In the near future, current mobile communication networks will converge towards an All-IP network in order to provide richer applications, stronger customer satisfaction, andfurther return on investment for the industry. However, such a convergence induces a strong level of complexity when handling interoperability between different operators and different handset vendors. In this context, the 3GPP consortium is working on the standardization of the convergence, and IMS is emerging as the internationally agreed upon standard that is multi-operator and multi-vendor. In this paper, we shed further light on the subtleties of IMS, and we delineate a blueprint for the implementation of a real-world IMS testbed. An open source Presence Server is deployed as well. The operation of the IMS testbed and the Presence Server are checked to assess their conformance with 3GPP standards. A simple third party application is developed on top the IMS testbed to further assess its operation.
HOW TO CHOOSE BETWEEN LTE-M AND
NB-IOT FOR GLOBAL DEPLOYMENTS. LTE-M AND NB-IOT TECHNOLOGIES - INCREASED
BATTERY LIFE, ENHANCED COVERAGE AND SIMPLIFIED
HARDWARE
LTE, WiMAX, and HSPA+ are 4G wireless technologies being evaluated. LTE was recommended due to higher data rates, lower latency, compatibility with existing standards, and more efficient battery life. Risks include LTE becoming outdated and lack of interoperability with WiMAX. An LTE trial was proposed to evaluate vendors before potential installation within 24 weeks.
5G Technology stands for the 5th Generation Mobile technology. 5G is a next major phase of mobile telecommunications standards beyond the 4G standards. 5G is expected to provide speed upto 10Gbit/s, wider frequency band,
high increased peak bit rate, high system spectral efficiency, ubiquitous connectivity and a significant increase in QoS as
compared to current 4G technology. Evolution of mobile communication technology to 5G is discussed in this review, followed by protocol stack and 5G architecture. A wide comparison is given between the various generations so as to compare why 5G technology is better and needed.
This document provides an overview of 3G mobile communications. It discusses the evolution from 1G to 2G networks and the standards organizations that developed 3G technologies like WCDMA. Key aspects of 3G networks are summarized, including the network architecture, components like the UTRAN and core network, and air interface technologies like CDMA. Mobile frequency bands and the transition from 2G to 3G are also covered at a high level. The document contains detailed diagrams and refers to technical specifications.
This document summarizes the evolution of wireless mobile communication systems from 1G to 5G. It discusses the key technologies and features of each generation. 1G systems used analog signals for voice calls. 2G introduced digital encryption and SMS. 3G enabled faster speeds and services like video calls and internet access. 4G provides further increased speeds up to 1Gbps and is based on LTE. 5G is expected to offer much higher speeds and bandwidth, near unlimited connectivity, low latency, and new applications through convergence of technologies like cloud computing and nanotechnology. It is predicted 5G will revolutionize wireless communications and be a major driver of social and economic development.
This document compares the 3G and WiFi technologies for providing broadband wireless internet access. 3G refers to third generation mobile networks designed for integrated voice and data services, while WiFi refers to the 802.11 wireless Ethernet standard for wireless local area networks (LANs). Both technologies have attracted attention as candidates for dominant platforms for broadband wireless access, though they differ in industry origins and design goals. The document discusses similarities between the technologies as wireless access platforms, as well as differences in business models, spectrum policy, and stage of technical development. It concludes that both are likely to succeed, with 3G and WiFi complementing each other in network integration while WiFi also provides potential competition through lower entry costs.
Wimax and 3G both enable wireless broadband connectivity. Wimax provides broadband access up to 30 miles for fixed locations and 3-10 miles for mobile. It supports technologies like VoIP and IPTV to reduce communication costs. Wimax was launched in India in 2010 and has potential to improve connectivity in rural areas and drive economic development. 3G allows simultaneous data and voice on mobile phones and provides high-speed internet access for multimedia applications. It was first launched in 2001 and continues spreading globally including in India where its potential for information access could help bridge the rural-urban divide.
HOW TO CHOOSE BETWEEN LTE-M AND
NB-IOT FOR GLOBAL DEPLOYMENTS. LTE-M AND NB-IOT TECHNOLOGIES - INCREASED
BATTERY LIFE, ENHANCED COVERAGE AND SIMPLIFIED
HARDWARE
LTE, WiMAX, and HSPA+ are 4G wireless technologies being evaluated. LTE was recommended due to higher data rates, lower latency, compatibility with existing standards, and more efficient battery life. Risks include LTE becoming outdated and lack of interoperability with WiMAX. An LTE trial was proposed to evaluate vendors before potential installation within 24 weeks.
5G Technology stands for the 5th Generation Mobile technology. 5G is a next major phase of mobile telecommunications standards beyond the 4G standards. 5G is expected to provide speed upto 10Gbit/s, wider frequency band,
high increased peak bit rate, high system spectral efficiency, ubiquitous connectivity and a significant increase in QoS as
compared to current 4G technology. Evolution of mobile communication technology to 5G is discussed in this review, followed by protocol stack and 5G architecture. A wide comparison is given between the various generations so as to compare why 5G technology is better and needed.
This document provides an overview of 3G mobile communications. It discusses the evolution from 1G to 2G networks and the standards organizations that developed 3G technologies like WCDMA. Key aspects of 3G networks are summarized, including the network architecture, components like the UTRAN and core network, and air interface technologies like CDMA. Mobile frequency bands and the transition from 2G to 3G are also covered at a high level. The document contains detailed diagrams and refers to technical specifications.
This document summarizes the evolution of wireless mobile communication systems from 1G to 5G. It discusses the key technologies and features of each generation. 1G systems used analog signals for voice calls. 2G introduced digital encryption and SMS. 3G enabled faster speeds and services like video calls and internet access. 4G provides further increased speeds up to 1Gbps and is based on LTE. 5G is expected to offer much higher speeds and bandwidth, near unlimited connectivity, low latency, and new applications through convergence of technologies like cloud computing and nanotechnology. It is predicted 5G will revolutionize wireless communications and be a major driver of social and economic development.
This document compares the 3G and WiFi technologies for providing broadband wireless internet access. 3G refers to third generation mobile networks designed for integrated voice and data services, while WiFi refers to the 802.11 wireless Ethernet standard for wireless local area networks (LANs). Both technologies have attracted attention as candidates for dominant platforms for broadband wireless access, though they differ in industry origins and design goals. The document discusses similarities between the technologies as wireless access platforms, as well as differences in business models, spectrum policy, and stage of technical development. It concludes that both are likely to succeed, with 3G and WiFi complementing each other in network integration while WiFi also provides potential competition through lower entry costs.
Wimax and 3G both enable wireless broadband connectivity. Wimax provides broadband access up to 30 miles for fixed locations and 3-10 miles for mobile. It supports technologies like VoIP and IPTV to reduce communication costs. Wimax was launched in India in 2010 and has potential to improve connectivity in rural areas and drive economic development. 3G allows simultaneous data and voice on mobile phones and provides high-speed internet access for multimedia applications. It was first launched in 2001 and continues spreading globally including in India where its potential for information access could help bridge the rural-urban divide.
