HANDOFF PROEDURE A. Vertical Handoff fro UMTS to WLAN In this section we are going to propose a sealess Vertical handoff procedure that can iniize handoff latency and packet loss during UMTS WLAN handoff. The proposed handoff could be applicable to the considered UMTS WLAN interworking architecture without difficulty and guarantees service continuity and iniu handoff delay throughout the heterogeneous UMTS-WLAN networks. The proposed handoff schee perfors preregistration and pre-authentication processes with help of a new defined signaling essage between obile nodes, before perforing Layer 2 trigger. At the beginning, the MN1 counicates with the UMTS network. So, a packet transission route is fored between the HA and the MN1 through the UMTS network entities. Here, the HA anages the current oa (IP UMTS assigned by the UMTS FA according to the MN s hoe IP address (IP MN. Before the Mobile Node (MN1 in the UMTS syste enters the handoff region, it receives a WLAN Zone Identification Message (ZIM fro on of the obile nodes in the WLAN syste. WLAN obile node sends Service Set Identifier (SSID of the WLAN AP which the MN1 is going to enter. By receiving this essage MN knows that after a while it will enter the handoff region. So, it decides the acceptance or rejection of the handoff attept into the WLAN access network. After the handoff decision and before entering the handoff region MN1 request WLAN authentication by transitting the pre-authentication request essage to GGSN/FA and the GGSN/FA relays it to the PDG/FA of the WLAN. Here, the GGSN/FA is the current FA of the MN and the PDG/FA is the next agent to which the MN will ove. Because the GGSN/FA is assued to record PDG/FA addresses corresponding to the WLAN SSIDs that the MN1 receives, it can deliver the request essage to the

4 PDG/FA without error. This essage contains the MN authentication inforation that is required for standard WLAN authentication [2]. By receiving pre-authentication request essage, PDG/FA begins the standard Extensible Authentication Protocol/Authentication and Key Agreeent (EAP/AKA or Extensible Authentication Protocol/Subscriber Identity Module (EAP/SIM procedure for WLAN authentication aong the MN, PDG/FA and AAA server [2]. At this point, instead of the WLAN access network, the PDG/FA relays WLAN authentication essages between the MN1 and AAA server although the original WLAN authentication is perfored through the WLAN access network [19]. If pre-authentication is copleted successfully according to the standard authentication process, the EAP success is transitted to the WLAN access network with authentication keying aterial. This WLAN access network eorizes the received EAP success inforation that corresponds to the preauthenticated MN1, in order to use it after the obile node is attached to itself. The EAP success is also delivered to the MN via the pre-authentication reply essage. When the MN1 receives EAP success essage fro its GGSN/FA, it sends the PDG/FA a pre-registration request essage for obile IP (MIP registration. By receiving preregistration request essage in PDG/FA, a new oa (IP WLAN, which will be used in the WLAN, is assigned which can be either a foreign agent oa or co-located oa. Although a new oa (IP WLAN was assigned to the MN but incoing data packets are still send to the MN1 s old IP address on the UMTS network. Thereafter, the nfa sends the HA the pre-reg. update request essage, which includes the new assigned oa (IP WLAN together with the MN s hoe IP address (IP MN. If the HA receives the pre-reg. update request, it inserts the received oa into the next oa entity that corresponds to the MN1 s hoe IP address and then sends back the pre-reg. update reply essage toward PDG/FA. If the PDG/FA receives it, the preregistration reply essage is transitted to the MN1 through the GGSN/FA. This essage infors the MN1 of the copletion of pre-registration with the new assigned oa, IP WLAN. After the copletion of pre-registration phase, MN1, in its trajectory toward the WLAN coverage area, waits until it enters the WLAN coverage area and the power of the received signal fro the WLAN access point reaches to the sensitivity threshold of the MN1 s receiver equipents. At this point obile node sends a essage to the HA to substitute its current oa (IP UMTS with next oa (IP WLAN. By receiving this essage HA starts to buffer data packets sent to the MN s old IP Address on the UMTS syste. After this Mobile node disconnects fro the UMTS network by using the Layer 2 detachent process based on 3GPP standard [20]. Thereafter, it perfors the WLAN attachent process by using standard WLAN association procedures [9]. Naely, the L2 handoff is carried out fro UMTS to WLAN. Using previously received EAP access network, WLAN access network can confir that the new Mobile node is the pre-authenticated user. Therefore, the MN1 is able to counicate via the WLAN access network iediately, without a further WLAN authentication process [19]. After the MN becoes connected to the WLAN access network, it sends the handoff copletion essage to the HA and then HA ceases the packet buffering and forwards the data packets buffered up to this tie toward the obile node on it s new assigned IP address on the WLAN network. Now, the entire handoff procedures are copleted and the packet transission route is fored through the WLAN access network. In Fig. 3 and 4 the detailed handoff procedures of the proposed schee are presented. Fig. 3. Vertical handoff procedure fro UMTS to WLAN in proposed schee A. Vertical Handoff fro WLAN to UMTS In vertical handoff fro WLAN to UMTS, the obile node e.g. MN4, in its trajectory toward the outside of the WLAN coverage area receives a ZIM signal fro one of the nodes inside the UMTS cell e.g. MN3. By receiving this essage obile node understands that he/she is going to exit fro WLAN coverage area after a few seconds.

5 delay of a essage of size S sent fro node x to node y via wired and wireless links are presented respectively. S T w ( S, d x y = d x y ( Lw ( d x y 1 Pt (3 B S T wl ( S = ( Lwl B wl w (4 A. Signaling osts Total signaling cost ( VHO is the essage traffic exchanged between network nodes during handoff. Since the authentication and layer2 handoff phases are identical in all obile IP based vertical handoff schees, the only difference is in registration phase. If we show the signaling cost for registration updates during a session with reg, then reg for all handoff schees could be coputed as follows: Fig. 4. Vertical Handoff procedure fro WLAN to UMTS in proposed schee Then the obile node will wait until the power of the WLAN signal reaches to the receiving threshold of its receiver and then it will start to perfor the handoff process before exiting the WLAN coverage area. The overall handoff procedure that the obile node uses to ove fro WLAN to UMTS is depicted in Fig. 4. This case observes the sae signaling procedure as in the case of handoff fro UMTS to WLAN, except for the pre-authentication phase. When the obile nodes hands off fro WLAN to UMTS, pre-authentication is perfored aong the MN, SGSN and HLR/Au based on the 3GPP authentication procedure [11]. Because the UMTS authentication is issued by the SGSN, the pre-authentication request essage ust be sent to the SGSN, and so the SGSN ust process the UMTS authentication and transit the pre-authentication reply essage to the obile node following successful authentication. V. PERFORMANE EVALUATION In this paper we try to use the basic idea of analytical ethod presented in [7,8] to evaluate the perforance of proposed handoff schee and copared it with conventional schees such as the MIP, Pre-registration and Post-registration handoff schees and also sealess handoff proposed in [7]. In equations 3 and 4 transission ( MIP N Re g = S r (4d MN FA 2d FA HA Re g (Pr e. = S r (4d MN ofa 2d nfa HA 4d N ofa nfa Re g ( Post = Sr (4d MN nfa 2dnFA HA 2d ofa nfa N Re g ( Sea. = S r (2d MN ofa 2d nfa HA 2d ofa nfa N Re g (Pr oposed = Sr (2d MN ofa 2d nfa HA 2d N MN ofa (6 (7 (8 (9 (10 Total signaling cost for all handoff schees could be obtained as follows: VHO = Re g. Auth. L2HO (11 Which Auth and L2HO is sae for all schees. For the proposed handoff schee, the total signaling cost could be obtained as follows: VHO (Pr oposed g. Auth. L2 S d N = Re HO r MN HA (11 Fig. 5 shows the coparison of signaling cost for registration update process. We can see that the preregistration handoff schee has the largest signaling cost to perfor registration update. This is because the preregistration handoff schee consues ore signaling for pre-registration operation with the nfa than the other schees [7]. Siilarly, the post-registration handoff schee shows larger signaling cost copared with the basic MIP and the sealess handoff schee presented in [7] since it also requires additional signaling procedures for post-

