Академический Документы
Профессиональный Документы
Культура Документы
A THESIS
DOCTOR OF PHILOSOPHY
ANNA UNIVERSITY
CHENNAI 600 025
ii
CERTIFICATE
The research work embodied in the present thesis entitled FAST AND
Communication Engineering. The work reported herein is original and does not
form part of any other thesis or dissertation on the basis of which a degree or
acknowledged and has not been copied from other sources or been previously
ABSTRACT
TABLE OF CONTENTS
CHAP
PAGE
TER TITLE
NO
NO
ABSTRACT iii
LIST OF TABLES xii
LIST OF FIGURES xiii
LIST OF ABBREVIATIONS xv
1 INTRODUCTION 1
1.1 OVERVIEW OF MOBILE COMMUNICATION 1
1.2 BACKGROUND OF THE STUDY 2
1.3 MOBILE HANDOFF 5
1.3.1 Reasons for Handover Failures 5
1.3.2 Handoff Prioritization 6
8
1.4.2 Soft Handoff
1.4.3 Horizontal Handoff 8
1.4.4 Vertical Handoff 9
1.4.5 Intra system Handover 10
Authentication
1.6 HANDOFF DECISIONS 15
1.6.1 Network-Controlled Handoff 16
1.6.2 Mobile-Assisted Handoff 16
1.6.3 Mobile controlled handover 16
1.7 RAT SELECTION 17
1.7.1 RAT Selection Algorithms 17
1.7.2 Challenges in Multi RAT 18
1.8 RESEARCH OBJECTIVES 19
1.9 ORGANIZATION OF THESIS 19
2 LITERATURE REVIEW 21
2.1 INTRODUCTION 21
2.2 ASPECTS OF CLOUD-RAN 21
2.3 OPTIMIZATION TECHNIQUES FOR WCN 24
2.4 HANDOVER IN MOBILE 27
COMMUNICATION
2.5 RE-AUTHENTICATION METHOD IN 29
MOBILE COMMUNICATION
2.6 RESEARCH PROBLEM 30
3 SON BASED SEAMLESS RAPID AUTHENTICATION 32
PROTOCOL FOR MOBILE COMMUNICATION
3.1 INTRODUCTION 32
3.2 SELF ORGANIZING NETWORKS 34
3.2.1 SON Self Configuration 34
3.2.2 SON Self Optimization 35
3.2.3 SON Self Healing Networks 35
3.2.4 SON Functionalities 35
3.3.5 Features of SON 52
3.3 Cloud-RAN Architecture 38
3.5 SUMMARY 50
4 OPTIMIZED CHANNEL SELECTION IN WIRELESS 51
COMMUNICATION ENVIRONMENT USING
ARTIFICIAL IMMUNE SYSTEM
4.1 INTRODUCTION 51
4.2 CHANNEL SELECTION STRATERGIES 52
4.2.1 Goals of Channel selection strategies 52
4.2.2 Nature of Channel selection strategies 53
4.2.3. Types of channel selection strategies 54
4.3 ARTIFICIAL IMMUNE SYSTEM 54
4.3.1 Steps in Artificial Immune System 55
4.6 SUMMARY 72
5 FAST INTER-RAT HANDOVER ESTIMATION FOR 73
INTELLIGENT RE-AUTHENTICATION USING
LLR-EAP IN HETNET
5.1 INTRODUCTION 73
5.2 EXTENSIBLE AUTHENTICATION 75
PROTOCOL (EAP)
5.2.1 EAP Methods 75
5.3 LOG LIKELIHOOD RATIO (LLR) 79
ALGORITHM
5.3.1 Log Likelihood Ratio-Weight Factored 81
Distribution Algorithm (LLR-WFD at
Node/Base Station.
LIST OF TABLES
x
TABLE
TITLE PAGE NO
NO
1.1 Evolution of Wireless Communication Networks 3
6.1 Simulation evaluation parameter values 105
6.2 Performance comparison among RSS, ACO and 110
AIS
6.3 Simulation Parameter Settings 117
LIST OF FIGURES
LIST OFABBREVIATIONS
2G : Second Generation
3G : Third Generation
4G : Fourth Generation
ABW : Available Bandwidth
ACO : Ants Colony Optimization
BBU : Baseband unit
BS : Base Station
xiii
CHAPTER 1
INTRODUCTION
Networks/
1G 2G 3G 4G 5G
Parameters
Technology GSM GPRS UMTS LTE SON
Bandwidth 2 KBPS 64 KBPS 2 MBPS 1 GBPS >1 GBPS
4
Core Packet
PSTN PSTN Internet Cloud RAN
Network Network
OFDMA,
FDMA, OFDMA,
Multiplexing FDMA CDMA SCDMA
CDMA SCDMA
&VFDMA
Digital Mobile Dynamic
Video
Service Voice Voice, Video and Information
Conference
SMS RTA Access
Handover 2000 1000
300 mSec 20 mSec <5 mSec
Delay mSec mSec
Handover GSM- EAP- UMTS- EAP-AKA, In
Protocol AKA AKA AKA ERP-AKA Research
When a phone call in progress is rerouted from its source cell to a new target
cell, the scenario is called handoff or handover. In terrestrial cellular networks,
the source and the target cells may be serviced from two different cell
locations or from one and the same cell location. Such a handoff, in which the
source and the target are not identical cells, even though they are on the same
cell site, is called inter-cell handoff. The inter-cell handoff is applied to
maintain the call as the end user is moving away from the region covered by
the source cell and entering the region of the target cell.
A possible special case is that the source cell and the target cell are the one and
the same cell and only the channel in use is changed during the handoff. This
is called intra-cell handoff. The intra-cell handoff is applied for changing one
channel, which may be interfered by external sources or else fading with
another clearer or less fading channel.
When the mobile handset is moving away from the region covered by one cell
and entering the region covered by another cell, the current call is shifted to
the second cell in order to avoid call disconnection when the phone becomes
out of range of the first cell;
when the capacity for establishing new calls of a given cell is exhausted and an
existing or new call from a phone, which is located at the overlapping area of
another cell, is shifted to that cell for freeing-up some capacity in the previous
first cell for some other users, who can only be in connected status to that cell;
Different systems have different techniques for managing the handoff request.