This document provides an overview of 5G technology and its objectives. 5G aims to provide higher data rates and connectivity for a wider range of devices, including sensors and IoT devices. It envisions a 1000-fold increase in network capacity and peak data rates of over 50Gbps. 5G will utilize both an enhanced LTE network and a new radio access technology to achieve its goals, maintaining backward compatibility. Key 5G technologies discussed include the use of millimeter wave spectrum, massive MIMO, and multi-RAN architectures.
The document discusses 5G mobile technology and its evolution from earlier generations. It provides details on:
1) How 5G will offer unprecedented call volume and data transmission speeds compared to previous technologies.
2) The network architecture of 5G, which will integrate different wireless technologies like PANs, WANs and cellular networks to provide seamless global connectivity using IPv6 addressing.
3) The mix-bandwidth data path design for 5G, which efficiently utilizes the resources of multiple overlapping wireless networks like pico-cells, micro-cells and macro-cells that cover the same area.
This document provides an overview of 5G technology and its applications in telecommunications. It discusses the evolution of mobile technologies from 1G to 5G, with each generation offering faster speeds and new capabilities. 5G will provide bandwidth of 1Gbps or higher and allow for unlimited data and call volumes. It will support new services like radio resource management and high altitude platforms. The architecture of 5G networks is described, including the use of an intelligent control system and tunnels to provide network abstraction and routing based on policies. Key features of 5G include high resolution, large bandwidth, advanced billing interfaces, and high quality services.
The document discusses concepts for 5G networks, including:
1. 5G aims to provide a unified system to support a wide range of use cases with enhanced connectivity, capacity, and low latency. It will build on LTE and introduce a new 5G radio and core network.
2. 5G will support enhanced mobile broadband, massive IoT connectivity, and ultra-reliable low latency communications. Initial deployments may use LTE and 5G networks together before standalone 5G is available.
3. The 5G new radio will provide flexible design to support different use cases and improve efficiency over LTE. It will integrate with existing LTE networks during early deployments.
The cellular IoT is a method of connecting physical devices (sensors, etc.) to the Internet, and transmits physical devices (sensors, etc.) on the same mobile network as smartphones. With its simple infrastructure and the advent of 5G, the Cellular IoT has become a strong participant in the field of connectivity.
The cellular network connects your iPhone to WeChat, Weibo, and Douyin and spreads your voice in the air. But the days of just wanting to connect with friends and family are gone.
Now you can also see the value of connecting with surrounding physical objects such as street lights, parking fee systems, hospitals that occupy everyday urban life, or myriad industrial applications (such as manufacturing and agriculture). All of these can strengthen the connection. ..
Ericsson predicts that the total number of connected IoT devices will exceed 20 billion in 2023. Specifically, the number of IoT devices connected via LTE and 5G exceeds 3.5 billion, mainly in China and Northeast Asia.
This is a report on 5 G mobile technology for B.Tech students for their seminar this is a new topic so it is very useful for B.Tech computer science students
This document provides an overview of the development of mobile technologies from 1G to 5G. It discusses the introduction and key features of 1G, 2G, 3G, and 4G mobile networks. Some advantages of 3G technology include increased data speeds for mobile broadband. Disadvantages include higher costs for 3G connections and separate 3G phones. The document concludes with examples of 4G and 5G technologies and references used.
5G Mobile Communication Technology: An OverviewIRJET Journal
This document provides an overview of 5G mobile communication technology. It discusses the evolution of mobile technologies from 1G to 5G and the key features of each generation. 5G aims to provide data bandwidth of 1Gbps or higher to support applications requiring high data rates, low latency and reliability. It will enable new applications through its ability to interconnect many devices, including autonomous vehicles and devices with artificial intelligence capabilities. The 5G network architecture is being designed to be cloud-native using network function virtualization and software-defined networking to allow deployment on shared cloud infrastructure.
Basics of telecommunication and networkingMilan Padariya
Telecommunication enables people to talk via electronic media and Networking enables more than one computers to connect and share the information. In today's business telecommunication and networking play an important role. Also wireless technologies like bluetooth and Wi-Fi make easy transaction for any IT enable business.
The document provides an overview of 4G presented by a group. It defines 4G as the fourth generation of cellular networks that provides broadband internet access to mobile devices. The presentation covers the characteristics of 4G including its fully IP-based integration, high speeds of up to 1 Gbps, and convergence services. It compares 3G and 4G networks and discusses the evolution and history of mobile generations. The presentation also discusses 4G services in India and the possibilities that 4G networks can enable such as enhanced mobile gaming and personal media repositories.
This presentation compares 3G and Wi-Fi technologies. Both are wireless technologies that facilitate mobility and provide broadband data services. However, they differ in their current business models, deployment status, standardization, and spectrum policy and management. The presentation speculates that Wi-Fi and 3G could complement each other to provide mobile broadband access in the future, but spectrum policy will be a key factor.
This document discusses 4G wireless networks and some of the key challenges in developing them. It provides background on the evolution of wireless networks from 1G to 3G. The main limitations of 3G that necessitate 4G are difficulty providing high data rates, limited spectrum allocation, and inability to seamlessly roam between different services. Desired features of 4G include high usability, global roaming, multimedia support, personalization, security, and fault tolerance. Main challenges for 4G include developing multimode terminals, wireless system discovery and selection, handling vertical and horizontal handoffs, personalized mobility, improved security, fault tolerance, and dynamic billing systems.
To the 5th Generation? The Future of Mobile CommunicationsMarc NGIAMBA
The document summarizes Nigel Jefferies' presentation on the future of mobile communications and 5G. Some key points:
- Jefferies discusses Huawei's position as a leading ICT provider and its R&D centers worldwide.
- The Wireless World Research Forum (WWRF) develops visions for the future of wireless technologies. Its vision is for 7 trillion wireless devices serving 7 billion people by 2020.
- Research directions for 5G include new radio link technologies to increase spectral efficiency by over 2x, small cells and dense heterogeneous networks, and device-to-device communications.
- Technologies like coordinated multi-site MIMO, cognition, and virtual relays could enable the goals of 5G
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...graphhoc
Mobile Ad Hoc Network (MANET) is a collection of two or more devices or nodes or terminals with
wireless communications and networking capability that communicate with each other without the aid of
any centralized administrator also the wireless nodes that can dynamically form a network to exchange
information without using any existing fixed network infrastructure. And it’s an autonomous system in
which mobile hosts connected by wireless links are free to be dynamically and some time act as routers at
the same time, and we discuss in this paper the distinct characteristics of traditional wired networks,
including network configuration may change at any time , there is no direction or limit the movement and
so on, and thus needed a new optional path Agreement (Routing Protocol) to identify nodes for these
actions communicate with each other path, An ideal choice way the agreement should not only be able to
find the right path, and the Ad Hoc Network must be able to adapt to changing network of this type at any
time. and we talk in details in this paper all the information of Mobile Ad Hoc Network which include the
History of ad hoc, wireless ad hoc, wireless mobile approaches and types of mobile ad Hoc networks, and
then we present more than 13 types of the routing Ad Hoc Networks protocols have been proposed. In this
paper, the more representative of routing protocols, analysis of individual characteristics and advantages
and disadvantages to collate and compare, and present the all applications or the Possible Service of Ad
Hoc Networks
Gives an insight into the transition of mobile technology and the manner in which the technology has evolved. Highlights the transition from 2G to 3G to 4G to 5G. Looks into the points of difference between the generations. Evolution of mobile handsets and advancement in speed.