6 registration before the handoff copletion. On the other hand, MIP has saller signaling cost than the preregistration or post-registration handoff schees because it perfors a siple registration process without other signaling process before the handoff copletion. However, the sealess handoff schee in [7] has the lowest hops and signaling for registration update copared with the other schees, so it shows the best perforance in view of signaling cost. schees show nearly the sae handoff delay perforance. Aong the, the proposed handoff schee shows the sallest handoff delay perforance. TABLE I AVERAGE HANDOFF DELAY FOR DIFFERENT HANDOFF SHEMES Handoff schee Average Delay (Sec. Mobile IP Pre-Registration Post-Registration Sealess handoff Proposed handoff Fig. 5. Signaling ost versus obile nodes resident tie (T r for different handoff schees B. Average Handoff Delay Average handoff delay is defined as the period in which the obile node detaches fro his hoe access network and attaches to the new network. In proposed handoff schee the interval for which it is disconnected does not contain the authentication and registration processing tie and just includes the layer 2 handoff delay and transission delays after layer 2 handoff. The average handoff delay of different obile IP base handoff schees in registration phase could be obtained as follow: 1 TRe g. ( MIP = 4Twl 4Tw, d MN FA (12 2T ad 2Tw, d FA HA T Re g. (Pr e. = 4Twl 4Twl, d MN ofa T 4Tw, d FA HA 4Tw, d ofa nfa ( Post. 4T ( S 4T ( S, d Re g. = wl r wl r MN nfa T 2Tw ( S r, d MN FA 2Tw ( S r, d FA HA ( Sea. 2T ( S 2T ( S, d Re g. = wl r wl r MN ofa 2Tw ( S r, d FA HA 2Tw, dofa nfa (13 (14 (15 The average handoff delay for different approaches is listed in Table I. MIP has uch longer handoff delay than the other schees because it does not use efficient handoff technique for vertical handoff. On the other hand, the other. Total Handoff Tie This is the total tie required to obile node start the handoff procedure and finishes it. Handoff tie starts fro the tie obile node feel a layer 2 trigger or receives a layer 2 trigger essage fro network. In all conventional IP based handoff schees obile nodes enters the new network coverage area and after receiving a layer 2 essage fro network, starts to initiate a vertical handoff. But, in proposed handoff schee the obile node before entering the new Network coverage area initiate the handoff and then waits to feel a need for layer 2 trigger and then disconnects fro his hoe network and attaches to the new network. In Table II total handoff tie required for different obile IP based vertical handoff schees is presented. As it sees the proposed handoff schee has the lowest required handoff tie. TABLE II TOTAL HANDOFF TIME REQUIRED FOR DIFFERENT HANDOFF SHEMES Handoff schee Average Delay (sec. Mobile IP Pre-Registration Post-Registration Sealess handoff Proposed handoff D. Total Packet Loss during Vertical Handoff According to the vertical handoff algoriths real packet loss starts fro the tie obile node disconnected fro its hoe access network and attaches to a new network [7]. So, the period of packet loss during vertical handoff is equal to the total handoff delay in all conventional obile IP based handoff schees. The total packet loss could be obtained as follows: Packet _ loss = T loss λ N (16 d T loss is the total duration in which all downlink in-flight packets will be lost. T loss is equal to the total handoff delay calculated in pervious section for each handoff schees; λ d is downlink packet transission rate and N is the Average nuber of oveents during a session.