Some systems handle handoff in a similar way as handling new source call. In
such system the probability that the handoff will not be serviced is same as the
blocking probability of new source call. But if the call is ended suddenly in the
middle of conversation, then it is annoying a lot than the new originating call
being blocked. So for avoid this sudden ending of ongoing call, handoff
request should be offered priority to new source call.
Hard HO is the one in which the channel in the call originating cell is released
and only then the channel in the destination cell is engaged. Thus the link to
the source is broken before or 'as' the connection to the target is made for this
reason they are also called break-before-make. Hard handovers are intended as
instantaneous for minimizing the disturbance to the call. It requires the least
processing by the network providing service. When the mobile handset is
between two base stations, then the handset can switch with any of the base
stations, so that the base stations bounce the connection with the handset back
and forth. This process is called 'ping-ponging'.
8
A merit of the hard handover is that at any given time, one call utilizes only
one channel. The hard handover event is indeed very short and usually is not
noticeable by the user. Another advantage of the hard handover is that the
handset's hardware does not need to be capable of receiving two or more
channels in parallel, which makes it cheaper and simpler. A disadvantage is
that if a handoff fails, the call may be disturbed for a short instance or even
ended abnormally. Technologies which use hard handoffs usually have
procedures which can re-establish the connection to the source cell if the
connection to the target cell cannot be made. However reconnecting this link
may not be possible always (in which case the call will be ended) and even
when possible the procedure may cause a temporary interruption to the call.
Soft HO is one in which the channel in the source cell is engaged and used for
a shorter time simultaneously with the channel in the target cell. In this
scenario, the link to the target cell is established before the connection to the
source cell is broken, hence this handoff is called make-before-break. Softer
handoffs are achievable, when the cells involved in the handoffs have a single
cell site.
One major advantage of the soft handoff is that the link to the source cell site
is broken only when the link to the target cell has been established and
therefore the probabilities that the call will be ended abnormally due to failed
handoffs are lower. In a mobile cellular network, the majority of the handoffs
occur in places of poor coverage, soft handoffs bring a major enhancement to
the reliability of the calls in these locations by simplifying the interference or
the fading in a single channel. This advantage comes at the cost of more
complex hardware in the mobile handset, which must be capable of processing
several channels simultaneously.
When a mobile station shifts an end users session from one network to
another, the IP address of the user will change. Mobility Management is used
for allowing the corresponding node that the MS is communicating by finding
it correctly so that the session is allowed to continue. The Mobility
Management issue can be shorted out in various layers like Application Layer,
Transport Layer, IP Layer, etc. The general method is to apply SIP (Session
Initiation Protocol) and Mobile IP.
If during the ongoing call, mobile handset moves from one cell site
to a different cell site which is regulated by different (MTSO)
Mobile Telephone Switching Office, a handover procedure is used
for avoiding the dropping of call is known as Inter System Handoff.
An MTSO involves in this handoff process. When a mobile signal
becomes very weak in a given cell and MTSO cannot find other
11
cell within its systems range to which it can switch the call then it
utilizes Inter system handover.
Inter-RAT Handover
If during the ongoing call, mobile handset moves from one cellular
site to adjacent cell site which is controlled by same MTSO, a
12
Intra-RAT Handover
Intra-RAT handover occurs when a user moves from one 3G cell to another.
The user, in this case remains in the 3G network. Network designers try to
ensure that the network has enough resources to carry out an Intra-RAT
handover as Inter-RAT can result in the call being dropped at times. Inside the
intra-RAT HO the focused on cell is dispense in a few BS associated by a
comparative Mobile station. The Mobile station contacts the focused on BS for
distribution of the predefined resources and educate the BS once they area unit
prepared. At the point, when the triple-crown resources allotment is given and
the Mobile station educated to access the new channel and furthermore the
choice is transferred to the new BS (Thomsen, J. M., et al., 2003).
The aim of the protocols is to set up a key, i.e., Pairwise Master Keys
(PMKs) as aware from IEEE 802.11i to MC and the handoff destination
TMRs. Once the MC confirms to interact to one of the TMRs, the two can just
use the established PMK to bring out the 4-way handshake rather than
processing a full EAP authentication. Thus, the re-association time delay (or
13
handoff delay), when shifting from one MR to the other, can be maximally
decreased.
2) Key Distribution: In accordance with the EAP security format, all the
handoff keys are produced by the AAA server and the MC. The EMSK seldom
leaves the AAA server. In these handoff procedures confidential, reliable,
integrity protected and genuine key transport from AAA to the TMRs is
ascertained using IPsec. The needed security association is set up when TMR
links the WMN. The transporting key material from an AAA to NAS is
finished by the standard utilization of EAP over RADIUS. However,
proactively distributing handover keys to TMRs is not yet solved by any
standard. Therefore a key transport protocol between AAA and TMRs is
designed and implemented, which is used in these novel protocols. In this
protocol, the TMRs snoop for incoming key distributions from the AAA
server. The IPsec SA which was developed upon the initial authentication of
the TMR ascertains that only genuine and integrity protected key distributions
can be accepted on this link. Confidential, reliable, integrity protected and
genuine delivery of the parameters needed to produce the handoff keys at the
MC is ascertained by the utilization of the PAK of the FSASD key hierarchy.
parties are (1) an MC, (2) an MR as the handoff target, and (3) the AAA which
is accompanied in the handoff key generation. It is assumed that both, the MC
and the TMR have been authenticated using EAP i.e., they share particular pair
of cryptographic keys with the AAA server which are vital to make secure the
key derivation and the key transport. For the realization purpose, the 802.11
wireless beacon is extended using a specific vendor based Information
Element (IE) having the IP address of the TMR. The MC can get the IP
address from the beacon to start communicating with the TMR on the network
layer.
The above three choices are used to choosing the target network with
the help of selection parameters shown in figure 1.2.
16
The RAT selection algorithm aims to assure the client's QoS demands
and to reduce the congestion, balance the traffic load and maximize the overall
network reward. The RAT selection algorithms can be categorized into
centralized such as load-balancing algorithm and policy based algorithm or
distributed algorithms such as service based algorithm. Centralized RAT
selection algorithms have the benefit of considering more criteria during
18
1. To pick the best BBU in Cloud RAN utilizing SON based Simple
Lightweight Seamless Handover Rapid Re-validation Protocol (3SH-
RRP).
