SlideShare ist ein Scribd-Unternehmen logo
1 von 9
Downloaden Sie, um offline zu lesen
International Journal of Engineering Science Invention
ISSN (Online): 2319 – 6734, ISSN (Print): 2319 – 6726
www.ijesi.org Volume 2 Issue 6 ǁ June. 2013 ǁ PP.47-55
www.ijesi.org 47 | Page
Dns Based On Handover Decision Process Using Mcdm
Techniques
Manikandan.P1
, Suresh Babu.K2
, Siva.S3
, Selva Kumar.A4
#1,2,3
PG Scholar (Department of ECE/Arunai Engineering College, Tiruvannamalai, India)
*4
Asst Professor (Department of ECE/Arunai Engineering College, Tiruvannamalai, India)
ABSTRACT: Dynamic network selection algorithm selects the appropriate network for single or group of
calls from multi mode terminal in heterogeneous networks. Network selection support for a single call is the
existing solution available, in this paper a Dynamic. In this paper a Dynamic network algorithm is used to
addresses the Fuzzy Analytical Hierarchy Process (FAHP). FAHP algorithm is to assign the weight on all other
networks and ranked (prioritised) by TOPSIS (Technique for Order Preference by Similarity to Ideal Solution)
with reduce the number of handoff for long distance communication. The performance measure of proposed
algorithm improves the vertical handoff decision process and the simulated results shows effectiveness of the
algorithm compared with existing system by Ns2.
KEYWORDS - Dynamic Network selection, FAHP, TOPSIS, NS2.
I. INTRODUCTION
Handoff is the process of transferring a mobile user from one channel or base station to another
handoff occur when received signal level drops below a certain threshold level(coverage area) at this time ,
handoff process changing the channel (frequency, time slot or combination of them) associated with the current
connection when the call initiate. Goal of handoff are Low latency, less packet loss, Mobility User preferences.
In Cellular communication, wireless networks depends on network coverage area classified as follow Vertical
handoff and Horizontal handoff. In vertical handoff Network coverage between two different network access
point (Heterogeneous networks) (e.g., GSM, WI-FI between network access).
In recent years, the multimode terminal (mobile) equipped with several wireless access network such
technologies as (802.11) and cellular networks (GPRS, UMTS, HSDPA, LTE, etc.). The evolution of these
technologies will allow the users to access the services simultaneously from these networks.
1.1 Handover Types:
There are two types of handoff. In soft hand-off, the connection with the target station is made before
the connection with the source is broken, so we can also called as make-before-break. Here, both the cells from
source and target are connected in parallel during hand-off. A hard handoff is essentially a ―break before make‖
connection. Under the control of the MSC, the Base station hands off the MS’s call to another cell and then drop
the call. In a hard handoff, the link to the previous BS is terminated before or as the user is transferred to the
new cell’s BS; the MS is linked to no more than one BS at any given time.
II. RELATED WORK
Traditional radio access technology Network-selection algorithms for heterogeneous wireless networks
do not consider the problem of group of calls from a mobile .Multimode terminals have the capability to support
two or more types of call simultaneously.
In [3], Giupponi and Perez-Romero proposed a JRRM algorithm based on fuzzy neural approach for
selecting the most appropriate RAT for an incoming call in HWNs.In [4], Alkhawlani and Hussein proposed an
intelligent RAT-selection algorithm for next generation wireless networks. The proposed algorithm uses a
combined parallel fuzzy logic control and multi-criteria decision-making technique to select the most
appropriate RAT for an incoming call in HWNs. In [5], Zhang proposed a fuzzy multiple attribute decision-
making (MADM) RAT-selection algorithm that uses fuzzy logic to represent imprecise information of some
RAT-selection criteria. The fuzzy MADM method operates in two steps. The first step is to convert the
imprecise fuzzy variables to crisp numbers. The second step is to use classical MADM technique to determine
the ranking order of the candidate networks. The highest-ranking RAT is then selected for the call. In [6],
Xavier et al. presented a Markovian approach for RAT selection in an HWN. They developed an analytical
model for a RAT-selection algorithm in an HWN comprising GSM/EGDE and UMTS. The proposed algorithm
selects just one RAT for each incoming call. In [7], Guo et al. proposed a RAT selection algorithm that uses a
fuzzy multiple objective decision-making techniques to select the most suitable RAT for each incoming call in
Dns Based On Handover Decision Process Using Mcdm Techniques
www.ijesi.org 48 | Page
an HWN. In [8], Wu and Sandrasegaran conducted a study of RAT selection algorithm in a heterogeneous
UMTS-GSM network.
The entire Network selection algorithms reviewed above were designed to select the most
suitable Network for just one incoming call in HWNs. None of the Network -selection algorithms considered the
problem of Network selection for a group of calls (multiple calls) from a multimode terminal (MT) in HWNs.
2.1.TRADITIONAL DIFFERENT SUITABLE NETWORK SELECTION TO SINGLE CALL
HANDLING
In traditional method the number of handoff and individual network can handle only one call at a time
in multi mode terminal because mobiles have to support multicall (high data rate) at a time in heterogeneous
network. So there is no integration of increasing network capacity and num of hand off reduction, high data rate
call handling at same time in existing network selection scheme.
Fig. 1 Same Multi Mode Terminal but Multi Data Rate Call Handling by Dynamic Network at Different Instant
of Time.
III. PROPOSED WORK
 When a new call is initiated on an MT already having an ongoing call in an HWN, the current network may no
longer be suitable for the two calls (incoming call and the existing call). So we need to handle multiple calls at
same time.
 The optimal solution of this problem is to choose suitable network for multiple calls management and provision
of long possible radio link. So we need i integrate a multiple calls used as long as for successful communication.
This possible way is to integrate the network capacity as well as reducing number of handoffs.
 The following are some reasons why it may be necessary to select a single Network for multiple calls from a
multi-mode terminal in HWNs:
(1) To reduce handoff complexity,
(2) To reduce signaling overhead,
(3) To reduce battery power consumption,
(4) To accommodate low-capability mobiles.
 If multiples calls from an MT are admitted into different Networks in an HWN, coordination of handover
procedure among the different Networks will be complicated, and incur excessive signaling overhead.
Moreover, multiple Network interfaces of the multimode mobile terminals will be activated, which may increase
the overall battery power consumption of the multimode terminal.
Dns Based On Handover Decision Process Using Mcdm Techniques
www.ijesi.org 49 | Page
 In addition, some multimode terminals can be connected to only one Network at a time. If these low-
capability multimode terminals are to support multiple services, group decision is inevitable. Thus, it is
necessary to develop an algorithm that will select the most suitable Network for a group of calls from an MT
in HWNs.
3.1 Proposed Algorithms:
The objective of this project is to develop a dynamic Network -selection algorithm for making group
call Network -selection decisions in HWNs.
Fig. 3 Parameter Analyses
Fig.2 Network Selection System Model
Dns Based On Handover Decision Process Using Mcdm Techniques
www.ijesi.org 50 | Page
 The first is the conceptualization of group-call Network selection problem in HWNs.