7 TABLE III TOTAL PAKET LOSS FOR DIFFERENT VALUES OF MOBILE NODE'S RESIDENT TIME Mobile IP Pre-Registration Post-Registration Sealess handoff Proposed handoff Table III shows the total lost packet versus obile nodes resident tie (T r. By increasing the resident tie of obile node during a session, total lost packet will decrease. According to the siulation results the proposed handoff schee achieves the best perforance because its duration of packet loss is shorter than that of the others. E. Buffer Size The buffer size requireents for all schees becoe the aount of total packet loss generated by one handoff. Naely, the buffer size required to prevent packet drop is the sae as the aount of packet loss in each handoff schee [7]. In Table IV required buffer size for different approaches are calculated for a single handoff. TABLE IV REQUIRED BUFFER SIZE FOR DIFFERENT HANDOFF SHEMES Handoff schee Buffer Size (Kbyte Mobile IP Pre-Registration Post-Registration Sealess handoff Proposed handoff VI. ONLUSION In this paper, we introduced a practical UMTS-WLAN interworking architecture based on 3GPP standards and proposed a sealess handoff ethod which guarantees low delay and low packet loss during UMTS WLAN handoff. To enable low handoff delay, the proposed handoff schee perfors both pre-registration and pre-authentication processes before LAYER 2 handoff. To achieve low packet loss, it forces the HA to perfor packet buffering and forwarding functions while anaging two oas during the handoff period. Applying these basic ideas, we have presented concrete signaling procedures and syste requireents that take into account the interworking architecture when the UE is handed off fro the UMTS to WLAN and vice-versa. As results of analysis, the proposed handoff operation perfors well with respect to signaling cost, handoff delay, packet loss, and required buffer size copared with the conventional schees. In conclusion, the proposed handoff schee is able to guarantee sealess handoff supporting QoS and service continuity for the UMTS WLAN interworking. Therefore, if the current UMTS WLAN interworking syste is odified a little according to handoff requireents, the proposed sealess handoff schee can be applied usefully to integrated UMTS/WLAN networks without difficulty. REFERENES [1] Qian Zhang et al., Efficient Mobility Manageent for Vertical Handoff between WWAN and WLAN, IEEE oun. Magazine, Vol. 41, No. 11, pp , Nov [2] 3GPP syste to Wireless Local Area Network (WLAN Interworking; Syste Description, Rel.6, 3GPP TS , v6.3.0, Dec [3] Vijay K. Vara et al., Mobility Manageent in Integrated UMTS/WLAN Networks, IEEE I 2003, Vol. 2, pp , May [4] S. Taso and. Lin, Design and Evaluation of UMTS WLAN Interworking Strategies, IEEE VT 2002 Fall, Vol. 2, pp , Sep [5] Kalle Ahavaara et al., Interworking Architecture Between 3GPP and WLAN Systes, IEEE oun. Magazine, Vol. 41, No. 11, pp , Nov [6] J. McNair and F. Zhu, Vertical Handoffs in Fourth-Generation Multi network Environents, IEEE Wireless oun., Vol. 11, pp. 8 15, June [7] H.H. hoi, O. Song, and D.H. ho, "Sealess Handoff Schee Based on Pre-registration and Pre-authentication for UMTS WLAN Interworking", Springer Wireless Personal ounications journal, Vol. 41, pp , [8] K. Pahlavan et al., Handoff in Hybrid Mobile Data Networks, IEEE Personal oun., Vol. 7, pp , Apr [9] H.H. hoi, O. Song, and D.H. ho, A sealess Handoff schee for UMTS WLAN Interworking, IEEE Globalco 2004, Vol. 3, pp , Dec [10] IEEE , Wireless LAN Mediu Access ontrol (MA and Physical Layer (PHY Specifications, Standard, IEEE, Aug [11] Requireents and Architectures for Interworking between HIPERLAN/2 and 3rd Generation ellular systes, ETSI TR , v1.1.1, Aug [12] K. El Malki et al., IETF draft, Low latency Handoff in Mobile IPv4, May [13] Rajeev Koodli, IETF draft, Fast Handovers for Mobile IPv6, Sep [14] John W. Floroiu et al., Sealess Handover in Terrestrial Radio Access Networks: A ase Study, IEEE oun. Magazine, Vol. 41, No. 11, pp , Nov [15] I-Wei Wu et al., A Sealess Handoff Approach of Mobile IP Protocol for Mobile Wireless Data Networks, IEEE Trans. on onsuer Electronics, Vol. 48, No. 2, pp , May [16] N. Badache, D. Tandjaoui, A Sealess Handoff Protocol for Hierarchical Mobile IPv4, Int.Workshop Mobile Wireless oun Network, Vol. 2, pp , Sep [17]. Perkins, IP Mobility Support, RF 2002, Oct [18]. Blondia, O. asals et al., Low Latency Handoff Mechaniss and Their Ipleentation in an IEEE Network, Proceedings of IT18, Teletraffic and Engineering Vol. 5b, pp , Berlin, Gerany, Sep [19] O. asals, Ll. erda, G. Willes,. Blondia, N. Van den Wijngaert, Perforance Evaluation of the Post-Registration Method, a Low Latency Handoff in MIPv4, IEEE I 2003, Vol.1, pp , May [20] G.M. Koien and T. Haslestad, Security Aspects of 3G-WLAN Interworking, IEEE oun. Magazine, Vol. 41, No. 11, pp , Nov

Applying Multiple Neural Networks on Large Scale Data

Applying Multiple Neural Networks on Large Scale Data 0 International Conference on Inforation and Electronics Engineering IPCSIT vol6 (0) (0) IACSIT Press, Singapore Applying Multiple Neural Networks on Large Scale Data Kritsanatt Boonkiatpong and Sukree

More information

Reliability Constrained Packet-sizing for Linear Multi-hop Wireless Networks

Reliability Constrained Packet-sizing for Linear Multi-hop Wireless Networks Reliability Constrained acket-sizing for inear Multi-hop Wireless Networks Ning Wen, and Randall A. Berry Departent of Electrical Engineering and Coputer Science Northwestern University, Evanston, Illinois

More information

Implementation of Active Queue Management in a Combined Input and Output Queued Switch

Implementation of Active Queue Management in a Combined Input and Output Queued Switch pleentation of Active Queue Manageent in a obined nput and Output Queued Switch Bartek Wydrowski and Moshe Zukeran AR Special Research entre for Ultra-Broadband nforation Networks, EEE Departent, The University

More information

An Approach to Combating Free-riding in Peer-to-Peer Networks

An Approach to Combating Free-riding in Peer-to-Peer Networks An Approach to Cobating Free-riding in Peer-to-Peer Networks Victor Ponce, Jie Wu, and Xiuqi Li Departent of Coputer Science and Engineering Florida Atlantic University Boca Raton, FL 33431 April 7, 2008

More information

Searching strategy for multi-target discovery in wireless networks

Searching strategy for multi-target discovery in wireless networks Searching strategy for ulti-target discovery in wireless networks Zhao Cheng, Wendi B. Heinzelan Departent of Electrical and Coputer Engineering University of Rochester Rochester, NY 467 (585) 75-{878,

More information

An Innovate Dynamic Load Balancing Algorithm Based on Task

An Innovate Dynamic Load Balancing Algorithm Based on Task An Innovate Dynaic Load Balancing Algorith Based on Task Classification Hong-bin Wang,,a, Zhi-yi Fang, b, Guan-nan Qu,*,c, Xiao-dan Ren,d College of Coputer Science and Technology, Jilin University, Changchun

More information

Resource Allocation in Wireless Networks with Multiple Relays

Resource Allocation in Wireless Networks with Multiple Relays Resource Allocation in Wireless Networks with Multiple Relays Kağan Bakanoğlu, Stefano Toasin, Elza Erkip Departent of Electrical and Coputer Engineering, Polytechnic Institute of NYU, Brooklyn, NY, 0

More information

Gateway Service for Integration of Heterogeneous Networks using Different Interworking Solutions

Gateway Service for Integration of Heterogeneous Networks using Different Interworking Solutions Gateway Service for Integration of Heterogeneous Networks using Different Interworking Solutions Hyunho Park*, Hyeong Ho Lee*, H. Anthony Chan** * Electronics and Telecommunications Research Institute

More information

PERFORMANCE METRICS FOR THE IT SERVICES PORTFOLIO

PERFORMANCE METRICS FOR THE IT SERVICES PORTFOLIO Bulletin of the Transilvania University of Braşov Series I: Engineering Sciences Vol. 4 (53) No. - 0 PERFORMANCE METRICS FOR THE IT SERVICES PORTFOLIO V. CAZACU I. SZÉKELY F. SANDU 3 T. BĂLAN Abstract:

More information

Design of Model Reference Self Tuning Mechanism for PID like Fuzzy Controller

Design of Model Reference Self Tuning Mechanism for PID like Fuzzy Controller Research Article International Journal of Current Engineering and Technology EISSN 77 46, PISSN 347 56 4 INPRESSCO, All Rights Reserved Available at http://inpressco.co/category/ijcet Design of Model Reference

More information

Analyzing Spatiotemporal Characteristics of Education Network Traffic with Flexible Multiscale Entropy