3G is the third generation of mobile technology that provides faster data speeds and additional services like video calls compared to 2G. It was first launched commercially in Japan in 2001 and allows for services with data transmission speeds up to 14.4Mbps downstream. While 3G adoption has grown, it still only accounts for around 6.7% of global subscriptions, with higher rates in early adopting countries like Japan and Italy. India has also seen growth in 3G but still lags other major countries. The technology is continuing to evolve with 4G providing even higher speeds and a comprehensive IP solution.
The document discusses 5G mobile technologies and the evolution of networks from 1G to 5G. Some key points:
1) 5G will provide significantly higher bandwidth and data transmission rates compared to previous generations. It will allow seamless connectivity globally.
2) Each generation (1G to 5G) provides improved technologies over the last, increasing bandwidth, functionality and connectivity. 5G will be based on an all-IP infrastructure using IPv6 to provide uniform services.
3) 5G aims to use network resources more efficiently through techniques like combining bandwidth from multiple overlapping networks and intelligent distribution of internet access within buildings.
This document discusses 5G mobile technology. It begins with an abstract that outlines how mobile technology has advanced from 1G to 5G, bringing improved performance. The document then provides an introduction on the evolution of wireless communication from the 1970s. It proceeds to discuss each generation of mobile technology in more detail (1G to 4G) and their key features. It also compares the generations and discusses the network architecture and need for 5G technology, concluding that 5G will provide high bandwidth and is expected to be released around 2020.
1. The document discusses the evolution of cellular network generations from 1G to 5G. 1G networks introduced the concept of dividing geographic areas into cells served by base stations for frequency reuse. 2G networks digitized signals and introduced SMS. 3G brought faster internet speeds and more data services like video calls. 4G saw further increased speeds up to 1Gbps and mobile broadband. 5G is expected to converge technologies like nanotechnology and cloud computing to provide ultra-high broadband speeds and low latency wireless connectivity.
Customer needs more from the innovation. The innovation which are use resemble TV, Clothes washer, cooler, Mobile Phones. The most needed element of web is acceptable execution and quicker access. The Cellular Subscriber pay extra for the moment include and the entrance of web on their telephones. To help such ground breaking framework we need fast remote network. A remote innovation is bow quick nowadays. An as of late wired system was expected to get on the web. These days, Mobile systems are progressed in last four decades. The cell idea which was present with 1G where G represents age organize. It has increments quicker from age to age, which are 1G,2G,3G, lastly come to 4G. Pradnya Pramod Mohite "5G System-Trends & Development" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-3 , April 2020, URL: https://www.ijtsrd.com/papers/ijtsrd30411.pdf Paper Url :https://www.ijtsrd.com/computer-science/computer-network/30411/5g-systemtrends-and-development/pradnya-pramod-mohite
Today wireless services are the most preferred services of the world. The rapid increase in
the service is due to the advancement of technology consecutively. As a subscriber becomes more
aware of the mobile phone technology, he/she will seek for an appropriate package all together, and
including all the advanced features of a cellular phone can have. Hence, the search for new
technology is always the main intention of the prime cell phone giants to out innovate their
competitors. In addition, the main purpose of the fifth generation wireless networks (5G Wireless
networks) is planned to design the best wireless world that is free from limitations and hindrance of
the previous generations. 5G technologies will change the way most high bandwidth users access
their Mobile Radio Communication (MRC). So, this paper represents, great evolution of 1G (First
Generation) to 4G yield 5G, introduction to 5G technologies, why there is a need for 5G, advantages
of 5G networks technology, exceptional applications, Quality of Service (QoS), 5G network
architecture.
IRJET- Study on VLSI Technology for Processor Architecture of Cellphones : A ...IRJET Journal
This document reviews the evolution of processor architecture and technology in cellphones from 1G to 5G. It discusses the key technologies and features of each generation including their deployment periods, core networks, multiplexing techniques, and strengths/weaknesses. 1G allowed only voice calls using analog signals while 2G added text messaging and used digital signals. 3G brought multimedia support through technologies like UMTS and CDMA2000. 4G provided faster data transfer through LTE and 5G is expected to offer speeds over 1Gbps for services like high quality video streaming. Processors have changed from application processors to system on chip (SoC) designs to meet requirements of each generation. Future SoCs will include more powerful processors and cores
This document provides an overview of 5G technology and its objectives. 5G aims to provide higher data rates and connectivity for a wider range of devices, including sensors and IoT devices. It envisions a 1000-fold increase in network capacity and peak data rates of over 50Gbps. 5G will utilize both an enhanced LTE network and a new radio access technology to achieve its goals, maintaining backward compatibility. Key 5G technologies discussed include the use of millimeter wave spectrum, massive MIMO, and multi-RAN architectures.
The document discusses 5G mobile technology and its evolution from earlier generations. It provides details on:
1) How 5G will offer unprecedented call volume and data transmission speeds compared to previous technologies.
2) The network architecture of 5G, which will integrate different wireless technologies like PANs, WANs and cellular networks to provide seamless global connectivity using IPv6 addressing.
3) The mix-bandwidth data path design for 5G, which efficiently utilizes the resources of multiple overlapping wireless networks like pico-cells, micro-cells and macro-cells that cover the same area.
This document provides an overview of 5G technology and its applications in telecommunications. It discusses the evolution of mobile technologies from 1G to 5G, with each generation offering faster speeds and new capabilities. 5G will provide bandwidth of 1Gbps or higher and allow for unlimited data and call volumes. It will support new services like radio resource management and high altitude platforms. The architecture of 5G networks is described, including the use of an intelligent control system and tunnels to provide network abstraction and routing based on policies. Key features of 5G include high resolution, large bandwidth, advanced billing interfaces, and high quality services.
The document discusses concepts for 5G networks, including:
1. 5G aims to provide a unified system to support a wide range of use cases with enhanced connectivity, capacity, and low latency. It will build on LTE and introduce a new 5G radio and core network.
2. 5G will support enhanced mobile broadband, massive IoT connectivity, and ultra-reliable low latency communications. Initial deployments may use LTE and 5G networks together before standalone 5G is available.
3. The 5G new radio will provide flexible design to support different use cases and improve efficiency over LTE. It will integrate with existing LTE networks during early deployments.
The cellular IoT is a method of connecting physical devices (sensors, etc.) to the Internet, and transmits physical devices (sensors, etc.) on the same mobile network as smartphones. With its simple infrastructure and the advent of 5G, the Cellular IoT has become a strong participant in the field of connectivity.
The cellular network connects your iPhone to WeChat, Weibo, and Douyin and spreads your voice in the air. But the days of just wanting to connect with friends and family are gone.