 The second contribution is the development of a dynamic Network selection algorithm and application of the
TOPSIS group decision technique to solve the problem of Network selection for multiple calls in HWNs.
 The third contribution is the investigation of the effect of Network preference margin on the frequency of
vertical handoff in HWNs.
 We propose an intelligent network selection approach based on weight estimation technique Fuzzy
Analytical Hierarchy Process (FAHP), the Technique for Order Preference by Similarity to an Ideal Solution
(TOPSIS).
 The FAHP method is used to determine a weight for each criterion, and the TOPSIS method is applied to
rank the alternatives.
.
3.2 Fuzzy Analytical Hierarchy Process:
Multi Attribute based Decision Making (MADM) algorithm used to calculate the weight of each
criteria using decision based techniques [2].
Steps:
1. Construct the structuring of alternatives and criteria matrix
2. Construct the comparisons of max and min value in the column matrix
3. Calculating the weights of criterion by decision making techniques.
Step 1: Construct the numerical matrix by using both alternatives and criteria. (i.e.) criteria as Ci where i=1, 2,
3, 4…..N and alternatives as Ai where i=1, 2, 3……N
Find the max, min value column in the decision matrix as aij
⃰
and aij
‫־‬
Determine the individual matrix element in the column of decision matrix by using max, min value Following as
Now the calculated max and min value used of reassigned decision matrix following as
A=
A1
A2
A3
.
.
AN
C1 C2 C3………………… CN
a11 a12 a13 ……………… a1N
a21 a22 a23……………… a2N
a31 a32 a33……………… a3N
. . .
. . .
aN1……………………… aNN
aji -- aij⃰
aij
⃰
-- aij‫־‬ i,j
Xij =
X'=
A1
A2
A3
.
AN
x11 x12 x13… x1N
x21 x22 x23 …..x2N
. .
. .
xN1…………… xNN
C1 C2 C3 C4 ……..CN
Dns Based On Handover Decision Process Using Mcdm Techniques
www.ijesi.org 51 | Page
Step 2: Construct the comparisons of max and min value in column matrix from assigned decision matrix, and
have to find M and S1, S2 parameter.
Where i = 1, 2, 3….n;
j = 1, 2, 3 ….n
After calculating the mij to form the another one decision matrix for calculate S1 and S2 parameters,
Step 3: Calculating the weights of criterion by S2 using FAHP techniques
Wj =
3.3 Technique for Order Preference by Similarity to Ideal Solution (TOPSIS):
Technique for order preferences by similarity to an ideal solution (TOPSIS), known as a classical
multiple attribute decision-making (MADM) method is to order the Rank based on calculated weight [2].
The TOPSIS method evaluates the following decision matrix which refers to N alternatives which are
evaluated using FAHP.
Step 1: Refer the criteria decision matrix and also Weight from evaluated value of FAHP Technique.
Step 2: Construct the Normalized Decision Matrix.
An element rij of the normalized decision matrix (R) can be calculated as follows.
Step 3: Construct the Weighted Normalized Decision Matrix.
A set of weights W = (w1, w2, w3... wN), (where: ∑ wi = 1) defined by the decision maker is accumulated
to the decision matrix to generate the weighted normalized matrix D
D = Matrix of R × unit matrix of W
Step 4: Determine the Ideal and the Negative-ideal Solutions
B*( Ideal) = { (max dij | j € J), (min dij | j € J)| i = 1,2,3, ..., M} i = {1, 2, 3, ..., M}
B⃰ = maximum value of each columns matrix (d1⃰, d2⃰, d3⃰,…….dm⃰)
B '(non-ideal)= { (min dij | j € J), (max dij | j € J)| i = 1, 2, 3, ..., M}
B' = minimum value of each columns matrix(d1', d2’,d3’,..dm')
Step 5: Calculation of the similarity distance.
The N-dimensional Euclidean distance method is next applied to measure the separation distances of each alter
Si* = (∑ (dij - dj*)2 )1/2, i = 1,2,3, ..., M,
Where Si* is the separation (in the Euclidean sense) of each alternative to the ideal solution and negative-ideal
solution.
S i' = ( ∑(dij - dj')2 )1/2, i = 1,2,3, ..., M,
where Si' is the separation (in the Euclidean sense) of each alternative from the negative-ideal solution.
native to the ideal solution and negative-ideal solution
Step 6: Calculate the Relative Closeness to the Ideal Solution.
Ci* = Si' (Si* + Si'), 0 ≤Ci* ≤ 1,
i = 1, 2, 3, ..., M.
Ci* = 1, if Bi = B*, and Ci' = 0, if Bi = B'.
The best satisfied alternative can now be decided according to preference rank order of Ci*. Therefore,
the best alternative is the one that has the shortest distance to the ideal solution (Decreasing Order). The
relationship of alternatives reveals that any alternative which has the shortest distance to the ideal solution is
guaranteed to have the longest distance to the negative-ideal solution.
1+ xij
N
∑ (1+ xij')
i=1
Mij =
n
S2j
∑
i = 1
S2j
Where S1j = -∑ ( mij × ln(mij)) and S2j = 1- S1j
m
i = 1
Rij =
aij
√(∑ a²ij)n
I=1
Dns Based On Handover Decision Process Using Mcdm Techniques
www.ijesi.org 52 | Page
3.4 Comparison between different algorithms is evaluated for dynamic network selection:
TABLE I: Comparison between different algorithms is evaluate to dynamic network selection
FAHP,TOPSIS Algorithms (Network Selection Based
Vertical Handoff In Heterogeneous Wireless Network) [2]
Multi Criteria Group Decision Making, TOPSIS Algorithms
(Dynamic Network Seletion Based Vertical Handoff In
Heterogeneous Wireless Networks) [1]
INPUT PARAMETRES:
1. Terminalside: Battery, Velocity.
2. Serviceside: Qos(AB,D,J,L),Security.
INPUT PARAMETRES:
1.Terminalside: Battery,Velocity
2.Serviceside:Data Rate,Security,Service Cost.
OUTPUT PARAMETRES:
Blocking Probability During Traffic(Streaming,Interactive)
Reduction, Weight Association Criteria,Rank Assignment
Comparison.
INPUT PARAMETRES:
Increasing Preference Margin, Blocking Probability During Traffic
(Streaming,Interactive) Reduction, Weight Association Criteria,
Rank Assignment Ccomparision.
Objective: Reducing Number Of Vertical Handoff. Objective: Multiple Call Handling.
Considering Networks: Wifi,Wi-Max. Considering Netwoks: Wifi,Wi-Max.
Fig. 4 Dynamic Network selection for high data rate call.
IV. RESULT ANALYSIS
4.1 NETWORK PERFORMANCE ANALYSIS:
The graphical result in figure shows that the handoff vs network performance. The plot is for during
processing of multicall handling the handoff and network performance relationship using FAHP method. As can
be seen from the figure that the handoff reduction with throughput increment.. Hence by this the multicall
handling and handoff reduction is done successfully be the algorithms.
4.2 FAHP:
The graphical result shows the relationship between the number of handoff and throughput during
multicall handling using FAHP method. As can be seen from the figure that the handoff reduction with
throughput increment.
Fig. 5 Number of Handoff VS Throughput FAHP Method.
Dns Based On Handover Decision Process Using Mcdm Techniques
www.ijesi.org 53 | Page
4.3 TOPSIS:
In the below graph the number of handoff with throughput of the network is analyzed and the result
shows the performance increases as the number of handoff decreases.
Fig. 6 Number of Handoff VS Throughput TOPSIS method.
In the below graph packet drop ratio for a dynamic network is considered. During multicall handling
packet is dropped when the data rate exceeds the level of network weight.
Fig. 7 Number of Handoff VS Packet Loss TOPSIS method.
4.4 MTOPSIS (FAHP+TOPSIS):
The graphical result shows the relationship between handoff and throughput during multicall handling
using MTOPSIS method. It can be seen from the figure that the handoff reduction results in throughput
increment. Generally the MTOPSIS method recommends the network weight and rank assignment as
effectively. We are considering two networks (wi-fi, wi-max) and its packet loss gives the each network
capacity. It helps to analyze energy awareness as well as distance between two are more base station.
32
772
659
134
4
32 19 160
100
200
300
400
500
600
700
800
900
Throughtvs Handoff
Throughput
Handoff
N
o.
o
f
H
a
n
d