Analyzing Spatiotemporal Characteristics of Education Network Traffic with Flexible Multiscale Entropy Vol. 9, No. 5 (2016), pp.303-312 http://dx.doi.org/10.14257/ijgdc.2016.9.5.26 Analyzing Spatioteporal Characteristics of Education Network Traffic with Flexible Multiscale Entropy Chen Yang, Renjie Zhou

More information

Adaptive Modulation and Coding for Unmanned Aerial Vehicle (UAV) Radio Channel

Adaptive Modulation and Coding for Unmanned Aerial Vehicle (UAV) Radio Channel Recent Advances in Counications Adaptive odulation and Coding for Unanned Aerial Vehicle (UAV) Radio Channel Airhossein Fereidountabar,Gian Carlo Cardarilli, Rocco Fazzolari,Luca Di Nunzio Abstract In

More information

The Application of Bandwidth Optimization Technique in SLA Negotiation Process

The Application of Bandwidth Optimization Technique in SLA Negotiation Process The Application of Bandwidth Optiization Technique in SLA egotiation Process Srecko Krile University of Dubrovnik Departent of Electrical Engineering and Coputing Cira Carica 4, 20000 Dubrovnik, Croatia

More information

Performance Analysis of Opportunistic Routing in Multi-Sink Mobile Ad Hoc Wireless Sensor Networks

Performance Analysis of Opportunistic Routing in Multi-Sink Mobile Ad Hoc Wireless Sensor Networks International Journal of Coputer Applications (0975 8887) Volue 54 No.7, Septeber 2012 Perforance Analysis of Opportunistic Routing in Multi-Sink Mobile Ad Hoc Wireless Sensor Networks Aandeep Singh Dhaliwal

More information

Generating Certification Authority Authenticated Public Keys in Ad Hoc Networks

Generating Certification Authority Authenticated Public Keys in Ad Hoc Networks SECURITY AND COMMUNICATION NETWORKS Published online in Wiley InterScience (www.interscience.wiley.co). Generating Certification Authority Authenticated Public Keys in Ad Hoc Networks G. Kounga 1, C. J.

More information

Efficient Key Management for Secure Group Communications with Bursty Behavior

Efficient Key Management for Secure Group Communications with Bursty Behavior Efficient Key Manageent for Secure Group Counications with Bursty Behavior Xukai Zou, Byrav Raaurthy Departent of Coputer Science and Engineering University of Nebraska-Lincoln Lincoln, NE68588, USA Eail:

More information

MOBILITY SUPPORT USING INTELLIGENT USER SHADOWS FOR NEXT-GENERATION WIRELESS NETWORKS

MOBILITY SUPPORT USING INTELLIGENT USER SHADOWS FOR NEXT-GENERATION WIRELESS NETWORKS MOBILITY SUPPORT USING INTELLIGENT USER SADOWS FOR NEXT-GENERATION WIRELESS NETWORKS Gergely V. Záruba, Wei Wu, Mohan J. Kumar, Sajal K. Das enter for Research in Wireless Mobility and Networking Department

More information

On the Design of Mobility Management Scheme for 802.16-based Network Environment

On the Design of Mobility Management Scheme for 802.16-based Network Environment On the Design of obility anagement Scheme for 802.16-based Network Environment Junn-Yen Hu and Chun-Chuan Yang ultimedia and Communications Laboratory Department of Computer Science and Information Engineering

More information

An Integrated Approach for Monitoring Service Level Parameters of Software-Defined Networking

An Integrated Approach for Monitoring Service Level Parameters of Software-Defined Networking International Journal of Future Generation Counication and Networking Vol. 8, No. 6 (15), pp. 197-4 http://d.doi.org/1.1457/ijfgcn.15.8.6.19 An Integrated Approach for Monitoring Service Level Paraeters

More information

ASIC Design Project Management Supported by Multi Agent Simulation

ASIC Design Project Management Supported by Multi Agent Simulation ASIC Design Project Manageent Supported by Multi Agent Siulation Jana Blaschke, Christian Sebeke, Wolfgang Rosenstiel Abstract The coplexity of Application Specific Integrated Circuits (ASICs) is continuously

More information

Use of extrapolation to forecast the working capital in the mechanical engineering companies

Use of extrapolation to forecast the working capital in the mechanical engineering companies ECONTECHMOD. AN INTERNATIONAL QUARTERLY JOURNAL 2014. Vol. 1. No. 1. 23 28 Use of extrapolation to forecast the working capital in the echanical engineering copanies A. Cherep, Y. Shvets Departent of finance

More information

ON SELF-ROUTING IN CLOS CONNECTION NETWORKS. BARRY G. DOUGLASS Electrical Engineering Department Texas A&M University College Station, TX 77843-3128

ON SELF-ROUTING IN CLOS CONNECTION NETWORKS. BARRY G. DOUGLASS Electrical Engineering Department Texas A&M University College Station, TX 77843-3128 ON SELF-ROUTING IN CLOS CONNECTION NETWORKS BARRY G. DOUGLASS Electrical Engineering Departent Texas A&M University College Station, TX 778-8 A. YAVUZ ORUÇ Electrical Engineering Departent and Institute

More information

International Journal of Management & Information Systems First Quarter 2012 Volume 16, Number 1

International Journal of Management & Information Systems First Quarter 2012 Volume 16, Number 1 International Journal of Manageent & Inforation Systes First Quarter 2012 Volue 16, Nuber 1 Proposal And Effectiveness Of A Highly Copelling Direct Mail Method - Establishent And Deployent Of PMOS-DM Hisatoshi

More information

arxiv:0805.1434v1 [math.pr] 9 May 2008

arxiv:0805.1434v1 [math.pr] 9 May 2008 Degree-distribution stability of scale-free networs Zhenting Hou, Xiangxing Kong, Dinghua Shi,2, and Guanrong Chen 3 School of Matheatics, Central South University, Changsha 40083, China 2 Departent of

More information

PREDICTION OF POSSIBLE CONGESTIONS IN SLA CREATION PROCESS

PREDICTION OF POSSIBLE CONGESTIONS IN SLA CREATION PROCESS PREDICTIO OF POSSIBLE COGESTIOS I SLA CREATIO PROCESS Srećko Krile University of Dubrovnik Departent of Electrical Engineering and Coputing Cira Carica 4, 20000 Dubrovnik, Croatia Tel +385 20 445-739,

More information

Software Quality Characteristics Tested For Mobile Application Development

Software Quality Characteristics Tested For Mobile Application Development Thesis no: MGSE-2015-02 Software Quality Characteristics Tested For Mobile Application Developent Literature Review and Epirical Survey WALEED ANWAR Faculty of Coputing Blekinge Institute of Technology

More information

Protecting Small Keys in Authentication Protocols for Wireless Sensor Networks

Protecting Small Keys in Authentication Protocols for Wireless Sensor Networks Protecting Sall Keys in Authentication Protocols for Wireless Sensor Networks Kalvinder Singh Australia Developent Laboratory, IBM and School of Inforation and Counication Technology, Griffith University