20
The entire research work presented in the form of a thesis and it has
organized in seven chapters.
CHAPTER 2
LITERAURE SURVEY
1.1 INTRODUCTION
previous ten years and can proceed to develop at a rate of 53% of every year
from 2015 to 2020. Most importantly, mobile video activity represents more
than half of the mobile data traffic. Also, mobile gadgets have become more
intelligent in their processing capabilities and new gadgets emerge as wearable
gadgets and sensors. This results in expensive M2M networks in cutting edge
mobile networks (Ahlgren, B et al., 2012).
common sense of the RAN. The confined BBU grants deftness, faster
administration conveyance, value reserve funds, and enhanced coordination of
radio capacities over a gathering of RRHs. furthermore, an assortment of
BBUs might be aggregative to make a Centralized Baseband Unit (C-BBU) as
portrayed in the figure, demonstrating the relocation from existing RAN
configuration to the C-RAN development. The C-BBU could be another RAN
configuration that is a two-dimensional bunch of RRHs and BBUs.
Loveneet Kaur Johal (2016) proposed algorithm uses hybrid of Fuzzy logics
and AHP to allot weights to the parameters and since the algorithm is utility
based, the network are ranked using simple weighted sum of the parameters.
The proposed algorithm selects the network which satisfies all the network
selection criteria. Higher the level of user satisfaction served by the network,
more it is suitable for handover in heterogeneous environment. It provides
higher level of user satisfaction and well suited for random and imprecise
wireless environment since it makes use of fuzzy logics instead of crisp
values.
Lin et al., (2010) has found that a skilled combination of two or more
meta-heuristic techniques, as called hybrid heuristics, can improve the
performance especially when dealing with the real-world and large scale
problems. It is believed that by combining the advantages of different methods
in a complementary way, more efficient approaches can be developed.
Therefore, the hybrid particle swarm optimization, hybrid artificial immune
algorithm (Ge et al 2008), hybrid genetic algorithm (Goncalves et al 2005) and
other meta-heuristic algorithms for the job shop scheduling are seen in the
literature.
Coello et al., (2003) carried out work in artificial immune system that
the meta-heuristics algorithm usually can obtain fairly satisfactory solutions,
28
while the solution processes are always time-consuming and vary dramatically
according to their parameters and structure. In addition, it has become evident
that the concentration on a sole meta-heuristic has some limitations.
frameworks going at around 300km/h. in order to adjust Wi-Fi for prime speed
mobile communication, we tend to upgraded its scope on a rail track with a
created airborne, that includes a communication shift of around 500m by
10mW. With the radio wire, be that as it may, a mobile element needed to alter
over receiving wires (a layer two relinquishing (L2HO)) every about six to
seven seconds. What is more Mobile IP relinquishing (a layer three
relinquishing (L3HO)) must be befittingly controlled to stay away from a
concurring handover of Layer two and three, which closes amid a deadly
communication disturbance. So, the outlined framework has separated a L3HO
from a L2HO. As a result, the vast majority of 25Mbps with a mean of
16Mbps for the UDP outturn and a mean L2HO time of 110ms were realized
whereas movement at 270km/h.
CHAPTER 3
3.1 INTRODUCTION
existing network.
called Cloud-RAN which is the core network integrated with SON. Although
SON makes it possible to reduce the overall delay and enhance
throughput, when the critical issue of the network is very high i.e., down
time or increased latency of the network may not be acceptable in such
areas. To handle such situations, a superficial or an intelligent method
within SON to perform rapid re-authentication is needed so that an endless
handover within this inter-RAT is possible to have. So, 3SH_RRP protocol
that performs the task of evaluating is proposed by using the weighted
factors to maximize the log likely hood probability of successfully choosing
the best suitable BBU prior to perform super-fast or rapid re-authentication
during HO. The proposed algorithm is a fusion of probabilistic LLR (Log
Likehood Ratio) and weighted parameters (WFDA) used by SON for the
process of decision making. 3SH_RRP protocol is put into action in SON
which gives more better results as it removes the involvement of too many
network elements causing severe processing overhead and multilevel
communications in comparison with the other known works. This research
helps service provider to offer spectrum of efficient distribution of services.
Simulation is done using the test bed setup which is evaluated using OMNET+
+ simulation engine. Moreover, the simulation-based investigation has
shown that the application of 3SH_RRP has the ability to perform endless
handover to networks with low latency and enhanced quality of service
for user accessing multi-media services.
There are three main areas over which the SON operate.
There are numerous major factors that influence the mobility robustness within
the SON self-optimization. Cell changes are one of the major issues, and they
start to occur relying upon the signal strength indications. As cell handover is
the pertinent issue, it is mandatory to categorize the two main types of
handover, and to perceive their operation. In this way, solutions and their
approaches can be better known:
These types of cell handover provide a deep insight into few problems that can
take place with handover. To minimize the number of issues that take place,
SON self-optimization procedures give a number of abilities that can mitigate
the handover issues:
system setting up complexity, the BBU assignment for each RRH could be set
up in a centralized or decentralized way relying on various resource
management techniques in BBU pool. It offers the means to selectively turn
on/off the RRHs on par with the traffic instabilities in different situations.
Front haul is the interface between BBUs and RRHs, and its distinctive
protocols are the common public radio interface (CPRI) and the open base
station architecture initiative (OBSAI). Front haul network can be established
by various technologies, such as optical fiber communication, standard
wireless communication or millimetre wave communication. In general, front
haul is classified as ideal without any constraints and non-ideal with
bandwidth, delay and jitter constraints. Optical fiber without constraints is
regarded to be the ideal front hauls for Cloud-RANs because it can offer a high
transmission bandwidth with high cost and un-flexible deployment. But
41
To simulate the test bed, three different access networks are first erected,
Figure 3.4 UE moves away from transmission range of current network (2G)
into new network (3G) in Proposed Cloud-RAN
Serve several users based on their needs and demands via dynamic self-
organizing client service management.
In this proposed work, UE specify Log Like hood Ratio weight factor
distribution (LLR_WFD) algorithm is loaded in SON.3SH_RRP use the
LLR_WFD algorithm to select the best wireless access network for secure
45
Where,
P min unstable - The threshold of the received signal at which handover will
be initiated. Handoff situation as defined by optimizing the
.
