Ahmed Samy. A short summary of this paper. Abdel-Rahman, N. Semary, H. Mobile WiMAX has been designed with the purpose of enabling mobile Internet from the physical layer to the network layer. In this paper, a comparative study between load balancing techniques in mobile WiMAX is presented. Performance of load balancing techniques have been analyzed and evaluated based on an extensive simulation.
The elaborated performance analysis shows a set of advantages and disadvantages of these techniques. This evaluation study represents an important entry point for choosing the best techniques that can distribute load among BSs and guarantee QoS for all MSs using real-time applications.
These technologies support high speed streaming multimedia, customized personalized services, ubiquitous coverage and QoS. WiMAX appears to be one of the most promising technologies in the last few years. It is based on IEEE The new mobile air interfaces specified in the IEEE The IEEE HHO is less complex, high latency and not suitable for real-time applications.
MAC layer is responsible for packet scheduling, handover, admission control and load balancing mechanism. Researchers start solving these drawbacks by offering some mechanisms to solve these drawbacks that best suited to these particular requirements. Optimal allocation and utilization of radio resources between MS and BS is a major challenge 9]. When congestion occurred in the network, MS service degraded.
Conclusion has been drawn in Section IV. For example, large numbers of Mobile Station MS nodes come to a specific work area every morning. If all MS nodes in this area used network resources or run real-time applications, Serving Base Station BS becomes congested and overloaded.
So, BS resources decreased and affected the performance of real-time applications and MSs admitted service flows decreased. A few paper discussed a load balancing with handover in IEEE However, the deployment of this algorithm requires extensive amount of signaling and presence of a centralized architecture is preferred.
An inter-frequency reuse handover among frequency assignments is suggested to solve unbalanced load distribution in IEEE This scheme is not controlled by network [12]. In 13] the proposed algorithm use dual handover mechanism where MS and BS initiated handovers are used adaptively. However, this procedure is not suitable for real time applications. In 15] a new distributed uplink packet scheduling algorithm in WiMAX networks is proposed. The uplink available resources estimated for each connection in this algorithm to provide required resources and guarantee QoS requirements of each connection in the same time.
Load-states are underloaded, balanced and overloaded. Abdelkader The directed handover procedure will executed as illustrated in Fig. If TBS load-state is balanced or overloaded, it will reject the directed handover but it will accept rescue handover. Rescue handover in 10] is defined as when the MS receive signal strength less than pre-defined threshold then MS will inform its SBS that their link is going down and it needs to switch to another BS.
This technique can prevent "Ping-Pong" effect using hysteresis margin and can balance the load of the system but it doesn't take into account the service level and QoS for MSs that will execute directed HO. A router has a public IP address but devices connected to it are assigned private IPs that others outside of the network can't see.
Dynamic host configuration protocol DHCP : assigns dynamic IP addresses to hosts and is maintained by the internet service provider. Internet service providers ISP : companies that provide everyone with their internet connection, both to individuals and to businesses and other organizations. Some of the things that computer networks are used for include: Communicating using email, video, instant messaging and other methods Sharing devices such as printers, scanners and photocopiers Sharing files Sharing software and operating programs on remote systems Allowing network users to easily access and maintain information Computer Networks Articles Key Networking Terms Open system: an open system is connected to the network and prepared for communication.
As an emerging force in the innovation industry, architects and Design agencies have already demonstrated the value of architectural visual products in Sensing and Compensating the Thermal Deformation of a Computer -numerical-control Grinding Machine Using a Hybrid Deep-learning Neural Network free download thermal error plays a deterministic role in the machining precision of computer Numerical control CNC tool machinery.
In this paper we develop a new e-epidemic e-SVIR through a computer network. Some new researches in this field working on extract Knowledge, rapid information retrieval from the graphical diagram. Therefore, data visualization now trends to use ontology Security Evaluation of Computer Network Based on Hierarchy free download Network security is an important issue that the development of computers faces.
Based on hierarchy, the network security evaluation is researched by using the analytic hierarchy process in this study. The network security was the target hierarchy, and the environment Design and Application of Computer Network Experiment Teaching Content Based on Huawei Technology free download The experimental teaching method of computer network course based on Huawei technology is discussed.
According to the content and characteristics of the route, the experimental guidance of the route is explored from the viewpoint of experimental group Application Analysis of Neural Network in Computer Network Security Evaluation free download Aiming at the problem of low accuracy of traditional computer network security evaluation model, this paper studies the application of neural network in computer network security evaluation, and designs a security evaluation model.
Based on the established computer A. Simulation of computer network with switch and packet reservation free download Simulation model of computer network based on switch Ethernet and redundant transfer is developed and researched. Efficiency of this model using on configurations with different redundancy ratio is defined. The aim of the work is the studying of the redundant transfer in Analysis of Computer Network Technology and Its Application in Practice free download With the continuous development of the times and the progress of science and technology, great changes has also been taken place in peoples social life.
Especially in recent years, as the rapid development of information technology in China, resource sharing, instant Discussion on Application of Data Encryption Technology in Computer Network Communication Security free download With the rapid development of Chinas economy, no matter the intelligence of science and technology, the degree of information intelligence is constantly deepening.
This is the only way for scientific development, but the development of society has gradually proposed Reform of Computer Network Technology Hybrid Experiment Teaching free download The training base is operated around the cultivation of students professional and practical abilities. In order to better play the role of training base, this paper analyses and studies the training needs of network technology training base of modern educational technology Analysis on Problems and Countermeasures of Computer Network Information Security Management free download With the continuous development of science and technology, the number of people online in our country is increasing and tends to form a phenomenon of Internet addiction, which is mainly because the convenience of the network greatly improves the efficiency of peoples Analysis of Computer Network Security Vulnerabilities and Preventive Measures Based on Big Data Thinking free download In the era of big data, network technology has been fully popularized and applied, bringing great convenience to peoples life and work.
0コメント