o
f
f
Throughput
74
94
125
31
44
73
0
20
40
60
80
100
120
140
1 2 3 4 5 6
PACKET_DROP
WI-FI
WI-MAX
P
a
c
k
e
t
L
o
s
s
No. of Handoff
Dns Based On Handover Decision Process Using Mcdm Techniques
www.ijesi.org 54 | Page
Fig. 8 Number of Handoff VS Throughput MTOPSIS method.
In the below graph packet drop ratio for a dynamic network is considered. During multicall handling
packet is dropped when the data rate exceeds the level of network weight.
Fig. 9 Number of Handoff VS Packet Loss MTOPSIS method.
V. CONCLUSION
In this project we have presented the weight factor estimation technique for vertical handoff decision
algorithms. In the traditional handoff techniques the number of handoff takes place was more. We are analyzing
FAHP and TOPSIS techniques to reduce the number of vertical handoff but in the traditional handoff
techniques the number of handoff takes place was more and only handling single high data rate call at a time by
dynamic networks. The analyzed FAHP technique to reduce the number of vertical handoff. By implementing
these techniques to reduce the number of handoff and also handles the multiple high data rate calls at the same
time using different available network selection.So FAHP is designed and implemented and the results are
shown in simulation using graph.
In future FAHP and TOPSIS techniques are design and their results are separately simulated and also
focusing on reverse billing concept, the simulation values are compared in graph by using the group decision
making algorithms.
REFERENCES
[1] Dynamic RAT selection for multiple calls in heterogeneous wireless networks using group decision-making technique 389-1286/$
see front matter @ 2012 Elsevier B.V. All rights reserved.doi:10.1016/j.comnet.2011.12.013.
[2] Network Selection Decision Based on Handover History in Heterogeneous Wireless Networks. Lahby Mohamed, Cherkaoui
Leghris and Adib Abdellah,Morocco{mlahby, cleghris, adib_adbe}@yahoo.fr International Journal of Computer Science and
Telecommunications [Volume 3, Issue 2, February 2012].
137
213
399
432
223
57 47 43
0
100
200
300
400
500
Throughput
Handoff
N
o.
o
f
H
a
n
d
o
f
f
Throughput
50
63
83
14 20
44
0
50
100
1 2 3 4 5 6
PACKET_DROP
WI-FI
WIMAX
P
a
c
k
e
t
L
o
s
s
No. of Handoff
Dns Based On Handover Decision Process Using Mcdm Techniques
www.ijesi.org 55 | Page
[3] L. Giupponi, J. Perez-Romero, A novel approach for joint radio resource management based on fuzzy neural methodology, IEEE
Transactions on Vehicular Technology 57 (3) (2008) 1789–1805.
[4] M.M. Alkhawlani and A.A. Hussein, Intelligent radio network selection for next generation networks, in: Proceedings of the 7th
International Conference on Informatics and Systems (INFOS), Cairo, Egypt 28–30 March, 2010.
[5] W. Zhang, Handover decision using fuzzy MADM in heterogeneous networks, in: Proceedings of IEEE WCNC’04, Atlanta, GA,
March, 2004.
[6] X. Gelabert, J. Perez-Romero, O. Sallent, R. Agustı´, A Markovian approach to radio access technology selection in heterogeneous
multiaccess/multiservice wireless networks, IEEE Transactions onMobile Computing 7 (10) (2008).
[7] Q. Guo, X. Xu, J. Zhu, H. Zhang,AQoS-guaranteed cell selection strategy for heterogeneous cellular systems, ETRI Journal 28 (1)
(2006) 77–83.
[8] L. Wu, K. Sandrasegaran, A study on RAT selection algorithms in combined UMTS/GSM networks, ECTI Transactions on
ElectricalEngineering, Electronics, and Communications 6 (2) (2008).
[9] Preethi, J., Department of Computer Science and Engineering, Anna University of Technology, Coimbatore, Jothipuram Post,
Coimbatore, India,‖ A New Hybrid Approach for Heterogeneous Radio Access Technology Selection‖, Journal of Computer
Science 8 (5): 767-774, 2012, Science Publications ISSN 1549-3636 © 2012.
[10] J.Preethi Lecturer, Department of Computer Science and Engineering, Anna University Coimbatore, India. Dr.S.Palaniswami
Professor, Department of Electrical and Electronics Engineering, Government College of Technology, India,‖ A Single Hidden
Layered Fuzzy Back propagation Algorithm for Joint Radio Resource Management in Radio Access Systems‖, (IJCSE)
International Journal on Computer Science and Engineering Vol. 02, No. 04, 2010, 1332-1339.
[11] Management in Radio Access Systems‖, (IJCSE) International Journal on Computer Science and Engineering Vol. 02, No. 04,
2010, 1332-1339.
[12] London, UK,‖ A Novel Algorithm for Radio Access Technology Selection in Heterogeneous B3G networks‖, 0-7803-9392-
9/06/$20.00 (c) 2006 IEEE.
[13] Vahdani, S.M. Mousavi, R. Tavakkoli-Moghaddam, Group decision making based on novel fuzzy modified TOPSIS method,
Applied Mathematical Modelling 35 (9) (2011) 4257–4269.
[14] Majid Fouladiana, Faramarz Hendessic, Alireza Shafieinejad, Morteza Rahimib, Mahdi M.Bayat ―A New Method for Vertical
Handoff between WLANs and UMTS in Boundary Conditions‖ International Conference on Computer Engineering and
Technology, 978-0-7695-3521-0/09 $25.00 © 2009 IEEE.
[15] C. Kobashikawa, Y. Hatakeyama, F. Dong, K. Hirota, Fuzzy algorithm for group decision making with participants having finite
discriminating abilities, IEEE Transactions on Systems, Man, And Cybernetics—Part A: Systems and Humans 39 (1) (2009).
[16] Z. Fan, Y. Liu, An approach to solve group-decision-making problems with ordinal interval numbers, IEEE Transactions on
Systems, Man,and Cybernetics—Part B: Cybernetics 40 (5) (2010) 1413–1423.
[17] P. Ekel, J. Queiroz, R. Parreiras, R. Palhares, Fuzzy set based models and methods of multicriteria group decision making,
Nonlinear Analysis: Theory, Methods and Applications 71 (2009) 409–419.
[18] Majid Fouladiana, Faramarz Hendessic, Alireza Shafieinejad, Morteza Rahimib, Mahdi M.Bayat, ―A New Method for Vertical
Handoff between WLANs and UMTS in Boundary Conditions‖ International Conference on Computer Engineering and
Technology, 978-0-7695-3521-0/09 $25.00 © 2009 IEEE.
[19] C. Kobashikawa, Y. Hatakeyama, F. Dong, K. Hirota, Fuzzy algorithm for group decision making with participants having finite
discriminating abilities, IEEE Transactions on Systems, Man and Cybernetics—Part A: Systems and Humans 39 (1) (2009).
[20] Olabisi E. Falowo, Student Member IEEE, and H. Anthony Chan, Fellow, IEEE Department of Electrical Engineering, University
of Cape Town, South Africa,‖ Load-Balancing in Heterogeneous Wireless Networks Implementing a User-Centric Joint
Call Admission Control Algorithm‖, May 17, 2008.
[21] Z. Fan, Y. Liu, An approach to solve group-decision-making problems with ordinal interval numbers, IEEE Transactions
on Systems, Man and Cybernetics—Part B: Cybernetics 40 (5) (2010) 1413–1423.
[22] Olabisi E. Falowo and H. Anthony Chan Department of Electrical Engineering, University of Cape Town, South Africa, ―Fuzzy
Logic Based Call Admission Control for Next Generation Wireless Networks‖, 1-4244-0398-7/06/$20.00 ©2006 IEEE.
[23] C.L. Hwang, M.J. Lin, Group Decision Making under Multiple Criteria: Methods and Applications, Springer-Verlag, Berlin,
Germany, 1987.
[24] Multi-Criteria Decision Making: An Operations Research Approach E. Triantaphyllou, B. Shu, S. Nieto Sanchez, and T.
RayPublished in: Encyclopedia of Electrical and Electronics Engineering, (J.G. Webster, Ed.), John Wiley & Sons, New York,
NY, Vol. 15, pp. 175-186, (1998).
[25] A VIKOR-BASED MULTIPLE CRITERIA DECISION METHOD FOR IMPROVING INFORMATION SECURITY RISK Yu-
Ping Ou Yang and How-Ming Shieh and Jun-Der Leu.
[26] Compromise Decision-Making for Building Design Teemu Tiainen1, Kristo Mela1, Markku Heinisuo1, Donald Grierson
[27] http://www.webopedia.com/quick_ref/WLANStandards.asp
[28] http://www.nettwerked.net/GHU/Docs/IEEE.htm
[29] https://support.skype.com/en/faq/FA10853/how-much-data-will-skype-use-on-my-mobile-phone
[30] http://cristobalalonso.com/my-blog/industry-notes-and-analysis/voice-and-video-call-data-usage-comparison-gtalk-vs-skype519