Step 2: UE gets registered with SON. SON triggers 3SH_RRP. SON starts
3SH_RRP protocol considering MR components measured for each BBU from
different RH/RRH.
Step 3: SON auto-configures and tunes the network with respect to UE's MR.
SON utilizing the pre-authentic information or statistical data along with
maximum likelihood estimation (3SH_RRP process) maximize the capacity of
choosing the most ideal BBU to which the UE can perform HO. 3SH_RRP
process starts a simple light weight computational procedure to identify using
the weight components (WB, WP, WS, WR) estimate and computes the
Maximum log likelihood ratio of picking the best BBU according to the UEs
requirement for HO.
Step4: Using 3SH_RRP calculation, the best BBU is picked according to the
UEs requirement for HO. SON finds the best BBU for UE's HO utilizing the
3SH_RRP procedure and the ideal BBU is selected.
Step 7: SON after receiving the response of UEs readiness for HO, sends a
request to at Home Subscriber Server (HSS) server to check if they chose
BBU has every one of the service approved for resource allocation for the UE.
HSS confirms resource assignment for UE.
48
49
Step 10: Right now, UE has been physically hand over to the new BBU, yet
perform the authentication. UE performs Inter-RAT handover from the current
RH/RRH to the chosen RH/RRH and gets totally withdrawn from the current
RH/RRH. In this way, the Inter-RAT handover is accomplished from the UE to
the chosen RH/RRH effectively. Once the Inter-RAT handover from the UE to
the target RH/RRH is effectively finished, authentication process is started at
the serving RH/RRH.
Step 13: SON receives the authentication endorsement request from UE.
Utilizing the current secured tunnel set up amongst SON and HSS for
communication, SON forward the request to HSS. HSS receives the
50
Step 16: Resource requested by UE is then allocated via the new RH/RRH.
UE is services with requested resources via the new RH/RRH.
3.5 SUMMARY
CHAPTER 4
4.1 INTRODUCTION
various channels available in the network. In this work, proposed AIS-CS (AIS
based Channel selection) protocol stored in Base station or BBU to select a
best channel/ Remote Head an Artificial Immune System is utilized for
optimizing the channel allocation and assignment by investigating the
attributes of the channels.
Channel selection is the most important part of this work. In actual fact, for
routing protocol performance, it is most important that channel selection
approach ought to efficient, because without efficient channel selection,
routing protocol cannot execute well. The Channel selection strategies, which
include optimization of throughput, delay, channel switching, etc. Each
channel selection strategy in CRNs has a character, based on the reaction of
PUs appearance. Normally, by nature, channel selection strategies are divided
into three major categories (1) proactive, (2) threshold-based and (3) reactive.
From the algorithmic perspective, generally channel selection strategies are
divided into two main categories which are (1) centralized and (2) distributed.
There are different goals behind the design of each channel selection strategy.
One of the major goals of channel selection strategies is throughput
maximization. Throughput is generally defined as average rate of successful
delivery of messages per second over a communication link. Delay
minimization is another important goal of channel selection strategy. In
channel selection, delay minimization includes minimizing channel switching
delay. Channel switching delay occurs when a node switches from one channel
to another and assigns it on its radio interface. Another important goal is
routing in which the goal of channel selection strategy is to assign channels in-
order to fulfill routing requirements. In CRNs, routing requirements for
53
channel selection includes channels with low PU activity, high bandwidth, less
interference, maximum connectivity, etc.
Proactive (predictive)
Threshold-based:
In threshold-based channel selection schemes, PUs use their channels all the
time and SUs have no available idle channel. Thus for such channels, a
threshold is defined, below which, there is no harmful interference to PUs.
Thus SUs utilize these channels as long as interference is below the threshold
level.
Reactive:
information is passed to other SUs and then SUs switch to another available
channel.
There are two types of channel selection strategies. One is centralized and
other is distributed. Both have their own advantages and disadvantages. These
are described below in some details.
from medium to large in size. In this work, AIS is applied for a hybrid channel
selection and assignment algorithm. It is a large size population which
represents solution of the problem, whereas each solution is represented as a
chromosome. Collection of chromosome forms a population. In a human body,
chromosome consists of numerous genes and it is represented in binary form.
Each bit in the chromosome denotes a gene. Chromosomes are also called as
individuals or strings. From the available population, AIS selects the best
possible solution on the basis of a Fitness Function (FF) value (also called as
threshold value) which is defined by the end user in accordance with the
problem solution requirement. The FF is unique for each problem to be
optimized. The fitness of the entire chromosome existing in the population is
measured and the best one is chosen. AIS ensures a fast paced convergence to
the near-optimal solution. Any problem which is represented as an
optimization problem can be solved using AIS. This process is repeated in an
iterative manner until meeting the termination condition reached or the
iteration reached. In this work, AIS is utilized for selecting the best channel
suit for present cellular communication in the WCN. The attributes of the
channels are taken as a chromosome and investigated by comparing with the
FFV. The channel is termed as the selected one which meets the FFV in less
convergence rate and which is well suitable for the cell.
AIS Algorithm
AIS Flowchart
The flowchart of AIS algorithm is shown in figure 4.1. It shows that the functions of
AIS algorithm.
57
domains, and share properties with artificial neural networks (Timmis, et al.,
2000).
encountered antigens. So next time when the same antigen is detected, the
memory cells generate a faster and more intense response (secondary
response). Memory cells work as an associative distributed memory.
It is well known and clear that mobile nodes are participating and
interacting with the WCN, it is necessary to understand that they involved in
61
There are chances when two channels can use same frequency
and it is called co-channel cells. Similarly if the channels used in one site
are repeated in other site then the capacity of the system increases. At the
62
same time, cells become close to each other co-channel interference may
occur. In order to avoid co-channel interference the cells must be
located little far away from that cell unit. Similarly, cells may use the
same channel, so that they should be placed in a distance. It can be avoided by
placing the cells with a defined radius R and in reuse distance D. So, the co-
channel interference is measured as D/R.