More information

Approximately-Perfect Hashing: Improving Network Throughput through Efficient Off-chip Routing Table Lookup

Approximately-Perfect Hashing: Improving Network Throughput through Efficient Off-chip Routing Table Lookup Approxiately-Perfect ing: Iproving Network Throughput through Efficient Off-chip Routing Table Lookup Zhuo Huang, Jih-Kwon Peir, Shigang Chen Departent of Coputer & Inforation Science & Engineering, University

More information

Real Time Target Tracking with Binary Sensor Networks and Parallel Computing

Real Time Target Tracking with Binary Sensor Networks and Parallel Computing Real Tie Target Tracking with Binary Sensor Networks and Parallel Coputing Hong Lin, John Rushing, Sara J. Graves, Steve Tanner, and Evans Criswell Abstract A parallel real tie data fusion and target tracking

More information

Equivalent Tapped Delay Line Channel Responses with Reduced Taps

Equivalent Tapped Delay Line Channel Responses with Reduced Taps Equivalent Tapped Delay Line Channel Responses with Reduced Taps Shweta Sagari, Wade Trappe, Larry Greenstein {shsagari, trappe, ljg}@winlab.rutgers.edu WINLAB, Rutgers University, North Brunswick, NJ

More information

Online Bagging and Boosting

Online Bagging and Boosting Abstract Bagging and boosting are two of the ost well-known enseble learning ethods due to their theoretical perforance guarantees and strong experiental results. However, these algoriths have been used

More information

A Proxy Mobile IP based Layer-3 Handover Scheme for Mobile WiMAX based Wireless Mesh Networks

A Proxy Mobile IP based Layer-3 Handover Scheme for Mobile WiMAX based Wireless Mesh Networks A Proxy Mobile IP based Layer-3 Handover Scheme for Mobile WiMAX based Wireless Mesh Networks Min-Kim, Jong-min Kim, Hwa-sung Kim Dept. of Electronics and Communications Engineering Kwangwoon University

More information

The Research of Measuring Approach and Energy Efficiency for Hadoop Periodic Jobs

The Research of Measuring Approach and Energy Efficiency for Hadoop Periodic Jobs Send Orders for Reprints to reprints@benthascience.ae 206 The Open Fuels & Energy Science Journal, 2015, 8, 206-210 Open Access The Research of Measuring Approach and Energy Efficiency for Hadoop Periodic

More information

SUPPORTING YOUR HIPAA COMPLIANCE EFFORTS

SUPPORTING YOUR HIPAA COMPLIANCE EFFORTS WHITE PAPER SUPPORTING YOUR HIPAA COMPLIANCE EFFORTS Quanti Solutions. Advancing HIM through Innovation HEALTHCARE SUPPORTING YOUR HIPAA COMPLIANCE EFFORTS Quanti Solutions. Advancing HIM through Innovation

More information

How To Get A Loan From A Bank For Free

How To Get A Loan From A Bank For Free Finance 111 Finance We have to work with oney every day. While balancing your checkbook or calculating your onthly expenditures on espresso requires only arithetic, when we start saving, planning for retireent,

More information

How To Balance Over Redundant Wireless Sensor Networks Based On Diffluent

How To Balance Over Redundant Wireless Sensor Networks Based On Diffluent Load balancing over redundant wireless sensor networks based on diffluent Abstract Xikui Gao Yan ai Yun Ju School of Control and Coputer Engineering North China Electric ower University 02206 China Received

More information

Home Agent placement and assignment in WLAN with Cellular Networks

Home Agent placement and assignment in WLAN with Cellular Networks Home Agent placement and assignment in WLAN with Cellular Networks Selvakumar.R, Senior Lecturer, Department of Computer Science and Engineering V.M.K.V.Engineering College, Salem-636 308 Tamilnadu, India.

More information

Capacity of Multiple-Antenna Systems With Both Receiver and Transmitter Channel State Information

Capacity of Multiple-Antenna Systems With Both Receiver and Transmitter Channel State Information IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 49, NO., OCTOBER 23 2697 Capacity of Multiple-Antenna Systes With Both Receiver and Transitter Channel State Inforation Sudharan K. Jayaweera, Student Meber,

More information

An Active Network Based Hierarchical Mobile Internet Protocol Version 6 Framework

An Active Network Based Hierarchical Mobile Internet Protocol Version 6 Framework An Active Network Based Hierarchical Mobile Internet Protocol Version 6 Framework Zutao Zhu Zhenjun Li YunYong Duan Department of Business Support Department of Computer Science Department of Business

More information

Modeling Parallel Applications Performance on Heterogeneous Systems

Modeling Parallel Applications Performance on Heterogeneous Systems Modeling Parallel Applications Perforance on Heterogeneous Systes Jaeela Al-Jaroodi, Nader Mohaed, Hong Jiang and David Swanson Departent of Coputer Science and Engineering University of Nebraska Lincoln

More information

G.Vijaya kumar et al, Int. J. Comp. Tech. Appl., Vol 2 (5), 1413-1418

G.Vijaya kumar et al, Int. J. Comp. Tech. Appl., Vol 2 (5), 1413-1418 An Analytical Model to evaluate the Approaches of Mobility Management 1 G.Vijaya Kumar, *2 A.Lakshman Rao *1 M.Tech (CSE Student), Pragati Engineering College, Kakinada, India. Vijay9908914010@gmail.com

More information

Physics 211: Lab Oscillations. Simple Harmonic Motion.

Physics 211: Lab Oscillations. Simple Harmonic Motion. Physics 11: Lab Oscillations. Siple Haronic Motion. Reading Assignent: Chapter 15 Introduction: As we learned in class, physical systes will undergo an oscillatory otion, when displaced fro a stable equilibriu.

More information

Mobility Management for IP-based Mobile Networks

Mobility Management for IP-based Mobile Networks Mobility Management for IP-based Mobile Networks H. Becker, N. Gerlich, M. Schopp Siemens Information & Communication Mobile Munich, Germany 1 Overview Introduction to IP-based Radio Access Networks Definition

More information

Fuzzy Sets in HR Management

Fuzzy Sets in HR Management Acta Polytechnica Hungarica Vol. 8, No. 3, 2011 Fuzzy Sets in HR Manageent Blanka Zeková AXIOM SW, s.r.o., 760 01 Zlín, Czech Republic blanka.zekova@sezna.cz Jana Talašová Faculty of Science, Palacký Univerzity,

More information

Forced Low latency Handoff in Mobile Cellular Data Networks

Forced Low latency Handoff in Mobile Cellular Data Networks Forced Low latency Handoff in Mobile Cellular Data Networks N. Moayedian, Faramarz Hendessi Department of Electrical and Computer Engineering Isfahan University of Technology, Isfahan, IRAN Hendessi@cc.iut.ac.ir