Weitere ähnliche Inhalte

Was ist angesagt?

PERFORMANCE AND REKEYING ANALYSIS OF MULTICAST SECURITY IN LTE
PERFORMANCE AND REKEYING ANALYSIS OF MULTICAST SECURITY IN LTEPERFORMANCE AND REKEYING ANALYSIS OF MULTICAST SECURITY IN LTE
PERFORMANCE AND REKEYING ANALYSIS OF MULTICAST SECURITY IN LTEIJCNCJournal
 
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSNDistributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSNpaperpublications3
 
Mac protocols for cooperative diversity in wlan
Mac protocols for cooperative diversity in wlanMac protocols for cooperative diversity in wlan
Mac protocols for cooperative diversity in wlaneSAT Publishing House
 
Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...
Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...
Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...Yayah Zakaria
 
5113jgraph01
5113jgraph015113jgraph01
5113jgraph01graphhoc
 
A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...
A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...
A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...IJCNCJournal
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 

Was ist angesagt? (15)

B0960512
B0960512B0960512
B0960512
 
Eh33798804
Eh33798804Eh33798804
Eh33798804
 
Ijetcas14 488
Ijetcas14 488Ijetcas14 488
Ijetcas14 488
 
PERFORMANCE AND REKEYING ANALYSIS OF MULTICAST SECURITY IN LTE
PERFORMANCE AND REKEYING ANALYSIS OF MULTICAST SECURITY IN LTEPERFORMANCE AND REKEYING ANALYSIS OF MULTICAST SECURITY IN LTE
PERFORMANCE AND REKEYING ANALYSIS OF MULTICAST SECURITY IN LTE
 
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSNDistributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
 
Mac protocols for cooperative diversity in wlan
Mac protocols for cooperative diversity in wlanMac protocols for cooperative diversity in wlan
Mac protocols for cooperative diversity in wlan
 
F505052131
F505052131F505052131
F505052131
 
Hf3612861290
Hf3612861290Hf3612861290
Hf3612861290
 
[IJCT-V3I2P21] Authors: Swati Govil, Dr.Paramjeet Rawat
[IJCT-V3I2P21] Authors: Swati Govil, Dr.Paramjeet Rawat[IJCT-V3I2P21] Authors: Swati Govil, Dr.Paramjeet Rawat
[IJCT-V3I2P21] Authors: Swati Govil, Dr.Paramjeet Rawat
 
Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...
Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...
Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...
 
5113jgraph01
5113jgraph015113jgraph01
5113jgraph01
 
Analytical Study of Cluster Based Routing Protocols in MANET
Analytical Study of Cluster Based Routing Protocols in MANETAnalytical Study of Cluster Based Routing Protocols in MANET
Analytical Study of Cluster Based Routing Protocols in MANET
 
A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...
A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...
A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...
 
Data communication q and a
Data communication q and aData communication q and a
Data communication q and a
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 

Andere mochten auch

Sign Language Recognition using Hough Transform and Neural Networks
Sign Language Recognition using Hough Transform and Neural NetworksSign Language Recognition using Hough Transform and Neural Networks
Sign Language Recognition using Hough Transform and Neural NetworksRohit Arora
 
Sign language research paper
Sign language research paperSign language research paper
Sign language research papertp3115
 
Hand sign detection
Hand sign detectionHand sign detection
Hand sign detectionthedunkel
 
Report on the sky x technology.
Report on the sky x technology.Report on the sky x technology.
Report on the sky x technology.Udirmaan Deka
 
Sign language translator ieee power point
Sign language translator ieee power pointSign language translator ieee power point
Sign language translator ieee power pointMadhuri Yellapu
 
Sky x technology
Sky x technologySky x technology
Sky x technologykedar1993
 
Sign Language in Communication
Sign Language in CommunicationSign Language in Communication
Sign Language in CommunicationMeera Hapaliya
 

Andere mochten auch (8)

Sign Language Recognition using Hough Transform and Neural Networks
Sign Language Recognition using Hough Transform and Neural NetworksSign Language Recognition using Hough Transform and Neural Networks
Sign Language Recognition using Hough Transform and Neural Networks
 
Sign language research paper
Sign language research paperSign language research paper
Sign language research paper
 
Spy x tchnology
Spy x tchnologySpy x tchnology
Spy x tchnology
 
Hand sign detection
Hand sign detectionHand sign detection
Hand sign detection
 
Report on the sky x technology.
Report on the sky x technology.Report on the sky x technology.
Report on the sky x technology.
 