D/R = (3N)1/2
total demand D = i =1 di
N
to verify the distance among the cell i and j. In case of two channels and
are assigned to, two cells as i and j then the minimum distance which other
users in different cells must have in order to use the same channel. The
following parameters are considered under certain constraints for selecting a
channel and assign.
min(st) : Minimum set up time taken for a new connection
min(fd) : Minimum load distribution
ft : fault tolerance
S : Scalability
Co : Computational overhead
min(ho) : Minimum handoff
nca : Number of calls accepted parallel
N
Objective Function OFV= max w Th
n n
n -1 (4.2)
The main objective of OFV is finding the maximum of weighted sum of all
users average throughput during the slot T, by choosing optimal mode at each
period. The weight of each user is represented as for helper user. Maximum of
average throughput, minimum energy consumption and less day are the
66
objective function. Base station does the optimization problem and intimates
the selected mode to each user as the result of scheduling.
Mode based selection metric is represented as.
Where, fch is the channel optimization function for WCNn, and it can be
calculated as:
(4.3)
N(Qn s ; j) is the normalized QoS parameters, Q ns;j represents the best quality
of channel carry out service s in cell C, on network n. fchs;j (ws;j) represents the
weighting function for service sand E chs;i represents the elimination factor of
67
For all ch
Where, ch is the set of channels is perceives and Q(ch) is the set of quality of
levels at which the channel ch can be selected for the channel allocation and
services under consideration. Each qi represents various QoS parameters of
a channel like bandwidth, RSS and roaming access etc.
(4.5)
4.5.1 Initialization
P = 50, 100
R = 10%, 20%
S = {1, 1, 1, 0, 1, 0, 1, 0, 0}
One clone is the original copy of one string. In order to enhance the
optimization accuracy, it is mandatory to generate more number of solutions.
70
So, with respect to ROC value, new clones are produced. If the ROC value is
1.4, then the new number of clones is 2. This process increases the temporary
population of the clones and it is known as Clonal Expansion.
4.5.5 Mutation
ascending order according to the OFV value. From that the top 50 populations
are only taken for further process and the remaining populations (more than
50) are eliminated from the list.
4.6 SUMMARY
CHAPTER 5
5.1 INTRODUCTION
and the AP use MSK to obtain a novel session key called the Transient Session
Key (TSK), to be utilized for secure data link communications between them.
TSK is obtained from MSK by applying the 4-way handshake protocol
established in the IEEE 802.11i standard. EAP-AKA bears a relaxed version of
full authentication known as fast re-authentication. Fast re-authentication is
either triggered or activated in a periodical manner whenever a WLAN-UE is
associated with a new access point. In fast re-authentication, the HAAA lacks
the need to draw out a new group of AV from the HLR/HSS, but it reuses the
AV which is received previously to obtain a novel set of keys comprising a
new MSK. The total authentication delay is decreased by the amount of time it
takes the HAAA to draw out AV from the HLR/HSS. It is vital to reduce the
time taken by it to re-authenticate the WLAN-UE. This is due to the quality of
service (QoS) practiced by real-time applications executing on the WLAN-UE
is significantly influenced by the re-authentication time delay. So, re-
authentication delays must be reduced in a much greater manner. Figure 5.2
depicts the fast re-authentication protocol in EAPAKA.
79
While the fast re-authentication executes better in comparison with the full
authentication in terms of time delay, the WLAN-UE is still authenticated by
the HAAA situated in the 3G home network. The communication linkage
between the WLAN AAA server (WAAA) and HAAA is experiencing
somewhat large time delays if two or more AAA proxy servers divide the two
networks. In custom, the HAAA is busy at all times in responding the
authentication requests from the other WLAN-UEs. Because of this process,
additional time delays are introduced. Hence, WAAA-HAAA link delay and
HAAA execution delay considerably raise the total authentication time delay
of fast re-authentication. In this work, a new re-authentication protocol is
proposed which entrusts WLAN-UE authentication scheme to the WAAA as
opposed to the HAAA. Hence, WAAA-HAAA link delay and HAAA
80
execution delay are entirely eliminated from the total authentication delay. In
the proposed work, the HAAA offers appropriate privileges to the WAAA in
order to locally authenticate the WLAN-UE.
p( y )
Lx = log
p( x )
(5.1)
Step 1: The distribution for the p(x) is taken here is the normal distribution in
order to find the mean and variance for the distribution of the values. The
values of X here are taken from the weight factors and W B, WP, WS and WR
here are considered as the X 1, X2, X3, and X4 so that the mean () and variance
() are calculated.
n
x
i =1 i
m=
n (5.2)
81
n
( xi - m ) 2
s= i =1
(5.3)
n
2
1 xi - m
1
p( x ) = i =1 2
n
s
e
s 2p (5.4)
Step 3: As the mobile station is moving from the target base station the
parameters at the various instants are taken. Let the new instant parameters are
assumed to be Y1,Y2, Y3, and Y4. Now the p(Y) is calculated by the above
process and the value has been substituted at the numerator of Lx. If the
numerator value is high, then the log likelihood ratio function gives the
negative value. Thus the LLR algorithm proves that there is degradation in the
Quality of Service and thus it decides that there is a need for the handover
process in the mobile station.
After the decision has been taken that the handover process is needed for the
mobile station to get the better QoS, the weight factors are sent to the serving
base station (LTE) by the mobile station requesting for the handover process.
In the serving Base Station (LTE), the Log Likelihood algorithm decides to
which base station the mobile station is to be switched to. The LLR algorithm
selects the best network in the direction towards which the mobile station is
82
travelling through. In the serving base station (LTE), the weight parameters are
taken into consideration and cost for the weight factors are to be calculated by
the Cost Factor Algorithm.
Step 1: The cost for the weight factors are calculated by the formula,
(
C f = C ( WB * B 0 ) + ( WS * S 0 ) + ( WP * P 0 ) + ( WR * R 0 ) ) (5.5)
Where, B0, S0, P0 and R0 stands for the available bandwidth, security level,
power level, RSSI value.
Step 2: The normalized cost factor is calculated from the obtained value
I I I I
WB * WS * WP * WR *
Cf = B0 + S0 + P0 + R0
I I I I
max max max max (5.6)
B0 S0 P0 R0
From this value, the cost factor of the persisting network can be found.
Step 3: The log likelihood ratio function has been taken in this step and the
process is same as that of the LLR process that takes place in the base station.