Now you can also see the value of connecting with surrounding physical objects such as street lights, parking fee systems, hospitals that occupy everyday urban life, or myriad industrial applications (such as manufacturing and agriculture). All of these can strengthen the connection. ..
Ericsson predicts that the total number of connected IoT devices will exceed 20 billion in 2023. Specifically, the number of IoT devices connected via LTE and 5G exceeds 3.5 billion, mainly in China and Northeast Asia.
This is a report on 5 G mobile technology for B.Tech students for their seminar this is a new topic so it is very useful for B.Tech computer science students
This document provides an overview of the development of mobile technologies from 1G to 5G. It discusses the introduction and key features of 1G, 2G, 3G, and 4G mobile networks. Some advantages of 3G technology include increased data speeds for mobile broadband. Disadvantages include higher costs for 3G connections and separate 3G phones. The document concludes with examples of 4G and 5G technologies and references used.
5G Mobile Communication Technology: An OverviewIRJET Journal
This document provides an overview of 5G mobile communication technology. It discusses the evolution of mobile technologies from 1G to 5G and the key features of each generation. 5G aims to provide data bandwidth of 1Gbps or higher to support applications requiring high data rates, low latency and reliability. It will enable new applications through its ability to interconnect many devices, including autonomous vehicles and devices with artificial intelligence capabilities. The 5G network architecture is being designed to be cloud-native using network function virtualization and software-defined networking to allow deployment on shared cloud infrastructure.
Basics of telecommunication and networkingMilan Padariya
Telecommunication enables people to talk via electronic media and Networking enables more than one computers to connect and share the information. In today's business telecommunication and networking play an important role. Also wireless technologies like bluetooth and Wi-Fi make easy transaction for any IT enable business.
The document provides an overview of 4G presented by a group. It defines 4G as the fourth generation of cellular networks that provides broadband internet access to mobile devices. The presentation covers the characteristics of 4G including its fully IP-based integration, high speeds of up to 1 Gbps, and convergence services. It compares 3G and 4G networks and discusses the evolution and history of mobile generations. The presentation also discusses 4G services in India and the possibilities that 4G networks can enable such as enhanced mobile gaming and personal media repositories.
This presentation compares 3G and Wi-Fi technologies. Both are wireless technologies that facilitate mobility and provide broadband data services. However, they differ in their current business models, deployment status, standardization, and spectrum policy and management. The presentation speculates that Wi-Fi and 3G could complement each other to provide mobile broadband access in the future, but spectrum policy will be a key factor.
This document discusses 4G wireless networks and some of the key challenges in developing them. It provides background on the evolution of wireless networks from 1G to 3G. The main limitations of 3G that necessitate 4G are difficulty providing high data rates, limited spectrum allocation, and inability to seamlessly roam between different services. Desired features of 4G include high usability, global roaming, multimedia support, personalization, security, and fault tolerance. Main challenges for 4G include developing multimode terminals, wireless system discovery and selection, handling vertical and horizontal handoffs, personalized mobility, improved security, fault tolerance, and dynamic billing systems.
To the 5th Generation? The Future of Mobile CommunicationsMarc NGIAMBA
The document summarizes Nigel Jefferies' presentation on the future of mobile communications and 5G. Some key points:
- Jefferies discusses Huawei's position as a leading ICT provider and its R&D centers worldwide.
- The Wireless World Research Forum (WWRF) develops visions for the future of wireless technologies. Its vision is for 7 trillion wireless devices serving 7 billion people by 2020.
- Research directions for 5G include new radio link technologies to increase spectral efficiency by over 2x, small cells and dense heterogeneous networks, and device-to-device communications.
- Technologies like coordinated multi-site MIMO, cognition, and virtual relays could enable the goals of 5G
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...graphhoc
Mobile Ad Hoc Network (MANET) is a collection of two or more devices or nodes or terminals with
wireless communications and networking capability that communicate with each other without the aid of
any centralized administrator also the wireless nodes that can dynamically form a network to exchange
information without using any existing fixed network infrastructure. And it’s an autonomous system in
which mobile hosts connected by wireless links are free to be dynamically and some time act as routers at
the same time, and we discuss in this paper the distinct characteristics of traditional wired networks,
including network configuration may change at any time , there is no direction or limit the movement and
so on, and thus needed a new optional path Agreement (Routing Protocol) to identify nodes for these
actions communicate with each other path, An ideal choice way the agreement should not only be able to
find the right path, and the Ad Hoc Network must be able to adapt to changing network of this type at any
time. and we talk in details in this paper all the information of Mobile Ad Hoc Network which include the
History of ad hoc, wireless ad hoc, wireless mobile approaches and types of mobile ad Hoc networks, and
then we present more than 13 types of the routing Ad Hoc Networks protocols have been proposed. In this
paper, the more representative of routing protocols, analysis of individual characteristics and advantages
and disadvantages to collate and compare, and present the all applications or the Possible Service of Ad
Hoc Networks
Gives an insight into the transition of mobile technology and the manner in which the technology has evolved. Highlights the transition from 2G to 3G to 4G to 5G. Looks into the points of difference between the generations. Evolution of mobile handsets and advancement in speed.
3G is the third generation of mobile technology that provides faster data speeds and additional services like video calls compared to 2G. It was first launched commercially in Japan in 2001 and allows for services with data transmission speeds up to 14.4Mbps downstream. While 3G adoption has grown, it still only accounts for around 6.7% of global subscriptions, with higher rates in early adopting countries like Japan and Italy. India has also seen growth in 3G but still lags other major countries. The technology is continuing to evolve with 4G providing even higher speeds and a comprehensive IP solution.
The document discusses 5G mobile technologies and the evolution of networks from 1G to 5G. Some key points:
1) 5G will provide significantly higher bandwidth and data transmission rates compared to previous generations. It will allow seamless connectivity globally.
2) Each generation (1G to 5G) provides improved technologies over the last, increasing bandwidth, functionality and connectivity. 5G will be based on an all-IP infrastructure using IPv6 to provide uniform services.
3) 5G aims to use network resources more efficiently through techniques like combining bandwidth from multiple overlapping networks and intelligent distribution of internet access within buildings.
This document discusses 5G mobile technology. It begins with an abstract that outlines how mobile technology has advanced from 1G to 5G, bringing improved performance. The document then provides an introduction on the evolution of wireless communication from the 1970s. It proceeds to discuss each generation of mobile technology in more detail (1G to 4G) and their key features. It also compares the generations and discusses the network architecture and need for 5G technology, concluding that 5G will provide high bandwidth and is expected to be released around 2020.
1. The document discusses the evolution of cellular network generations from 1G to 5G. 1G networks introduced the concept of dividing geographic areas into cells served by base stations for frequency reuse. 2G networks digitized signals and introduced SMS. 3G brought faster internet speeds and more data services like video calls. 4G saw further increased speeds up to 1Gbps and mobile broadband. 5G is expected to converge technologies like nanotechnology and cloud computing to provide ultra-high broadband speeds and low latency wireless connectivity.