Sign language translator ieee power point
Sign language translator ieee power pointSign language translator ieee power point
Sign language translator ieee power point
 
Sky x technology
Sky x technologySky x technology
Sky x technology
 
Sign Language in Communication
Sign Language in CommunicationSign Language in Communication
Sign Language in Communication
 

Ähnlich wie International Journal of Engineering and Science Invention (IJESI)

Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceinventy
 
TELSIKS 2015 - CD Final linkovano-Yadollahi
TELSIKS 2015 - CD Final linkovano-YadollahiTELSIKS 2015 - CD Final linkovano-Yadollahi
TELSIKS 2015 - CD Final linkovano-YadollahiMehrdad Yadollahi
 
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...eSAT Journals
 
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...IJNSA Journal
 
IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...
IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...
IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...IJNSA Journal
 
Multi-Criteria Handoff Decision Algorithms In Wireless Networks
Multi-Criteria Handoff Decision Algorithms In Wireless NetworksMulti-Criteria Handoff Decision Algorithms In Wireless Networks
Multi-Criteria Handoff Decision Algorithms In Wireless Networksiosrjce
 
multicast capacity in manet with infrastructure support
multicast capacity in manet with infrastructure supportmulticast capacity in manet with infrastructure support
multicast capacity in manet with infrastructure supportswathi78
 
An investigation-on-efficient-spreading-codes-for-transmitter-based-technique...
An investigation-on-efficient-spreading-codes-for-transmitter-based-technique...An investigation-on-efficient-spreading-codes-for-transmitter-based-technique...
An investigation-on-efficient-spreading-codes-for-transmitter-based-technique...Cemal Ardil
 
Secure data storage over distributed nodes in network through broadcast techn...
Secure data storage over distributed nodes in network through broadcast techn...Secure data storage over distributed nodes in network through broadcast techn...
Secure data storage over distributed nodes in network through broadcast techn...eSAT Publishing House
 
Efficient and stable route selection by using cross layer concept for highly...
 Efficient and stable route selection by using cross layer concept for highly... Efficient and stable route selection by using cross layer concept for highly...
Efficient and stable route selection by using cross layer concept for highly...Roopali Singh
 
ANALYSIS OF ROBUST MILTIUSER DETECTION TECHNIQUE FOR COMMUNICATION SYSTEM
ANALYSIS OF ROBUST MILTIUSER DETECTION TECHNIQUE FOR COMMUNICATION SYSTEMANALYSIS OF ROBUST MILTIUSER DETECTION TECHNIQUE FOR COMMUNICATION SYSTEM
ANALYSIS OF ROBUST MILTIUSER DETECTION TECHNIQUE FOR COMMUNICATION SYSTEMIJARIIE JOURNAL
 
A cross layer optimized reliable multicast routing protocol in wireless mesh ...
A cross layer optimized reliable multicast routing protocol in wireless mesh ...A cross layer optimized reliable multicast routing protocol in wireless mesh ...
A cross layer optimized reliable multicast routing protocol in wireless mesh ...ijdpsjournal
 
Intelligent Approach for Seamless Mobility in Multi Network Environment
Intelligent Approach for Seamless Mobility in Multi Network EnvironmentIntelligent Approach for Seamless Mobility in Multi Network Environment
Intelligent Approach for Seamless Mobility in Multi Network EnvironmentIDES Editor
 

Ähnlich wie International Journal of Engineering and Science Invention (IJESI) (20)

Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
TELSIKS 2015 - CD Final linkovano-Yadollahi
TELSIKS 2015 - CD Final linkovano-YadollahiTELSIKS 2015 - CD Final linkovano-Yadollahi
TELSIKS 2015 - CD Final linkovano-Yadollahi
 
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
 
L010326978
L010326978L010326978
L010326978
 
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...
 
IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...
IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...
IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...
 
Multi-Criteria Handoff Decision Algorithms In Wireless Networks
Multi-Criteria Handoff Decision Algorithms In Wireless NetworksMulti-Criteria Handoff Decision Algorithms In Wireless Networks
Multi-Criteria Handoff Decision Algorithms In Wireless Networks
 
Br33421423
Br33421423Br33421423
Br33421423
 
Br33421423
Br33421423Br33421423
Br33421423
 
multicast capacity in manet with infrastructure support
multicast capacity in manet with infrastructure supportmulticast capacity in manet with infrastructure support
multicast capacity in manet with infrastructure support
 
A044030110
A044030110A044030110
A044030110
 
An investigation-on-efficient-spreading-codes-for-transmitter-based-technique...
An investigation-on-efficient-spreading-codes-for-transmitter-based-technique...An investigation-on-efficient-spreading-codes-for-transmitter-based-technique...
An investigation-on-efficient-spreading-codes-for-transmitter-based-technique...
 
Ns2 2015 2016 titles abstract
Ns2 2015 2016 titles abstractNs2 2015 2016 titles abstract
Ns2 2015 2016 titles abstract
 
Ns2 2015 2016 titles abstract
Ns2 2015 2016 titles abstractNs2 2015 2016 titles abstract
Ns2 2015 2016 titles abstract
 
Secure data storage over distributed nodes in network through broadcast techn...
Secure data storage over distributed nodes in network through broadcast techn...Secure data storage over distributed nodes in network through broadcast techn...
Secure data storage over distributed nodes in network through broadcast techn...
 
Efficient and stable route selection by using cross layer concept for highly...
 Efficient and stable route selection by using cross layer concept for highly... Efficient and stable route selection by using cross layer concept for highly...
Efficient and stable route selection by using cross layer concept for highly...
 
ANALYSIS OF ROBUST MILTIUSER DETECTION TECHNIQUE FOR COMMUNICATION SYSTEM
ANALYSIS OF ROBUST MILTIUSER DETECTION TECHNIQUE FOR COMMUNICATION SYSTEMANALYSIS OF ROBUST MILTIUSER DETECTION TECHNIQUE FOR COMMUNICATION SYSTEM
ANALYSIS OF ROBUST MILTIUSER DETECTION TECHNIQUE FOR COMMUNICATION SYSTEM
 
218
218218
218
 
A cross layer optimized reliable multicast routing protocol in wireless mesh ...
A cross layer optimized reliable multicast routing protocol in wireless mesh ...A cross layer optimized reliable multicast routing protocol in wireless mesh ...
A cross layer optimized reliable multicast routing protocol in wireless mesh ...
 
Intelligent Approach for Seamless Mobility in Multi Network Environment
Intelligent Approach for Seamless Mobility in Multi Network EnvironmentIntelligent Approach for Seamless Mobility in Multi Network Environment
Intelligent Approach for Seamless Mobility in Multi Network Environment
 

Kürzlich hochgeladen

Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 

Kürzlich hochgeladen (20)

Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 

International Journal of Engineering and Science Invention (IJESI)