More information

The 3GPP and 3GPP2 Movements Towards an All IP Mobile Network. 1 Introduction

The 3GPP and 3GPP2 Movements Towards an All IP Mobile Network. 1 Introduction The 3GPP and 3GPP2 Movements Towards an All IP Mobile Network Girish Patel Wireless Solutions Nortel Networks Richardson, TX grpatel@nortelnetworks.com Steven Dennett Personal Communications Sector Motorola

More information

An Improved Decision-making Model of Human Resource Outsourcing Based on Internet Collaboration

An Improved Decision-making Model of Human Resource Outsourcing Based on Internet Collaboration International Journal of Hybrid Inforation Technology, pp. 339-350 http://dx.doi.org/10.14257/hit.2016.9.4.28 An Iproved Decision-aking Model of Huan Resource Outsourcing Based on Internet Collaboration

More information

Local Area Network Management

Local Area Network Management Technology Guidelines for School Coputer-based Technologies Local Area Network Manageent Local Area Network Manageent Introduction This docuent discusses the tasks associated with anageent of Local Area

More information

Presentation Safety Legislation and Standards

Presentation Safety Legislation and Standards levels in different discrete levels corresponding for each one to a probability of dangerous failure per hour: > > The table below gives the relationship between the perforance level (PL) and the Safety

More information

A NEW SIGNALLING PROTOCOL FOR SEAMLESS ROAMING IN HETEROGENEOUS WIRELESS SYSTEMS

A NEW SIGNALLING PROTOCOL FOR SEAMLESS ROAMING IN HETEROGENEOUS WIRELESS SYSTEMS A NEW SIGNALLING PROTOCOL FOR SEAMLESS ROAMING IN HETEROGENEOUS WIRELESS SYSTEMS Azita Laily Yusof, Mahamod Ismail, Norbahiah Misran Dept of Electrical, Electronic & System Engineering, Universiti Kebangsaan

More information

A Novel Pathway for Portability of Networks and Handing-on between Networks

A Novel Pathway for Portability of Networks and Handing-on between Networks A Novel Pathway for Portability of Networks and Handing-on between Networks D. S. Dayana #1, S. R. Surya #2 Department of Computer Applications, SRM University, Chennai, India 1 dayanads@rediffmail.com

More information

The Vertical Handoff Algorithm using Fuzzy Decisions in Cellular Phone Networks

The Vertical Handoff Algorithm using Fuzzy Decisions in Cellular Phone Networks International Journal of Electronics Engineering, 2(), 200, pp. 29-34 The Vertical Handoff Algorithm using Fuzzy Decisions in Cellular Phone Networks Chandrashekhar G.Patil & R.D.Kharadkar 2 Department

More information

A framework for performance monitoring, load balancing, adaptive timeouts and quality of service in digital libraries

A framework for performance monitoring, load balancing, adaptive timeouts and quality of service in digital libraries Int J Digit Libr (2000) 3: 9 35 INTERNATIONAL JOURNAL ON Digital Libraries Springer-Verlag 2000 A fraework for perforance onitoring, load balancing, adaptive tieouts and quality of service in digital libraries

More information

The Velocities of Gas Molecules

The Velocities of Gas Molecules he Velocities of Gas Molecules by Flick Colean Departent of Cheistry Wellesley College Wellesley MA 8 Copyright Flick Colean 996 All rights reserved You are welcoe to use this docuent in your own classes

More information

This paper studies a rental firm that offers reusable products to price- and quality-of-service sensitive

This paper studies a rental firm that offers reusable products to price- and quality-of-service sensitive MANUFACTURING & SERVICE OPERATIONS MANAGEMENT Vol., No. 3, Suer 28, pp. 429 447 issn 523-464 eissn 526-5498 8 3 429 infors doi.287/so.7.8 28 INFORMS INFORMS holds copyright to this article and distributed

More information

Research Article Performance Evaluation of Human Resource Outsourcing in Food Processing Enterprises

Research Article Performance Evaluation of Human Resource Outsourcing in Food Processing Enterprises Advance Journal of Food Science and Technology 9(2): 964-969, 205 ISSN: 2042-4868; e-issn: 2042-4876 205 Maxwell Scientific Publication Corp. Subitted: August 0, 205 Accepted: Septeber 3, 205 Published:

More information

Security and Authentication Concepts

Security and Authentication Concepts Security and Authentication Concepts for UMTS/WLAN Convergence F. Fitzek M. Munari V. Pastesini S. Rossi L. Badia Dipartimento di Ingegneria, Università di Ferrara, via Saragat 1, 44100 Ferrara, Italy

More information

Impact of Processing Costs on Service Chain Placement in Network Functions Virtualization

Impact of Processing Costs on Service Chain Placement in Network Functions Virtualization Ipact of Processing Costs on Service Chain Placeent in Network Functions Virtualization Marco Savi, Massio Tornatore, Giacoo Verticale Dipartiento di Elettronica, Inforazione e Bioingegneria, Politecnico

More information

Media Adaptation Framework in Biofeedback System for Stroke Patient Rehabilitation

Media Adaptation Framework in Biofeedback System for Stroke Patient Rehabilitation Media Adaptation Fraework in Biofeedback Syste for Stroke Patient Rehabilitation Yinpeng Chen, Weiwei Xu, Hari Sundara, Thanassis Rikakis, Sheng-Min Liu Arts, Media and Engineering Progra Arizona State

More information

The Virtual Spring Mass System

The Virtual Spring Mass System The Virtual Spring Mass Syste J. S. Freudenberg EECS 6 Ebedded Control Systes Huan Coputer Interaction A force feedbac syste, such as the haptic heel used in the EECS 6 lab, is capable of exhibiting a

More information

Dynamic Placement for Clustered Web Applications

Dynamic Placement for Clustered Web Applications Dynaic laceent for Clustered Web Applications A. Karve, T. Kibrel, G. acifici, M. Spreitzer, M. Steinder, M. Sviridenko, and A. Tantawi IBM T.J. Watson Research Center {karve,kibrel,giovanni,spreitz,steinder,sviri,tantawi}@us.ib.co

More information

An Application Research on the Workflow-based Large-scale Hospital Information System Integration

An Application Research on the Workflow-based Large-scale Hospital Information System Integration 106 JOURNAL OF COMPUTERS, VOL. 6, NO. 1, JANUARY 2011 An Application Research on the Workflow-based Large-scale Hospital Inforation Syste Integration Yang Guojun School of Coputer, Neijiang Noral University,

More information

Construction Economics & Finance. Module 3 Lecture-1

Construction Economics & Finance. Module 3 Lecture-1 Depreciation:- Construction Econoics & Finance Module 3 Lecture- It represents the reduction in arket value of an asset due to age, wear and tear and obsolescence. The physical deterioration of the asset

More information

Calculating the Return on Investment (ROI) for DMSMS Management. The Problem with Cost Avoidance