Customer needs more from the innovation. The innovation which are use resemble TV, Clothes washer, cooler, Mobile Phones. The most needed element of web is acceptable execution and quicker access. The Cellular Subscriber pay extra for the moment include and the entrance of web on their telephones. To help such ground breaking framework we need fast remote network. A remote innovation is bow quick nowadays. An as of late wired system was expected to get on the web. These days, Mobile systems are progressed in last four decades. The cell idea which was present with 1G where G represents age organize. It has increments quicker from age to age, which are 1G,2G,3G, lastly come to 4G. Pradnya Pramod Mohite "5G System-Trends & Development" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-3 , April 2020, URL: https://www.ijtsrd.com/papers/ijtsrd30411.pdf Paper Url :https://www.ijtsrd.com/computer-science/computer-network/30411/5g-systemtrends-and-development/pradnya-pramod-mohite
Today wireless services are the most preferred services of the world. The rapid increase in
the service is due to the advancement of technology consecutively. As a subscriber becomes more
aware of the mobile phone technology, he/she will seek for an appropriate package all together, and
including all the advanced features of a cellular phone can have. Hence, the search for new
technology is always the main intention of the prime cell phone giants to out innovate their
competitors. In addition, the main purpose of the fifth generation wireless networks (5G Wireless
networks) is planned to design the best wireless world that is free from limitations and hindrance of
the previous generations. 5G technologies will change the way most high bandwidth users access
their Mobile Radio Communication (MRC). So, this paper represents, great evolution of 1G (First
Generation) to 4G yield 5G, introduction to 5G technologies, why there is a need for 5G, advantages
of 5G networks technology, exceptional applications, Quality of Service (QoS), 5G network
architecture.
IRJET- Study on VLSI Technology for Processor Architecture of Cellphones : A ...IRJET Journal
This document reviews the evolution of processor architecture and technology in cellphones from 1G to 5G. It discusses the key technologies and features of each generation including their deployment periods, core networks, multiplexing techniques, and strengths/weaknesses. 1G allowed only voice calls using analog signals while 2G added text messaging and used digital signals. 3G brought multimedia support through technologies like UMTS and CDMA2000. 4G provided faster data transfer through LTE and 5G is expected to offer speeds over 1Gbps for services like high quality video streaming. Processors have changed from application processors to system on chip (SoC) designs to meet requirements of each generation. Future SoCs will include more powerful processors and cores
An Overview of 5G Wireless Cellular TechnologiesEditor IJCATR
This document provides an overview of 5G wireless cellular technologies. It discusses the evolution of wireless technologies from 1G to 5G, comparing key aspects like data bandwidth, switching, and core networks. 5G is expected to offer speeds over 1Gbps, fully packetized networks, and be based on an all-IP platform. 5G architecture will utilize cloud computing and allow access to applications from any internet-connected device. 5G will provide improved quality of service for applications like video and offer globally accessible high-speed connectivity and services.
This document provides an overview of the IMS architecture from the perspective of an LTE user equipment. It describes the key components of IMS including the UE, Evolved Packet Core, and IMS core. It also discusses how IMS enables convergence across different access technologies, service types, and network functions to support multimedia services like voice and video over LTE.
This document provides a high-level overview of the IMS architecture from the perspective of an LTE user equipment:
- IMS enables convergence across access types, services, applications, and between telephony and data.
- The key components that interface with the UE are the Evolved Packet Core, IMS core, and application servers.
- IMS supports voice, video, and other services over the LTE network by providing an all-IP infrastructure and quality of service guarantees.
The document provides an overview of the IMS architecture from the perspective of an LTE User Equipment (UE). It describes the key components of IMS including the UE, Evolved Packet Core (EPC), IMS Core, and applications. The UE contains an ISIM and SIP User Agent. The EPC includes the PDN Gateway and PCRF. The IMS Core consists of CSCF (Proxy, Serving, Interrogating), HSS, SLF, and Media Gateways. IMS enables convergence of networks, services, and applications in an all-IP environment.
The document discusses the evolution of mobile technologies through generations from 0G to 5G. It provides an overview of each generation including key features and technologies. The main points covered are:
- 0G introduced the first mobile radio telephone systems, 1G brought the first analog cellular networks, and 2G introduced digital networks and SMS.
- 3G brought faster internet speeds for mobile browsing and apps. 4G networks such as LTE further increased speeds for video and mobile broadband.
- 5G is the latest generation, promising much higher data rates and lower latency to enable new applications like autonomous vehicles and telemedicine.
The document discusses the evolution of wireless communication technologies from 0G to 5G. It describes the key features and technologies of each generation including higher bandwidth and data transfer speeds. 5G is expected to offer data rates up to 10 Gbps for dense urban environments using technologies like massive MIMO, cloud computing, and an all-IP platform. The goals of 5G include achieving 10 to 100 times higher typical user data rates than current technologies.
5 G SYSTEMS IS THE FUTURE WILL BE FAST WITH UNIMAGINABLE SPEED AND WITH LOTS OF SERVICES.Though 5G is still in development stage it has lots of promising features that will definitely change our future. For this data hungry and speed loving generation 5G will definitely be the hottest technology and it will certainly make our future really exciting. In this article we will see how the mobile networks have evolved and what will be the future of mobile network and of course about 5G network.
Performance comparison of umts and lte on the basis of data ratesIAEME Publication
This document compares the 3G and 4G mobile communication technologies of UMTS and LTE. UMTS (3G) uses WCDMA technology and has a maximum theoretical downlink speed of 42Mbps, while LTE (4G) uses OFDM and more advanced MIMO schemes, providing much higher maximum theoretical downlink speeds of 100Mbps with the ability to reach 1Gbps. The document outlines the network architectures and standards of UMTS and LTE. It also lists the objectives of 4G networks in providing improved quality of service, mobility, bandwidth and a fully IP-based network compared to 3G technologies.
This document summarizes a presentation on 5G mobile technology given by two students. It includes an abstract, introduction, sections on 2G-5G networks and 5G network architecture. The key points are:
- 5G will allow unprecedented call volume and data transmission speeds over VOIP-enabled devices.
- 5G network architecture uses a "Nano core" concept with flat IP, nanotechnology, cloud computing and all IP platforms to allow different radio access networks to upgrade to a single core network in a flexible way.
- The introduction discusses the evolution from 1G to 5G and increasing phone capabilities, with 5G allowing broadband internet access over mobile phones.
Evolution of Wireless Communication TechnologiesAkhil Bansal
This report comprises of detailed analysis how the wireless communication developed from 1G to 4G LTE to improve data services for the end user.The future ahead i.e. 5G is also discussed.
Feel free to discuss, would be happy to help.
An Overview On Evolution Of Mobile Wireless Communication Networks 1G-6GTony Lisko
This document provides an overview of the evolution of mobile wireless communication networks from 1G to 6G. It discusses the key technologies and features of each generation: 1G was analog and supported only voice calls. 2G introduced digital cellular and text messaging. 3G brought multimedia support and higher data rates. 4G integrated internet access and aimed to support wireless broadband. 5G is proposed to provide unlimited global access to information by integrating technologies like OFDM and CDMA. 6G may integrate 5G with satellite networks for complete global coverage. Each new generation aims to overcome limitations of previous ones by increasing speeds, bandwidth, and capabilities.