  • 1. International Journal of Engineering Science Invention ISSN (Online): 2319 – 6734, ISSN (Print): 2319 – 6726 www.ijesi.org Volume 2 Issue 6 ǁ June. 2013 ǁ PP.47-55 www.ijesi.org 47 | Page Dns Based On Handover Decision Process Using Mcdm Techniques Manikandan.P1 , Suresh Babu.K2 , Siva.S3 , Selva Kumar.A4 #1,2,3 PG Scholar (Department of ECE/Arunai Engineering College, Tiruvannamalai, India) *4 Asst Professor (Department of ECE/Arunai Engineering College, Tiruvannamalai, India) ABSTRACT: Dynamic network selection algorithm selects the appropriate network for single or group of calls from multi mode terminal in heterogeneous networks. Network selection support for a single call is the existing solution available, in this paper a Dynamic. In this paper a Dynamic network algorithm is used to addresses the Fuzzy Analytical Hierarchy Process (FAHP). FAHP algorithm is to assign the weight on all other networks and ranked (prioritised) by TOPSIS (Technique for Order Preference by Similarity to Ideal Solution) with reduce the number of handoff for long distance communication. The performance measure of proposed algorithm improves the vertical handoff decision process and the simulated results shows effectiveness of the algorithm compared with existing system by Ns2. KEYWORDS - Dynamic Network selection, FAHP, TOPSIS, NS2. I. INTRODUCTION Handoff is the process of transferring a mobile user from one channel or base station to another handoff occur when received signal level drops below a certain threshold level(coverage area) at this time , handoff process changing the channel (frequency, time slot or combination of them) associated with the current connection when the call initiate. Goal of handoff are Low latency, less packet loss, Mobility User preferences. In Cellular communication, wireless networks depends on network coverage area classified as follow Vertical handoff and Horizontal handoff. In vertical handoff Network coverage between two different network access point (Heterogeneous networks) (e.g., GSM, WI-FI between network access). In recent years, the multimode terminal (mobile) equipped with several wireless access network such technologies as (802.11) and cellular networks (GPRS, UMTS, HSDPA, LTE, etc.). The evolution of these technologies will allow the users to access the services simultaneously from these networks. 1.1 Handover Types: There are two types of handoff. In soft hand-off, the connection with the target station is made before the connection with the source is broken, so we can also called as make-before-break. Here, both the cells from source and target are connected in parallel during hand-off. A hard handoff is essentially a ―break before make‖ connection. Under the control of the MSC, the Base station hands off the MS’s call to another cell and then drop the call. In a hard handoff, the link to the previous BS is terminated before or as the user is transferred to the new cell’s BS; the MS is linked to no more than one BS at any given time. II. RELATED WORK Traditional radio access technology Network-selection algorithms for heterogeneous wireless networks do not consider the problem of group of calls from a mobile .Multimode terminals have the capability to support two or more types of call simultaneously. In [3], Giupponi and Perez-Romero proposed a JRRM algorithm based on fuzzy neural approach for selecting the most appropriate RAT for an incoming call in HWNs.In [4], Alkhawlani and Hussein proposed an intelligent RAT-selection algorithm for next generation wireless networks. The proposed algorithm uses a combined parallel fuzzy logic control and multi-criteria decision-making technique to select the most appropriate RAT for an incoming call in HWNs. In [5], Zhang proposed a fuzzy multiple attribute decision- making (MADM) RAT-selection algorithm that uses fuzzy logic to represent imprecise information of some RAT-selection criteria. The fuzzy MADM method operates in two steps. The first step is to convert the imprecise fuzzy variables to crisp numbers. The second step is to use classical MADM technique to determine the ranking order of the candidate networks. The highest-ranking RAT is then selected for the call. In [6], Xavier et al. presented a Markovian approach for RAT selection in an HWN. They developed an analytical model for a RAT-selection algorithm in an HWN comprising GSM/EGDE and UMTS. The proposed algorithm selects just one RAT for each incoming call. In [7], Guo et al. proposed a RAT selection algorithm that uses a fuzzy multiple objective decision-making techniques to select the most suitable RAT for each incoming call in
  • 2. Dns Based On Handover Decision Process Using Mcdm Techniques www.ijesi.org 48 | Page an HWN. In [8], Wu and Sandrasegaran conducted a study of RAT selection algorithm in a heterogeneous UMTS-GSM network. The entire Network selection algorithms reviewed above were designed to select the most suitable Network for just one incoming call in HWNs. None of the Network -selection algorithms considered the problem of Network selection for a group of calls (multiple calls) from a multimode terminal (MT) in HWNs. 2.1.TRADITIONAL DIFFERENT SUITABLE NETWORK SELECTION TO SINGLE CALL HANDLING In traditional method the number of handoff and individual network can handle only one call at a time in multi mode terminal because mobiles have to support multicall (high data rate) at a time in heterogeneous network. So there is no integration of increasing network capacity and num of hand off reduction, high data rate call handling at same time in existing network selection scheme. Fig. 1 Same Multi Mode Terminal but Multi Data Rate Call Handling by Dynamic Network at Different Instant of Time. III. PROPOSED WORK  When a new call is initiated on an MT already having an ongoing call in an HWN, the current network may no longer be suitable for the two calls (incoming call and the existing call). So we need to handle multiple calls at same time.  The optimal solution of this problem is to choose suitable network for multiple calls management and provision of long possible radio link. So we need i integrate a multiple calls used as long as for successful communication. This possible way is to integrate the network capacity as well as reducing number of handoffs.  The following are some reasons why it may be necessary to select a single Network for multiple calls from a multi-mode terminal in HWNs: (1) To reduce handoff complexity, (2) To reduce signaling overhead, (3) To reduce battery power consumption, (4) To accommodate low-capability mobiles.  If multiples calls from an MT are admitted into different Networks in an HWN, coordination of handover procedure among the different Networks will be complicated, and incur excessive signaling overhead. Moreover, multiple Network interfaces of the multimode mobile terminals will be activated, which may increase the overall battery power consumption of the multimode terminal.
  • 3. Dns Based On Handover Decision Process Using Mcdm Techniques www.ijesi.org 49 | Page  In addition, some multimode terminals can be connected to only one Network at a time. If these low- capability multimode terminals are to support multiple services, group decision is inevitable. Thus, it is necessary to develop an algorithm that will select the most suitable Network for a group of calls from an MT in HWNs. 3.1 Proposed Algorithms: The objective of this project is to develop a dynamic Network -selection algorithm for making group call Network -selection decisions in HWNs. Fig. 3 Parameter Analyses Fig.2 Network Selection System Model