LLR algorithmic rule this research takes the subsequent four parameters into
consideration:
Bandwidth (BW)
The factors that reason importance levels like high, medium, low and
none are IH, IM,IL and 0, respectively, wherever their values are
determined by the mobile system designer, and 0 <IH <IM<IL< 1.
The numbers of various importance levels the user has such that are N H,
NM, NL and NN respectively, wherever NH + NM + NL + NN= 3 (since the
full range of the network parameters that a user may specify is three)
Step 2: The weight factor of the four vital levels when adjusted to user
preferences and battery power are WIH, WIM, WIL and WIN, respectively.
IM
WI M = WI H *
IH
IL
WI L = WI H *
IH
WI N = 0
IM I
( N H *WI H ) + N M *WI M * + N L * WI H * L = Pw
IH IH (5.7)
Step 3: The Weights of four importance levels are calculated by using the
following equations
85
IH
PW
WI H =
( NH * IH ) + ( NM * IM ) + ( NL * IL )
IM
PW
WI M =
( NH * IH ) + ( NM * IM ) + ( NL * IL )
IL
PW
WI L =
( NH * IH ) + ( NM * IM ) + ( NL * IL )
WI N = 0 (5.8)
From these equations the weight factor levels of each parameter are
calculated. These weights factors are given as the input to the Log Likelihood
Ratio Algorithm.
The Mobile Station (MS) and the Base Station (BS) are Software Defined
Radios (SDR), which are reconfigurable wireless communication systems.
Firstly, the Mobile station which has to do handoff is linked with a Current
Base Station (CBS). Measurement Report (MR) is conveyed from all the close
Base stations to MS. The MS examines the MR that belongs to each BS for
data relevance. The weight factors which represent the MR are (Bw, SL, PL, Rs)
i.e. weight parameters for selecting target base station comprises Bandwidth,
Security level, Power Level, and RSSI (Received Signal Strength Indicator).
MR is the value received from the MS that have information about channel
quality. Measurement reports aid the network in accomplishing handoff and
power control decisions. Overview of Fast Inter-RAT Handoff in Wireless
Heterogeneous Network is shown in Figure 5.3. MS initiates LLR-WFDA
process using the examined MR received from each base station to select its
optimal base station (to which MS has to perform handoff). The weight
parameters (WB,Wp,Ws,WR) are computed via Weight Factored Distribution
Algorithm based on LLR function (Lx).
After successful processing of LLR-WFDA at MS for each close BS, choice
on optimal BS is obtained by deeming the optimal weight parameter. Mobile
station (MS) alerts the selected (MR) to the target base station. Process flow of
Fast inter-RAT Handover is shown in Flowchart 5.2. IP Gateway (IPGW)
operates as controller interface and administers IP address of all BS and MS.
88
IPGW sends the chosen (MR) request from Mobile station (MS) to the target
base station. Let us take the target base station selected is BS2 (Second base
station). Because all the Base stations (BS) and Mobile stations (MS) have a
copy of LLR-WFDA algorithm, the target base station triggers LLR-WFDA
algorithmic procedure utilizing its MR to authorize, validate and confirm if the
(MR) obtained from Mobile station (MSR) is the same to its generated (MBR).
Successful confirmation at target BS agrees for HO to MS. Hence, the target
base station (BS) agrees the Inter-RAT handover request from the Mobile
station (MS) and reports the agreement response back to the mobile station
(MS) through IP gateway. Once the current base station gets the Inter-RAT
handoff (HO) agreement from IP gateway, indicating that mobile station need
to switch over. IP gateway does a smart task ahead of the mobile user has to
handover to the target base station, sends the HO agreement response to the
present base station (CBS). Further, IP gateway sends a request at Home
Subscriber Server (HSS) and receives a copy of Authentication process of the
target base station. Home Subscriber Server (HSS) will seek for the
authentication process for target base station and holds a replica of the
procedure in the base station. In the intervening time, CBS will send the Inter-
RAT handoff agreement response to MS. Because the target base station has a
replica of Authentication, BS is equipped for processing the authentication
procedure. Once it receives the handoff response from the present base station
(CBS), Mobile station (MS) does Inter-RAT handoff from the CBS to the target
base station and absolutely detaches from the CBS. By this way, the Inter-RAT
handoff is attained from the Mobile Station to the target base station
effectively.
89
protocol has been initiated. In EAP-AKA protocol, there are two major
steps of authentication process occurring namely Full Authentication
and Fast Re-Authentication process. In the full authentication process,
the authentication is performed from the HSS of the WiMAX network.
In the fast re-authentication process, the authentication is performed
with the AAA server. The fast re-authentication occurs if the mobile
station drops the link with the base station. The four stages in the
authentication process are as follows:
Data Encryption: Upon receiving the EAP success message from the
base station, the mobile station gets into the ciphering mode.
92
Home Subscriber Server (HSS) will seek for the particular Re-
authentication procedure for the target base station and send the Rapid Re-
93
Step 4: Based on LLR- WFDA mobile station identifies the optimal base
station.
Step 12: MS performs inter handover from CBS to BS and detached from CBS
Step 13: BS get ready with re-authentication protocol and send request to MS
Step 14: MS resets new re-authentication protocol as per B S request after the
completion of handover.
Step 15: MS trigger the re-authentication protocol and verifies with BS.
Figure 5.8 Sequence flow of secured seamless inter-rat handover and rapid re-
authentication process
5.5 SUMMARY
CHAPTER 6
PERFORMANCE EVALUATION
AND SUGGESTIONS
6.1 INTRODUCTION
Figure 6.2 demonstrates that even with more number of UE, the
proposed 3SH-RRP model, less call interruption ratio can be achieved.
This is because the proposed model manages bandwidth consumption
during more number of UE call inter-RATs through efficient re-
authentication (by enhancing the likelihood ratio for selecting the best
BBU during inter-RAT) restricting the system from extensive call
interruption (back and forth communication is generally diminished). But
in the case of the existing Cloud-RAN system, the call interruption rate
goes high if the number of UE increases. In all the simulation tests, for
performance metrics, an 80% hit rate is utilized with UE density varying in
the order of 100 to 500 in the assumed network set up. If the accuracy is
concerned, the hit rate ought to be assessed based on its performance in
real-time scenario.