NEXT GENERATION 5 G MOBILE WIRELESS TECHNOLOGYEr Vivek Rana
The document discusses the aims and thrust areas of an organization to make India a global IT superpower. It then provides information on 5G technology, including definitions and key concepts. It discusses the evolution of mobile networks from 1G to 5G and compares their technologies. It describes 5G network architecture and concludes by discussing trends in mobile networks and the potential of 5G enabling local connectivity between countries.
The following paper tells us about the literature reviewed of 5g technology, its requirements , its Artictecture , QoS , Advantages , Disadvantages and what are the challenges that we are going to face in implementing the technology and focusing on its future scope and implementation.
3G networks provide faster data transmission speeds and a wider range of services compared to previous 2G networks. 3G allows data transfer rates up to 2Mbps and introduces technologies like UMTS that support transmission speeds of up to 300Mbps. It enables advanced applications and multimedia services on mobile devices through improved spectral efficiency and network capacity.
5G is the next generation mobile network that will provide significantly faster speeds and lower latency. It will transform industries like automotive, healthcare, IoT, media and more. Countries around the world are working to deploy 5G networks, with some like South Korea, China, and Russia doing early trials and deployments. Key 5G technologies include millimeter waves, small cell networks, massive MIMO, beamforming and full duplex which help address bandwidth and interference challenges. Qualcomm and Ericsson are among companies developing 5G technology and hardware to enable the rollout of 5G networks and devices.
Ähnlich wie Towards Future 4G Mobile Networks: A Real-World IMS Testbed (20)
Call for Papers - 10th International Conference on Computer Science and Infor...josephjonse
10th International Conference on Computer Science and Information Technology (CSTY 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Computer Science, Engineering and Information Technology. The Conference looks for significant contributions to all major fields of the Computer Science, Engineering and Information Technology in theoretical and practical aspects.
Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the following areas, but are not limited to.
8th International Conference on Soft Computing, Mathematics and Control (SMC ...josephjonse
8th International Conference on Soft Computing, Mathematics and Control (SMC 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications impacts and challenges of Soft Computing, Mathematics and Control. The conference documents practical and theoretical results which make a fundamental contribution for the development of Soft Computing, Mathematics and Control. The aim of the conference is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field.
Implementation of Pipelined Architecture for Physical Downlink Channels of 3G...josephjonse
LTE (Long Term Evolution) is a high data rate, low latency and packet optimized radio access technology designed to support roaming Internet access via cell phones and handheld devices in 3G and 4G networks. This paper mainly focuses on to improve the processing speed and decrease the maximum delay of the downlink channels using the pipelined buffer controlled technique. This paper proposes Pipelined buffer controlled Architecture for both transmitter and receiver for Physical Downlink channels of 3GPP-LTE. The transmitter architecture comprises Bit Scrambling, Modulation mapping, Layer mapping, Precoding and Resource element mapping modules. The receiver architecture comprises Demapping from resource elements, Decoding, Comparing and Detection, Delayer mapping and Descrambling modules as described in LTE specifications. In addition to these, buffers are included in both transmitter and receiver architectures. Modelsim is used for simulation, synthesis and implementation are achieved using PlanAhead13.2 tool on Virtex-5, xc5vlx50tff1136-1 device board is used. Implemented results are discussed in terms of RTL design, FPGA editor, Power estimation and Resource estimation.
12th International Conference of Artificial Intelligence and Fuzzy Logic (AI ...josephjonse
12th International Conference of Artificial Intelligence and Fuzzy Logic (AI & FL 2024) provides a forum for researchers who address this issue and to present their work in a peer-reviewed forum. Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the following areas, but are not limited to these topics only.
2nd International Conference on Computer Science, Engineering and Artificial ...josephjonse
2nd International Conference on Computer Science, Engineering and Artificial Intelligence (CSEAI 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Computer Science, Computer Engineering and AI. The Conference looks for significant contributions to all major fields of the Computer Science, Engineering and AI in theoretical, practical aspects. The aim of the conference is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field.
Global mobility and Handover management for heterogeneous network in vanetjosephjonse
Now a day’s Vehicular Ad Hoc Network (VANET) is an emerging technology. Mobility management is one of the most challenging research issues for VANETs to support variety of intelligent transportation system (ITS) applications. VANETs are getting importance for inter-vehicle communication, because they allow the communication among vehicles without any infrastructure, configuration effort, and without the high costs of cellular networks. Besides local data exchange, vehicular applications may be used to accessing Internet services. The access is provided by Internet gateways located on the site of roadside. However, the Internet integration requires a respective mobility support of the vehicular ad hoc network. In this paper we will study about the network mobility approach in vehicular ad hoc network; the model will describe the movement of vehicles from one network to other network. The proposed handover scheme reduces the handover latency, packet loss signaling overhead.
3rd International Conference on Artificial Intelligence Advances (AIAD 2024)josephjonse
3rd International Conference on Artificial Intelligence Advances (AIAD 2024) will act as a major forum for the presentation of innovative ideas, approaches, developments, and research projects in the area advanced Artificial Intelligence. It will also serve to facilitate the exchange of information between researchers and industry professionals to discuss the latest issues and advancement in the research area. Core areas of AI and advanced multi-disciplinary and its applications will be covered during the conferences.
10th International Conference on Artificial Intelligence and Applications (AI...josephjonse
10th International Conference on Artificial Intelligence and Applications (AI 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Artificial Intelligence and its applications. The Conference looks for significant contributions to all major fields of the Artificial Intelligence, Soft Computing in theoretical and practical aspects. The aim of the Conference is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field.
Network Parameters Impact on Dynamic Transmission Power Control in Vehicular ...josephjonse
In vehicular ad hoc networks, the dynamic change in transmission power is very effective to increase the throughput of the wireless vehicular network and decrease the delay of the message communication between vehicular nodes on the highway. Whenever an event occurs on the highway, the reliability of the communication in the vehicular network becomes so vital so that event created messages should reach to all the moving network nodes. It becomes necessary that there should be no interference from outside of the network and all the neighbor nodes should lie in the transmission range of the reference vehicular node. Transmission range is directly proportional to the transmission power the moving node. If the transmission power will be high, the interference increases that can cause higher delay in message reception at receiver end, hence the performance of the network decreased. In this paper, it is analyzed that how transmission power can be controlled by considering other different parameter of the network such as; density, distance between moving nodes, different types of messages dissemination with their priority, selection of an antenna also affects on the transmission power. The dynamic control of transmission power in VANET serves also for the optimization of the resources where it needs, can be decreased and increased depending on the circumstances of the network. Different applications and events of different types also cause changes in transmission power to enhance the reachability. The analysis in this paper is comprised of density, distance with single hop and multi hop message broadcasting based dynamic transmission power control as well as antenna selection and applications based. Some summarized tables are produced according to the respective parameters of the vehicular network. At the end some valuable observations are made and discussed in detail. This paper concludes with a grand summary of all the protocols discussed in it.