  • 4. Dns Based On Handover Decision Process Using Mcdm Techniques www.ijesi.org 50 | Page  The first is the conceptualization of group-call Network selection problem in HWNs.  The second contribution is the development of a dynamic Network selection algorithm and application of the TOPSIS group decision technique to solve the problem of Network selection for multiple calls in HWNs.  The third contribution is the investigation of the effect of Network preference margin on the frequency of vertical handoff in HWNs.  We propose an intelligent network selection approach based on weight estimation technique Fuzzy Analytical Hierarchy Process (FAHP), the Technique for Order Preference by Similarity to an Ideal Solution (TOPSIS).  The FAHP method is used to determine a weight for each criterion, and the TOPSIS method is applied to rank the alternatives. . 3.2 Fuzzy Analytical Hierarchy Process: Multi Attribute based Decision Making (MADM) algorithm used to calculate the weight of each criteria using decision based techniques [2]. Steps: 1. Construct the structuring of alternatives and criteria matrix 2. Construct the comparisons of max and min value in the column matrix 3. Calculating the weights of criterion by decision making techniques. Step 1: Construct the numerical matrix by using both alternatives and criteria. (i.e.) criteria as Ci where i=1, 2, 3, 4…..N and alternatives as Ai where i=1, 2, 3……N Find the max, min value column in the decision matrix as aij ⃰ and aij ‫־‬ Determine the individual matrix element in the column of decision matrix by using max, min value Following as Now the calculated max and min value used of reassigned decision matrix following as A= A1 A2 A3 . . AN C1 C2 C3………………… CN a11 a12 a13 ……………… a1N a21 a22 a23……………… a2N a31 a32 a33……………… a3N . . . . . . aN1……………………… aNN aji -- aij⃰ aij ⃰ -- aij‫־‬ i,j Xij = X'= A1 A2 A3 . AN x11 x12 x13… x1N x21 x22 x23 …..x2N . . . . xN1…………… xNN C1 C2 C3 C4 ……..CN
  • 5. Dns Based On Handover Decision Process Using Mcdm Techniques www.ijesi.org 51 | Page Step 2: Construct the comparisons of max and min value in column matrix from assigned decision matrix, and have to find M and S1, S2 parameter. Where i = 1, 2, 3….n; j = 1, 2, 3 ….n After calculating the mij to form the another one decision matrix for calculate S1 and S2 parameters, Step 3: Calculating the weights of criterion by S2 using FAHP techniques Wj = 3.3 Technique for Order Preference by Similarity to Ideal Solution (TOPSIS): Technique for order preferences by similarity to an ideal solution (TOPSIS), known as a classical multiple attribute decision-making (MADM) method is to order the Rank based on calculated weight [2]. The TOPSIS method evaluates the following decision matrix which refers to N alternatives which are evaluated using FAHP. Step 1: Refer the criteria decision matrix and also Weight from evaluated value of FAHP Technique. Step 2: Construct the Normalized Decision Matrix. An element rij of the normalized decision matrix (R) can be calculated as follows. Step 3: Construct the Weighted Normalized Decision Matrix. A set of weights W = (w1, w2, w3... wN), (where: ∑ wi = 1) defined by the decision maker is accumulated to the decision matrix to generate the weighted normalized matrix D D = Matrix of R × unit matrix of W Step 4: Determine the Ideal and the Negative-ideal Solutions B*( Ideal) = { (max dij | j € J), (min dij | j € J)| i = 1,2,3, ..., M} i = {1, 2, 3, ..., M} B⃰ = maximum value of each columns matrix (d1⃰, d2⃰, d3⃰,…….dm⃰) B '(non-ideal)= { (min dij | j € J), (max dij | j € J)| i = 1, 2, 3, ..., M} B' = minimum value of each columns matrix(d1', d2’,d3’,..dm') Step 5: Calculation of the similarity distance. The N-dimensional Euclidean distance method is next applied to measure the separation distances of each alter Si* = (∑ (dij - dj*)2 )1/2, i = 1,2,3, ..., M, Where Si* is the separation (in the Euclidean sense) of each alternative to the ideal solution and negative-ideal solution. S i' = ( ∑(dij - dj')2 )1/2, i = 1,2,3, ..., M, where Si' is the separation (in the Euclidean sense) of each alternative from the negative-ideal solution. native to the ideal solution and negative-ideal solution Step 6: Calculate the Relative Closeness to the Ideal Solution. Ci* = Si' (Si* + Si'), 0 ≤Ci* ≤ 1, i = 1, 2, 3, ..., M. Ci* = 1, if Bi = B*, and Ci' = 0, if Bi = B'. The best satisfied alternative can now be decided according to preference rank order of Ci*. Therefore, the best alternative is the one that has the shortest distance to the ideal solution (Decreasing Order). The relationship of alternatives reveals that any alternative which has the shortest distance to the ideal solution is guaranteed to have the longest distance to the negative-ideal solution. 1+ xij N ∑ (1+ xij') i=1 Mij = n S2j ∑ i = 1 S2j Where S1j = -∑ ( mij × ln(mij)) and S2j = 1- S1j m i = 1 Rij = aij √(∑ a²ij)n I=1
  • 6. Dns Based On Handover Decision Process Using Mcdm Techniques www.ijesi.org 52 | Page 3.4 Comparison between different algorithms is evaluated for dynamic network selection: TABLE I: Comparison between different algorithms is evaluate to dynamic network selection FAHP,TOPSIS Algorithms (Network Selection Based Vertical Handoff In Heterogeneous Wireless Network) [2] Multi Criteria Group Decision Making, TOPSIS Algorithms (Dynamic Network Seletion Based Vertical Handoff In Heterogeneous Wireless Networks) [1] INPUT PARAMETRES: 1. Terminalside: Battery, Velocity. 2. Serviceside: Qos(AB,D,J,L),Security. INPUT PARAMETRES: 1.Terminalside: Battery,Velocity 2.Serviceside:Data Rate,Security,Service Cost. OUTPUT PARAMETRES: Blocking Probability During Traffic(Streaming,Interactive) Reduction, Weight Association Criteria,Rank Assignment Comparison. INPUT PARAMETRES: Increasing Preference Margin, Blocking Probability During Traffic (Streaming,Interactive) Reduction, Weight Association Criteria, Rank Assignment Ccomparision. Objective: Reducing Number Of Vertical Handoff. Objective: Multiple Call Handling. Considering Networks: Wifi,Wi-Max. Considering Netwoks: Wifi,Wi-Max. Fig. 4 Dynamic Network selection for high data rate call. IV. RESULT ANALYSIS 4.1 NETWORK PERFORMANCE ANALYSIS: The graphical result in figure shows that the handoff vs network performance. The plot is for during processing of multicall handling the handoff and network performance relationship using FAHP method. As can be seen from the figure that the handoff reduction with throughput increment.. Hence by this the multicall handling and handoff reduction is done successfully be the algorithms. 4.2 FAHP: The graphical result shows the relationship between the number of handoff and throughput during multicall handling using FAHP method. As can be seen from the figure that the handoff reduction with throughput increment. Fig. 5 Number of Handoff VS Throughput FAHP Method.
  • 7. Dns Based On Handover Decision Process Using Mcdm Techniques www.ijesi.org 53 | Page 4.3 TOPSIS: In the below graph the number of handoff with throughput of the network is analyzed and the result shows the performance increases as the number of handoff decreases. Fig. 6 Number of Handoff VS Throughput TOPSIS method. In the below graph packet drop ratio for a dynamic network is considered. During multicall handling packet is dropped when the data rate exceeds the level of network weight. Fig. 7 Number of Handoff VS Packet Loss TOPSIS method. 4.4 MTOPSIS (FAHP+TOPSIS): The graphical result shows the relationship between handoff and throughput during multicall handling using MTOPSIS method. It can be seen from the figure that the handoff reduction results in throughput increment. Generally the MTOPSIS method recommends the network weight and rank assignment as effectively. We are considering two networks (wi-fi, wi-max) and its packet loss gives the each network capacity. It helps to analyze energy awareness as well as distance between two are more base station. 32 772 659 134 4 32 19 160 100 200 300 400 500 600 700 800 900 Throughtvs Handoff Throughput Handoff N o. o f H a n d o f f Throughput 74 94 125 31 44 73 0 20 40 60 80 100 120 140 1 2 3 4 5 6 PACKET_DROP WI-FI WI-MAX P a c k e t L o s s No. of Handoff