Calculating the Return on Investment (ROI) for DMSMS Management. The Problem with Cost Avoidance Calculating the Return on nvestent () for DMSMS Manageent Peter Sandborn CALCE, Departent of Mechanical Engineering (31) 45-3167 sandborn@calce.ud.edu www.ene.ud.edu/escml/obsolescence.ht October 28, 21

More information

Leak detection in open water channels

Leak detection in open water channels Proceedings of the 17th World Congress The International Federation of Autoatic Control Seoul, Korea, July 6-11, 28 Leak detection in open water channels Erik Weyer Georges Bastin Departent of Electrical

More information

Smart Mobility Management for D2D Communications in 5G Networks

Smart Mobility Management for D2D Communications in 5G Networks Smart Mobility Management for D2D Communications in 5G Networks Osman N. C. Yilmaz, Zexian Li, Kimmo Valkealahti, Mikko A. Uusitalo, Martti Moisio, Petteri Lundén, Carl Wijting Nokia Research Center Nokia

More information

Managing Complex Network Operation with Predictive Analytics

Managing Complex Network Operation with Predictive Analytics Managing Coplex Network Operation with Predictive Analytics Zhenyu Huang, Pak Chung Wong, Patrick Mackey, Yousu Chen, Jian Ma, Kevin Schneider, and Frank L. Greitzer Pacific Northwest National Laboratory

More information

Exercise 4 INVESTIGATION OF THE ONE-DEGREE-OF-FREEDOM SYSTEM

Exercise 4 INVESTIGATION OF THE ONE-DEGREE-OF-FREEDOM SYSTEM Eercise 4 IVESTIGATIO OF THE OE-DEGREE-OF-FREEDOM SYSTEM 1. Ai of the eercise Identification of paraeters of the euation describing a one-degree-of- freedo (1 DOF) atheatical odel of the real vibrating

More information

Mobile IPv6 deployment opportunities in next generation 3GPP networks. I. Guardini E. Demaria M. La Monaca

Mobile IPv6 deployment opportunities in next generation 3GPP networks. I. Guardini E. Demaria M. La Monaca Mobile IPv6 deployment opportunities in next generation 3GPP networks I. Guardini E. Demaria M. La Monaca Overview of SAE/LTE Terminology SAE (System Architecture Evolution): core network/system aspects

More information

Performance Evaluation of a QoS-Aware Handover Mechanism

Performance Evaluation of a QoS-Aware Handover Mechanism Performance Evaluation of a QoS-Aware Handover Mechanism 1.Introduction Background Requirements in mobile communication Seamless mobility support Guarantee certain levels of QoS Mobile communications over

More information

Markovian inventory policy with application to the paper industry

Markovian inventory policy with application to the paper industry Coputers and Cheical Engineering 26 (2002) 1399 1413 www.elsevier.co/locate/copcheeng Markovian inventory policy with application to the paper industry K. Karen Yin a, *, Hu Liu a,1, Neil E. Johnson b,2

More information

A Seamless Handover Mechanism for IEEE 802.16e Broadband Wireless Access

A Seamless Handover Mechanism for IEEE 802.16e Broadband Wireless Access A Seamless Handover Mechanism for IEEE 802.16e Broadband Wireless Access Kyung-ah Kim 1, Chong-Kwon Kim 2, and Tongsok Kim 1 1 Marketing & Technology Lab., KT, Seoul, Republic of Korea, {kka1,tongsok}@kt.co.kr

More information

LEAN FOR FRONTLINE MANAGERS IN HEALTHCARE An action learning programme for frontline healthcare managers

LEAN FOR FRONTLINE MANAGERS IN HEALTHCARE An action learning programme for frontline healthcare managers Course Code: L024 LEAN FOR FRONTLINE MANAGERS IN HEALTHCARE An action learning prograe for frontline healthcare anagers 6 days Green Belt equivalent Are you ready to challenge the status quo and transfor

More information

Cooperative Caching for Adaptive Bit Rate Streaming in Content Delivery Networks

Cooperative Caching for Adaptive Bit Rate Streaming in Content Delivery Networks Cooperative Caching for Adaptive Bit Rate Streaing in Content Delivery Networs Phuong Luu Vo Departent of Coputer Science and Engineering, International University - VNUHCM, Vietna vtlphuong@hciu.edu.vn

More information

Introduction to Mobile IPv6

Introduction to Mobile IPv6 1 Introduction to Mobile IPv6 III IPv6 Global Summit Moscow Dr. Dimitrios Kalogeras dkalo@grnet.gr GRNET Outline Introduction Relevant Features of IPv6 Major Differences between MIPv4 and MIPv6 Mobile

More information

Dynamic Selection of Optimal Wireless Access Service

Dynamic Selection of Optimal Wireless Access Service Dynamic Selection of Optimal Wireless Access Service Teemu inta-aho teemu.rinta-aho@tkk.fi Abstract The number of different wireless access technologies is increasing, as well as the number of players

More information

IP-based Mobility Management for a Distributed Radio Access Network Architecture. helmut.becker@siemens.com

IP-based Mobility Management for a Distributed Radio Access Network Architecture. helmut.becker@siemens.com IP-based Mobility Management for a Distributed Radio Access Network Architecture helmut.becker@siemens.com Outline - Definition IP-based Mobility Management for a Distributed RAN Architecture Page 2 Siemens

More information

LCOS Projector WUX500

LCOS Projector WUX500 LCOS Projector WUX500. Main Features - Features newly developed iage engine, with renewed iage processing algorith The WUX500 is a follow-up odel to the WUX450 series. It is a copact installation odel

More information

Extended-Horizon Analysis of Pressure Sensitivities for Leak Detection in Water Distribution Networks: Application to the Barcelona Network

Extended-Horizon Analysis of Pressure Sensitivities for Leak Detection in Water Distribution Networks: Application to the Barcelona Network 2013 European Control Conference (ECC) July 17-19, 2013, Zürich, Switzerland. Extended-Horizon Analysis of Pressure Sensitivities for Leak Detection in Water Distribution Networks: Application to the Barcelona

More information

Optimal Resource-Constraint Project Scheduling with Overlapping Modes

Optimal Resource-Constraint Project Scheduling with Overlapping Modes Optial Resource-Constraint Proect Scheduling with Overlapping Modes François Berthaut Lucas Grèze Robert Pellerin Nathalie Perrier Adnène Hai February 20 CIRRELT-20-09 Bureaux de Montréal : Bureaux de

More information

CRM FACTORS ASSESSMENT USING ANALYTIC HIERARCHY PROCESS

CRM FACTORS ASSESSMENT USING ANALYTIC HIERARCHY PROCESS 641 CRM FACTORS ASSESSMENT USING ANALYTIC HIERARCHY PROCESS Marketa Zajarosova 1* *Ph.D. VSB - Technical University of Ostrava, THE CZECH REPUBLIC arketa.zajarosova@vsb.cz Abstract Custoer relationship