2nd International Conference on Computer Science, Engineering and Artificial ...josephjonse
2nd International Conference on Computer Science, Engineering and Artificial Intelligence (CSEAI 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Computer Science, Computer Engineering and AI. The Conference looks for significant contributions to all major fields of the Computer Science, Engineering and AI in theoretical, practical aspects. The aim of the conference is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field.
10th International Conference on Data Mining (DaMi 2024)josephjonse
10th International Conference on Data Mining (DaMi 2024) Conference provides a forum for researchers who address this issue and to present their work in a peer-reviewed forum.
10th International Conference on Artificial Intelligence and Soft Computing (...josephjonse
10th International Conference on Artificial Intelligence and Soft Computing (AIS 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology, and applications of Artificial Intelligence, Soft Computing. The Conference looks for significant contributions to all major fields of the Artificial Intelligence, Soft Computing in theoretical and practical aspects. The aim of the Conference is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field.
On the Equality of the Grundy Numbers of a Graphjosephjonse
Our work becomes integrated into the general problem of the stability of the network ad hoc. Some, works attacked(affected) this problem. Among these works, we find the modelling of the network ad hoc in the form of a graph. Thus the problem of stability of the network ad hoc which corresponds to a problem of allocation of frequency amounts to a problem of allocation of colors in the vertex of graph. we present use a parameter of coloring " the number of Grundy”. The Grundy number of a graph G, denoted by Γ(G), is the largest k such that G has a greedy k-coloring, that is a coloring with colours obtained by applying the greedy algorithm according to some ordering of the vertices of G. In this paper, we study the Grundy number of the lexicographic, Cartesian and direct products of two graphs in terms of the Grundy numbers of these graphs.
10th International Conference on Artificial Intelligence and Applications (AI...josephjonse
10th International Conference on Artificial Intelligence and Applications (AI 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Artificial Intelligence and its applications. The Conference looks for significant contributions to all major fields of the Artificial Intelligence, Soft Computing in theoretical and practical aspects. The aim of the Conference is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field.
Cache Performance Analysis of Virtualized Router on Virtual Content-Centric N...josephjonse
Content-centric networking (CCN) is one of the major proposals for realizing information-centric networking. CCN routers cache forwarded data in a buffer memory called the ContentStore (CS). Virtual content-centric networking (VCCN), which enables the construction of multiple virtual networks (called VCCN slices) on a content-centric network, has been recently proposed. When multiple VCCN slices are constructed, the performance of each VCCN slice and that of the entire network are strongly affected by the CCN routers' CS allocation to VCCN router instances in VCCN slices. In this paper, we analyze the effects of CS allocation methods and content request patterns in VCCN slices on the performance of each VCCN slice and that of the entire network. Through several numerical examples, we show that when content request patterns are heterogeneous, a hybrid resource allocation method is effective in terms of both network fairness for VCCN slices and overall network performance.
10th International Conference on Artificial Intelligence and Applications (AI...josephjonse
10th International Conference on Artificial Intelligence and Applications (AIFU 2024) is a forum for presenting new advances and research results in the fields of Artificial Intelligence. The conference will bring together leading researchers, engineers and scientists in the domain of interest from around the world. The scope of the conference covers all theoretical and practical aspects of the Artificial Intelligence.
2nd International Conference on Computer Science, Engineering and Artificial ...josephjonse
2nd International Conference on Computer Science, Engineering and Artificial Intelligence (CSEAI 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Computer Science, Computer Engineering and AI. The Conference looks for significant contributions to all major fields of the Computer Science, Engineering and AI in theoretical, practical aspects. The aim of the conference is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field.
A Cognitive Radio And Dynamic Spectrum Access – A Studyjosephjonse
A basic problem facing the future in wireless systems is where to find suitable spectrum bands to fulfill the demand of future services. While all of the radio spectrum is allocated to different services, applications and users, observation show that usage of the spectrum is actually quite low. To overcome this problem and improve the spectrum utilization, cognitive radio concept has been evolved. Wireless communication, in which a transmitter and receiver can detect intelligently communication channels that are in use and those which are not in use are known as Cognitive Radio, and it can move to unused channels. This makes possible the use of available radio frequency spectrum while minimizing interference with other users. CRs must have the capability to learn and adapt their wireless transmission according to the surrounding radio environment. The application of Artificial Intelligence approaches in the Cognitive Radio is very promising since they have a great importance for the implementation of Cognitive Radio networks architecture. Dynamic spectrum access is a promising approach to make less severe the spectrum scarcity that wireless communications face now. It aims at reusing sparsely occupied frequency bands and does not interfere to the actual licensees. This paper is a review and comparison of different DSA models and methods.
5G Technology: An Assessment of the Opportunities and Challenges in an Emergi...josephjonse
No country wants to be left behind in the tech war as there may be far-reaching consequences in military, health, and well-being, industrial applications, technology, banking, financial services, urbanization, and other facets of private and national life. For an emergent country like Nigeria, the cost of being left behind is enormous and may mean the continuous peril of underdevelopment wrought by over-dependence on other nations for essential services. This paper provides perspectives on sectors where the deployment of the 5G telecommunication network could be a swift driver of an emergent Nigeria. It also highlights the particular challenges facing the deployment of the 5G technology in Nigeria. The study adopted the use of secondary sources to obtain relevant preexisting data to facilitate the research objectives. Restrictions in movement necessitated this approach to curtail the spread of the Coronavirus. The research findings revealed the enormous multi-sectorial benefits of deploying the 5G technology in an emergent Nigeria and the inherent challenges. It is envisaged that the ideas highlighted in the study findings would provide useful guidance for policy directors in the quest for a better emergent Nigeria.
2nd International Conference on Education in Post Pandemic (EDUPAN 2024)josephjonse
2nd International Conference on Education in Post Pandemic (EDUPAN 2024) will act as a major forum for the presentation of innovative ideas, approaches, developments, and research projects in the areas of Education in post Pandemic COVID 19. It also aims to provide a platform for exchanging ideas in new emerging trends that needs more focus and exposure and will attempt to publish proposals that strengthen our goals.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
Software Engineering and Project Management - Introduction, Modeling Concepts...Prakhyath Rai
Introduction, Modeling Concepts and Class Modeling: What is Object orientation? What is OO development? OO Themes; Evidence for usefulness of OO development; OO modeling history. Modeling
as Design technique: Modeling, abstraction, The Three models. Class Modeling: Object and Class Concept, Link and associations concepts, Generalization and Inheritance, A sample class model, Navigation of class models, and UML diagrams
Building the Analysis Models: Requirement Analysis, Analysis Model Approaches, Data modeling Concepts, Object Oriented Analysis, Scenario-Based Modeling, Flow-Oriented Modeling, class Based Modeling, Creating a Behavioral Model.
International Conference on NLP, Artificial Intelligence, Machine Learning an...gerogepatton
International Conference on NLP, Artificial Intelligence, Machine Learning and Applications (NLAIM 2024) offers a premier global platform for exchanging insights and findings in the theory, methodology, and applications of NLP, Artificial Intelligence, Machine Learning, and their applications. The conference seeks substantial contributions across all key domains of NLP, Artificial Intelligence, Machine Learning, and their practical applications, aiming to foster both theoretical advancements and real-world implementations. With a focus on facilitating collaboration between researchers and practitioners from academia and industry, the conference serves as a nexus for sharing the latest developments in the field.