  • 8. Dns Based On Handover Decision Process Using Mcdm Techniques www.ijesi.org 54 | Page Fig. 8 Number of Handoff VS Throughput MTOPSIS method. In the below graph packet drop ratio for a dynamic network is considered. During multicall handling packet is dropped when the data rate exceeds the level of network weight. Fig. 9 Number of Handoff VS Packet Loss MTOPSIS method. V. CONCLUSION In this project we have presented the weight factor estimation technique for vertical handoff decision algorithms. In the traditional handoff techniques the number of handoff takes place was more. We are analyzing FAHP and TOPSIS techniques to reduce the number of vertical handoff but in the traditional handoff techniques the number of handoff takes place was more and only handling single high data rate call at a time by dynamic networks. The analyzed FAHP technique to reduce the number of vertical handoff. By implementing these techniques to reduce the number of handoff and also handles the multiple high data rate calls at the same time using different available network selection.So FAHP is designed and implemented and the results are shown in simulation using graph. In future FAHP and TOPSIS techniques are design and their results are separately simulated and also focusing on reverse billing concept, the simulation values are compared in graph by using the group decision making algorithms. REFERENCES [1] Dynamic RAT selection for multiple calls in heterogeneous wireless networks using group decision-making technique 389-1286/$ see front matter @ 2012 Elsevier B.V. All rights reserved.doi:10.1016/j.comnet.2011.12.013. [2] Network Selection Decision Based on Handover History in Heterogeneous Wireless Networks. Lahby Mohamed, Cherkaoui Leghris and Adib Abdellah,Morocco{mlahby, cleghris, adib_adbe}@yahoo.fr International Journal of Computer Science and Telecommunications [Volume 3, Issue 2, February 2012]. 137 213 399 432 223 57 47 43 0 100 200 300 400 500 Throughput Handoff N o. o f H a n d o f f Throughput 50 63 83 14 20 44 0 50 100 1 2 3 4 5 6 PACKET_DROP WI-FI WIMAX P a c k e t L o s s No. of Handoff
  • 9. Dns Based On Handover Decision Process Using Mcdm Techniques www.ijesi.org 55 | Page [3] L. Giupponi, J. Perez-Romero, A novel approach for joint radio resource management based on fuzzy neural methodology, IEEE Transactions on Vehicular Technology 57 (3) (2008) 1789–1805. [4] M.M. Alkhawlani and A.A. Hussein, Intelligent radio network selection for next generation networks, in: Proceedings of the 7th International Conference on Informatics and Systems (INFOS), Cairo, Egypt 28–30 March, 2010. [5] W. Zhang, Handover decision using fuzzy MADM in heterogeneous networks, in: Proceedings of IEEE WCNC’04, Atlanta, GA, March, 2004. [6] X. Gelabert, J. Perez-Romero, O. Sallent, R. Agustı´, A Markovian approach to radio access technology selection in heterogeneous multiaccess/multiservice wireless networks, IEEE Transactions onMobile Computing 7 (10) (2008). [7] Q. Guo, X. Xu, J. Zhu, H. Zhang,AQoS-guaranteed cell selection strategy for heterogeneous cellular systems, ETRI Journal 28 (1) (2006) 77–83. [8] L. Wu, K. Sandrasegaran, A study on RAT selection algorithms in combined UMTS/GSM networks, ECTI Transactions on ElectricalEngineering, Electronics, and Communications 6 (2) (2008). [9] Preethi, J., Department of Computer Science and Engineering, Anna University of Technology, Coimbatore, Jothipuram Post, Coimbatore, India,‖ A New Hybrid Approach for Heterogeneous Radio Access Technology Selection‖, Journal of Computer Science 8 (5): 767-774, 2012, Science Publications ISSN 1549-3636 © 2012. [10] J.Preethi Lecturer, Department of Computer Science and Engineering, Anna University Coimbatore, India. Dr.S.Palaniswami Professor, Department of Electrical and Electronics Engineering, Government College of Technology, India,‖ A Single Hidden Layered Fuzzy Back propagation Algorithm for Joint Radio Resource Management in Radio Access Systems‖, (IJCSE) International Journal on Computer Science and Engineering Vol. 02, No. 04, 2010, 1332-1339. [11] Management in Radio Access Systems‖, (IJCSE) International Journal on Computer Science and Engineering Vol. 02, No. 04, 2010, 1332-1339. [12] London, UK,‖ A Novel Algorithm for Radio Access Technology Selection in Heterogeneous B3G networks‖, 0-7803-9392- 9/06/$20.00 (c) 2006 IEEE. [13] Vahdani, S.M. Mousavi, R. Tavakkoli-Moghaddam, Group decision making based on novel fuzzy modified TOPSIS method, Applied Mathematical Modelling 35 (9) (2011) 4257–4269. [14] Majid Fouladiana, Faramarz Hendessic, Alireza Shafieinejad, Morteza Rahimib, Mahdi M.Bayat ―A New Method for Vertical Handoff between WLANs and UMTS in Boundary Conditions‖ International Conference on Computer Engineering and Technology, 978-0-7695-3521-0/09 $25.00 © 2009 IEEE. [15] C. Kobashikawa, Y. Hatakeyama, F. Dong, K. Hirota, Fuzzy algorithm for group decision making with participants having finite discriminating abilities, IEEE Transactions on Systems, Man, And Cybernetics—Part A: Systems and Humans 39 (1) (2009). [16] Z. Fan, Y. Liu, An approach to solve group-decision-making problems with ordinal interval numbers, IEEE Transactions on Systems, Man,and Cybernetics—Part B: Cybernetics 40 (5) (2010) 1413–1423. [17] P. Ekel, J. Queiroz, R. Parreiras, R. Palhares, Fuzzy set based models and methods of multicriteria group decision making, Nonlinear Analysis: Theory, Methods and Applications 71 (2009) 409–419. [18] Majid Fouladiana, Faramarz Hendessic, Alireza Shafieinejad, Morteza Rahimib, Mahdi M.Bayat, ―A New Method for Vertical Handoff between WLANs and UMTS in Boundary Conditions‖ International Conference on Computer Engineering and Technology, 978-0-7695-3521-0/09 $25.00 © 2009 IEEE. [19] C. Kobashikawa, Y. Hatakeyama, F. Dong, K. Hirota, Fuzzy algorithm for group decision making with participants having finite discriminating abilities, IEEE Transactions on Systems, Man and Cybernetics—Part A: Systems and Humans 39 (1) (2009). [20] Olabisi E. Falowo, Student Member IEEE, and H. Anthony Chan, Fellow, IEEE Department of Electrical Engineering, University of Cape Town, South Africa,‖ Load-Balancing in Heterogeneous Wireless Networks Implementing a User-Centric Joint Call Admission Control Algorithm‖, May 17, 2008. [21] Z. Fan, Y. Liu, An approach to solve group-decision-making problems with ordinal interval numbers, IEEE Transactions on Systems, Man and Cybernetics—Part B: Cybernetics 40 (5) (2010) 1413–1423. [22] Olabisi E. Falowo and H. Anthony Chan Department of Electrical Engineering, University of Cape Town, South Africa, ―Fuzzy Logic Based Call Admission Control for Next Generation Wireless Networks‖, 1-4244-0398-7/06/$20.00 ©2006 IEEE. [23] C.L. Hwang, M.J. Lin, Group Decision Making under Multiple Criteria: Methods and Applications, Springer-Verlag, Berlin, Germany, 1987. [24] Multi-Criteria Decision Making: An Operations Research Approach E. Triantaphyllou, B. Shu, S. Nieto Sanchez, and T. RayPublished in: Encyclopedia of Electrical and Electronics Engineering, (J.G. Webster, Ed.), John Wiley & Sons, New York, NY, Vol. 15, pp. 175-186, (1998). [25] A VIKOR-BASED MULTIPLE CRITERIA DECISION METHOD FOR IMPROVING INFORMATION SECURITY RISK Yu- Ping Ou Yang and How-Ming Shieh and Jun-Der Leu. [26] Compromise Decision-Making for Building Design Teemu Tiainen1, Kristo Mela1, Markku Heinisuo1, Donald Grierson [27] http://www.webopedia.com/quick_ref/WLANStandards.asp [28] http://www.nettwerked.net/GHU/Docs/IEEE.htm [29] https://support.skype.com/en/faq/FA10853/how-much-data-will-skype-use-on-my-mobile-phone [30] http://cristobalalonso.com/my-blog/industry-notes-and-analysis/voice-and-video-call-data-usage-comparison-gtalk-vs-skype519