More information

Load Control for Overloaded MPLS/DiffServ Networks during SLA Negotiation

Load Control for Overloaded MPLS/DiffServ Networks during SLA Negotiation Int J Counications, Network and Syste Sciences, 29, 5, 422-432 doi:14236/ijcns292547 Published Online August 29 (http://wwwscirporg/journal/ijcns/) Load Control for Overloaded MPLS/DiffServ Networks during

More information

REDUCING PACKET OVERHEAD IN MOBILE IPV6

REDUCING PACKET OVERHEAD IN MOBILE IPV6 REDUCING PACKET OVERHEAD IN MOBILE IPV6 ABSTRACT Hooshiar Zolfagharnasab 1 1 Department of Computer Engineering, University of Isfahan, Isfahan, Iran hoppico@eng.ui.ac.ir hozo19@gmail.com Common Mobile

More information

RECURSIVE DYNAMIC PROGRAMMING: HEURISTIC RULES, BOUNDING AND STATE SPACE REDUCTION. Henrik Kure

RECURSIVE DYNAMIC PROGRAMMING: HEURISTIC RULES, BOUNDING AND STATE SPACE REDUCTION. Henrik Kure RECURSIVE DYNAMIC PROGRAMMING: HEURISTIC RULES, BOUNDING AND STATE SPACE REDUCTION Henrik Kure Dina, Danish Inforatics Network In the Agricultural Sciences Royal Veterinary and Agricultural University

More information

Machine Learning Applications in Grid Computing

Machine Learning Applications in Grid Computing Machine Learning Applications in Grid Coputing George Cybenko, Guofei Jiang and Daniel Bilar Thayer School of Engineering Dartouth College Hanover, NH 03755, USA gvc@dartouth.edu, guofei.jiang@dartouth.edu

More information

Analysis of QoS parameters of VOIP calls over Wireless Local Area Networks

Analysis of QoS parameters of VOIP calls over Wireless Local Area Networks Analysis of QoS parameters of VOIP calls over Wireless Local Area Networks Ayman Wazwaz, Computer Engineering Department, Palestine Polytechnic University, Hebron, Palestine, aymanw@ppu.edu Duaa sweity

More information

An IEEE 802.21-based mobile-assisted vertical handover algorithm

An IEEE 802.21-based mobile-assisted vertical handover algorithm 1 An IEEE 802.21-based mobile-assisted vertical handover algorithm Athanasios Makris Abstract In the next generation wireless systems, heterogeneous access technologies will be intergraded in order to

More information

Markov Models and Their Use for Calculations of Important Traffic Parameters of Contact Center

Markov Models and Their Use for Calculations of Important Traffic Parameters of Contact Center Markov Models and Their Use for Calculations of Iportant Traffic Paraeters of Contact Center ERIK CHROMY, JAN DIEZKA, MATEJ KAVACKY Institute of Telecounications Slovak University of Technology Bratislava

More information

communication over wireless link handling mobile user who changes point of attachment to network

communication over wireless link handling mobile user who changes point of attachment to network Wireless Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers! computer nets: laptops, palmtops, PDAs, Internet-enabled phone promise anytime untethered Internet

More information

Standards and Protocols for the Collection and Dissemination of Graduating Student Initial Career Outcomes Information For Undergraduates

Standards and Protocols for the Collection and Dissemination of Graduating Student Initial Career Outcomes Information For Undergraduates National Association of Colleges and Eployers Standards and Protocols for the Collection and Disseination of Graduating Student Initial Career Outcoes Inforation For Undergraduates Developed by the NACE

More information

Partitioning Data on Features or Samples in Communication-Efficient Distributed Optimization?

Partitioning Data on Features or Samples in Communication-Efficient Distributed Optimization? Partitioning Data on Features or Saples in Counication-Efficient Distributed Optiization? Chenxin Ma Industrial and Systes Engineering Lehigh University, USA ch54@lehigh.edu Martin Taáč Industrial and

More information

SOME APPLICATIONS OF FORECASTING Prof. Thomas B. Fomby Department of Economics Southern Methodist University May 2008

SOME APPLICATIONS OF FORECASTING Prof. Thomas B. Fomby Department of Economics Southern Methodist University May 2008 SOME APPLCATONS OF FORECASTNG Prof. Thoas B. Foby Departent of Econoics Southern Methodist University May 8 To deonstrate the usefulness of forecasting ethods this note discusses four applications of forecasting

More information

Cost Analysis of NEMO Protocol Entities

Cost Analysis of NEMO Protocol Entities Cost Analysis of NEMO Protocol Entities Md. Shohrab Hossain Mohammed Atiquzzaman School of Computer Science, University of Oklahoma, Norman, OK 73019. Email: {shohrab, atiq}@ou.edu William Ivancic NASA

More information

Option B: Credit Card Processing

Option B: Credit Card Processing Attachent B Option B: Credit Card Processing Request for Proposal Nuber 4404 Z1 Bidders are required coplete all fors provided in this attachent if bidding on Option B: Credit Card Processing. Note: If

More information

Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols

Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols Er. Pooja Kamboj Research Scholar, CSE Department Guru Nanak Dev Engineering College, Ludhiana (Punjab) Er.

More information

Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network

Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network Jianguo Cao School of Electrical and Computer Engineering RMIT University Melbourne, VIC 3000 Australia Email: j.cao@student.rmit.edu.au

More information

A Review of Network Based Mobility Management Schemes, WSN Mobility in 6LoWPAN Domain and Open Challenges

A Review of Network Based Mobility Management Schemes, WSN Mobility in 6LoWPAN Domain and Open Challenges , pp.85104 http://dx.doi.org/10.14257/ijfgcn.2014.7.5.08 A Review of Network Based Mobility Manageent Schees, WSN Mobility in 6LoWPAN Doain and Open Challenges Riaz A Khan a and A H Mir b a,b Departent

More information

Bluetooth voice and data performance in 802.11 DS WLAN environment

Bluetooth voice and data performance in 802.11 DS WLAN environment 1 (1) Bluetooth voice and data performance in 802.11 DS WLAN environment Abstract In this document, the impact of a 20dBm 802.11 Direct-Sequence WLAN system on a 0dBm Bluetooth link is studied. A typical

More information

Seamless Handover of Streamed Video over UDP between Wireless LANs

Seamless Handover of Streamed Video over UDP between Wireless LANs Seamless Handover of Streamed Video over UDP between Wireless LANs Ger Cunningham, Seán Murphy, Liam Murphy Department of Computer Science University College Dublin Dublin, Ireland {ger.munningham,liam.murphy@ucd.ie,

More information

Analysis of Mobile IP in Wireless LANs

Analysis of Mobile IP in Wireless LANs ENSC 835: COMMUNICATION NETWORKS FINAL PROJECT PRESENTATIONS Spring 2011 Analysis of Mobile IP in Wireless LANs www.sfu.ca/~bshahabi Babak Shahabi (bshahabi@sfu.ca( bshahabi@sfu.ca) 301102998 Shaoyun Yang

More information