101
The resource utilization ratio shown in figure 6.4 depicts that the
cost of accomplishing higher handover ratio in 3SH-RRP model is very
low. For the present Cloud-RAN model, the slope of resource usage rate is
moving up prior to moving down with 250 nodes and continues its uptrend
again with 300 nodes. The reason behind this is because the escalated
count of allowed calls may end up in disappointingly high handover call
dropping rates due to inadequate resources for handover calls. However,
efficient resource managing through LLR-WFD controls the overall
enhancement in 3SH-RRP.
102
and increases its mobility to 120 km/h, which leads to HO failure (as UE is out
of transmission range of 4G) i.e. the UE has detached from 3G network but
cannot perform successful HO to the selected 4G/LTE network due to its
sudden alteration in direction and increase in mobility. Such case leads to HO
failure. A simulation-based investigation of the proposed Heterogeneous
Network scenarios by relying on the OMNET++ with Simu-LTE network
simulation package is presented. A Cloud RAN with SON setup in OMNET++
network model simulator is modelled.
Figure 6.6 and Figure 6.8 depicts that the AIS algorithm can
discover a solution with channel selection and channel allocation failure
probability fewer than the specified value (0.005) and needless channel
comparison for selection-allocation probability fewer than the specified value
(0.005) independent on the mobile users portability. The factors of the
channels analyzed are channel selection and unnecessary channel comparison
probability to the total number of channel accessibility, transmission capacity,
administration, cost and time of administration. In this simulation, AIS is
contrasted with Ant Colony Optimization (ACO) technique to RSS based.
107
From figure 6.8 to figure 6.10, the proposed AIS approach and
ACO approach are contrasted with regard to energy consumption ratio,
security ratio, cost ratio and bandwidth ratio attained during mobility for
several number of channels and users. It is intended to accomplish much
superior performance over ACO, with regard to QoS parameters. The purpose
behind contrasting with ACO is that it is already contrasted with RSS and
HNE based techniques and confirmed it as an improved approach.
109
From the figures, it is lucid and evident that AIS approach obtained
a superior performance than ACO. Moreover, the table 6.2 given below depicts
the consolidated values of bandwidth, service cost, and security and power
usage under different results. It is clear from the table and the figure, when the
number of users is increasing, then a better performance is obtained.
Simulation parameter settings are introduced in table 6.3.
Throughput (bits/sec)
Handover Delay
Re-authentication Delay
End-to-End Delay
6.4.1 Throughput
112
Figure 6.14 and 6.15 depicts the authentication delay and jitter
time observed in due course of the experimental analysis. The
authentication delay (auth) is a critical factor and consisting of three delay
elements such as processing delay (process), transmission delay (Dtransmission) and
propagation delay (Dpropagation). The processing delay (Dprocess) is the delay
experienced by each node in the network while processing cryptographic
operation and key generating accounts. The transmission delay (transmission) is
the delay experienced while transmitting an EAP message and it usually varies
with some factors such as transmission bandwidth and transmission protocol.
The propagation delay (propagation) is the delay experienced while the message
propagates. Considering these delay elements, the Authentication delay is
derived using the below formula:
114
The jitter time (Jtime) in ms is the deviation in time among the packets
arriving at destination caused by network congestion. The jitter can be
calculated by,
= (ni=0 + ) + (6.3)
average number of packets leaving the queue (2685 for AAA server and 1650
for base station) and is the average number of packets arriving at the queue
(50).
= /r (6.4)
Figure 6.15
6.5 SUMMARY
CHAPTER 7
7.1 CONCLUSION
REFERENCES
120
2. Aboba, B., Zorn, G., and D. Mitton, "RADIUS and IPv6",RFC 3162,
August 2001.
5. Ali Al Shidhani, Student Member, IEEE, and Victor C.M. Leung, 2011,
Fast and Secure Re-authentications for 3GPP Subscribers during
WiMAX-WLAN Handovers. IEEE. Vol 8( 5): 699-713.
8. Angoma, B.; Erradi, M.; Benkaouz, Y.; Berqia, A.; Akalay, M.C.,
"HaVe-2W3G: A vertical handoff solution between WLAN, WiMAX
and 3G networks," Wireless Communications and Mobile Computing
conference (IWCMC), 2011 7th International,vol.,no., pp.101-106,4-
8July2011.
121
10. Aymen Ben Zineb, Mohamed Ayadi& Sami Tabbane, 2015, Fuzzy
MADM based vertical handover algorithm for enhancing network
performances, IEEE 2015 23rd International Conference on Software,
Telecommunications and Computer Networks (SoftCOM), pp. 153-159.
20. Cisco Visual Networking Index: Global Mobile Data Traffic Forecast
Update, 2013-2018, Cisco, San Jose, CA, USA, Feb. 2013.
21. Coskun, V., Ozdenizci, B., & Ok, K. (2013). A survey on near field
communication (NFC) technology. Wireless personal
communications, 71(3), 2259-2294.
23. Dondeti, L. and H. Tschofenig, 2007 "Diameter Support for EAP Re-
authentication Protocol", Work in Progress. .
24. Duran-Limon, H. A., Siller, M., Hernandez-Ochoa, M., Quevedo, C., &
Robles, V. (2014). A Network QoS Framework for Real-time Event
Systems in highly Mobile Ad-hoc Environments. Journal of applied
research and technology, 12(3), 343-358.
30. Ge, X., Huang, X., Wang, Y., Chen, M., Li, Q., Han, T., & Wang, C. X.
(2014). Energy-efficiency optimization for MIMO-OFDM mobile
multimedia communication systems with QoS constraints. IEEE
Transactions on Vehicular Technology, 63(5), 2127-2138.
36. Jiahai Wang, Zheng Tang, XinshunXu, Yong Li, A discrete competitive
Hopfield neural network for cellular channel assignment problems,
Elsevier: Neurocomputing., 2005; 67: 436442.
40. Kou, Y., Liu, S., Zhang, W., Shen, G., &Tian, H. (2017). Capacity
allocation mechanism based on differentiated QoS in 60GHz radio-
over-fibre local access network. Optics Communications, 387, 290-295.
41. Kounavis, M. E., Campbell, A. T., Ito, G., & Bianchi, G. (2001).
Design, implementation and evaluation of programmable handoff in
mobile networks. Mobile Networks and Applications, 6(5), 443-461.
45. Liyanage, M., Braeken, A., Jurcut, A. D., Ylianttila, M., &Gurtov, A.
(2017). Secure communication channel architecture for Software
Defined Mobile Networks. Computer Networks, 114, 32-50.
50. Meyer, U., & Wetzel, S. (2004, September). On the impact of GSM
encryption and man-in-the-middle attacks on the security of
interoperating GSM/UMTS networks. In Personal, Indoor and Mobile
Radio Communications, 2004. PIMRC 2004. 15th IEEE International
Symposium on (Vol. 4, pp. 2876-2883). IEEE.
51. Ming-jie FENG1, Shi-wen MAOz1, Tao jiang , 2016 Enhancing the
performance of future wireless networks with software-defined
networking in press.
57. hln, P., Skubic, B., Rostami, A., Fiorani, M., Monti, P.,
Ghebretensa, Z., ...&Wosinska, L. (2016). Data plane and control
architectures for 5G transport networks. Journal of Lightwave
Technology, 34(6), 1501-1508.
126
60. Park, M. K., Choi, Y. C., Lee, J. Y., Kim, B. C., Kim, D. Y., & Kim, J.
H. (2008, December). Design of an Enhanced Handover Algorithm
Based on a New Adaptive SR-ARQ for Next-Generation Mobile
Communication Networks. In Parallel and Distributed Processing with
Applications, 2008. ISPA'08. International Symposium on (pp. 807-
813). IEEE.
64. Prehofer, C., Kellerer, W., Hirschfeld, R., Berndt, H., & Kawamura, K.
(2002). An architecture supporting adaptation and evolution in fourth
generation mobile communication systems. Journal of Communications
and Networks, 4(4), 336-343.
67. Rui Wang, Honglin Hu, Xiumei Yang, 2014, Potentials and Challenges
of C-RAN Supporting Multi-RATs Toward 5G Mobile Networks, vol
2, :1187-1195.
127
72. Saltzer, J. H., Reed, D. P., & Clark, D. D. (1984). End-to-end arguments
in system design. ACM Transactions on Computer Systems
(TOCS), 2(4), 277-288.
75. Silva, F. S. D., Neto, A. V., Maciel, D., Castillo-Lema, J., Silva, F.,
Frosi, P., &Cerqueira, E. (2016). An innovative software-defined
WiNeMO architecture for advanced QoS-guaranteed mobile service
transport. Computer Networks, 107, 270-291.
77. Soh, YS, Quek, TQS, Kountouris, M, Shin, H, 2013, Energy efficient
heterogeneous cellular networks. IEEE J. Sel. Areas Commun. 31(5),
840850 .
82. Sun, S, Kadoch, M, and Ran, T, 2015, Adaptive SON and cognitive
smart LPN for 5G heterogeneous networks, Mobile Networks and
Applications, vol. 20, no. 6, pp. 745755.
86. Tang, C., Naumann, D. A., & Wetzel, S. (2013, November). Analysis of
authentication and key establishment in inter-generational mobile
telephony. In High Performance Computing and Communications &
2013 IEEE International Conference on Embedded and Ubiquitous
129
87. Tseng, Y. M., Yang, C. C., & Su, J. H. (2004). Authentication and
Billing Protocols for the Integration of WLAN and 3G
Networks. Wireless Personal Communications, 29(3-4), 351-366.
90. Wang, S., Lei, T., Zhang, L., Hsu, C. H., & Yang, F. (2016). Offloading
mobile data traffic for QoS-aware service provision in vehicular cyber-
physical systems. Future Generation Computer Systems, 61, 118-127.
94. Wonbo Lee, Jonghoe Koo, Yongseok Park &Sunghyun Choi 2016,
Transfer time, energy, and quota-aware multi-RAT operation scheme in
smartphones, IEEE Transactions on vehicular technology, vol. 65, no.
1, pp. 307-317.
95. Xiao, Y., Leung, K. K., Pan, Y., & Du, X. (2005). Architecture, mobility
management, and quality of service for integrated 3G and WLAN
networks. Wireless Communications and Mobile Computing, 5(7), 805-
823.
97. Yamada, K., Sakai, Y., Suzuki, T., Kawahara, Y., Asami, T., & Aida, H.
(2010, September). A communication system with a fast handover
under a high speed mobile environment. In Vehicular Technology
Conference Fall (VTC 2010-Fall), 2010 IEEE 72nd (pp. 1-5). IEEE.
98. Yan, H., Cheng, W., Wu, D., & Zhu, C. (2007, October). Collaborative
handover support in a heterogeneous wireless environment for real-time
communication in mobile learning. In TENCON 2007-2007 IEEE
Region 10 Conference (pp. 1-4). IEEE.
104. Yokota, H., Chowdhury, K., Koodli, R., Patil, B., & Xia, F. (2010). Fast
handovers for proxy mobile IPv6 (No. RFC 5949).
105. You Wang, Jun Bi &Keyao Zhang 2015, Design and implementation of
a software-defined mobility architecture for IP networks, Mobile
Networks and Applications, ISSN: 1383-469 X (p), 1572-8153 (e), vol.
20, no. 1, pp. 40-52.
131
106. Yu, S., Yoon, S., Lee, J., Kim, H., & Song, J. (2006, April). Service-
oriented issues: Mobility, security, charging and billing management in
mobile next generation networks. In Broadband Convergence
Networks, 2006. BcN 2006. The 1st International Workshop on (pp. 1-
10). IEEE.
108. Zeadally, D, Wu, S., L., & Wang, H. (2016). Analysis of handover
authentication protocols for mobile wireless networks using identity-
based public key cryptography. Computer Networks.
109. Zhaofeng, W., Guyu, H., Seyedi, Y., &Fenglin, J. (2015, August). A
simple real-time handover management in the mobile satellite
communication networks. In Network Operations and Management
Symposium (APNOMS), 2015 17th Asia-Pacific (pp. 175-179). IEEE.
LIST OF PUBLICATIONS
1. Balamurugan, K S, Dr.Chidambararajan, B,
&Dr.PadmanabanRamasamy, 2016, SON based simple lightweight
seamless handover rapid re-authentication protocol for tactical battlefield
wireless communication system, Asian Journal of information
technology, vol. 15, no. 9. pp. 1447-1456, ISSN: 1682-3915.