Comparative analysis between traditional aquaponics and reconstructed aquapon...bijceesjournal
The aquaponic system of planting is a method that does not require soil usage. It is a method that only needs water, fish, lava rocks (a substitute for soil), and plants. Aquaponic systems are sustainable and environmentally friendly. Its use not only helps to plant in small spaces but also helps reduce artificial chemical use and minimizes excess water use, as aquaponics consumes 90% less water than soil-based gardening. The study applied a descriptive and experimental design to assess and compare conventional and reconstructed aquaponic methods for reproducing tomatoes. The researchers created an observation checklist to determine the significant factors of the study. The study aims to determine the significant difference between traditional aquaponics and reconstructed aquaponics systems propagating tomatoes in terms of height, weight, girth, and number of fruits. The reconstructed aquaponics system’s higher growth yield results in a much more nourished crop than the traditional aquaponics system. It is superior in its number of fruits, height, weight, and girth measurement. Moreover, the reconstructed aquaponics system is proven to eliminate all the hindrances present in the traditional aquaponics system, which are overcrowding of fish, algae growth, pest problems, contaminated water, and dead fish.
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...shadow0702a
This document serves as a comprehensive step-by-step guide on how to effectively use PyCharm for remote debugging of the Windows Subsystem for Linux (WSL) on a local Windows machine. It meticulously outlines several critical steps in the process, starting with the crucial task of enabling permissions, followed by the installation and configuration of WSL.
The guide then proceeds to explain how to set up the SSH service within the WSL environment, an integral part of the process. Alongside this, it also provides detailed instructions on how to modify the inbound rules of the Windows firewall to facilitate the process, ensuring that there are no connectivity issues that could potentially hinder the debugging process.
The document further emphasizes on the importance of checking the connection between the Windows and WSL environments, providing instructions on how to ensure that the connection is optimal and ready for remote debugging.
It also offers an in-depth guide on how to configure the WSL interpreter and files within the PyCharm environment. This is essential for ensuring that the debugging process is set up correctly and that the program can be run effectively within the WSL terminal.
Additionally, the document provides guidance on how to set up breakpoints for debugging, a fundamental aspect of the debugging process which allows the developer to stop the execution of their code at certain points and inspect their program at those stages.
Finally, the document concludes by providing a link to a reference blog. This blog offers additional information and guidance on configuring the remote Python interpreter in PyCharm, providing the reader with a well-rounded understanding of the process.
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTjpsjournal1
The rivalry between prominent international actors for dominance over Central Asia's hydrocarbon
reserves and the ancient silk trade route, along with China's diplomatic endeavours in the area, has been
referred to as the "New Great Game." This research centres on the power struggle, considering
geopolitical, geostrategic, and geoeconomic variables. Topics including trade, political hegemony, oil
politics, and conventional and nontraditional security are all explored and explained by the researcher.
Using Mackinder's Heartland, Spykman Rimland, and Hegemonic Stability theories, examines China's role
in Central Asia. This study adheres to the empirical epistemological method and has taken care of
objectivity. This study analyze primary and secondary research documents critically to elaborate role of
china’s geo economic outreach in central Asian countries and its future prospect. China is thriving in trade,
pipeline politics, and winning states, according to this study, thanks to important instruments like the
Shanghai Cooperation Organisation and the Belt and Road Economic Initiative. According to this study,
China is seeing significant success in commerce, pipeline politics, and gaining influence on other
governments. This success may be attributed to the effective utilisation of key tools such as the Shanghai
Cooperation Organisation and the Belt and Road Economic Initiative.
Towards Future 4G Mobile Networks: A Real-World IMS Testbed
1. International Journal of Next-Generation Networks (IJNGN) Vol.4, No.3,September 2012
DOI : 10.5121/ijngn.2012.4303 31
TOWARDS FUTURE 4G MOBILE NETWORKS: A
REAL-WORLD IMS TESTBED
Sara El Alaoui, Fatima Zohra Smaili, Omar Bougamza, Mohamed Riduan Abid
School of Science and Engineering,AlAkhawayn University in Ifrane, Morocco
Sa.elalaoui@aui.ma
F.Smaili@aui.ma
O.Bougamza@aui.ma
R.Abid@aui.ma
ABSTRACT
In the near future, current mobile communication networks will converge towards an All-IP network in
order to provide richer applications, stronger customer satisfaction, andfurther return on investment for
the industry. However, such a convergence induces a strong level of complexity when handling
interoperability between different operators and different handset vendors. In this context, the 3GPP
consortium is working on the standardization of the convergence, and IMS is emerging as the
internationally agreed upon standard that is multi-operator and multi-vendor. In this paper, we shed
further light on the subtleties of IMS, and we delineate a blueprint for the implementation of a real-world
IMS testbed. An open source Presence Server is deployed as well. The operation of the IMS testbed and the
Presence Server are checked to assess their conformance with 3GPP standards. A simple third party
application is developed on top the IMS testbed to further assess its operation.
KEYWORDS
4G, IMS, SIP, Presence Server, Third Party Applications
1. Introduction
The design of next generation mobile networks is mainly driven by IP being the successful
technology for present and future mass market communications. While these latter are becoming
multimodal (e.g., voice, video, presence, messaging), the end-user is becoming more and more
demanding in terms of Quality of Service (HD video, and high quality voice), especially when
using mobile terminals.
Current radio access technologies (e.g., Wi-Fi and 3G) are limited in terms of QoS, and 3GPP is
actively working to overcome this limitation. In this context the 4G LTE (Long Term Evolution)
technology [1] is quite mature and ready to use. The only remaining problem towards an All-IP
NGN (Next Generation Network) network is solving the interoperability problem between the
various and different existing operators’ infrastructure networks. So far, there is only one
technology that is multi-vendor, multi-operator, and internationally standardized, that is IMS.
IMS is evolving as the signaling core for telecommunications industry to embrace the IP
technology. It will provide global interoperability between all handsets (whatever), and all
Telecommunications and Networking operators worldwide (wherever and whenever). Thus, IMS
will handle universal service access, i.e., wherever an end user is roaming in the world, he/she
2. International Journal of Next-Generation Networks (IJNGN) Vol.4, No.3,September 2012
32
should be provided with the same set of services. This should be seamless as the user does not
need to do any configuration or whatever to assure a transparent roaming.
In this paper we shed further light on the IMS architecture, and provide a blueprint for developers
to build innovative applications on top of IMS. The blueprint constitutes of: delineating the steps
to deploy a real-world IMS testbed using open source software, delineating the steps to deploy a
Presence Server as the crucial Application Server in IMS, and surveying APIs to provide a richer
platform for developing Third Party Applications. These latter are very likely to constitute the
future killer applications in IT, and this stems from the main fact that, in NGNs, we can reach
everyone without worrying about the operator he/she is affiliated with or the handset he/she is
using at the very moment.
The rest of the paper is organized as follows. Section 2 introduces 4G Mobile networks. IMS is
highlighted in Section 3. The details of the deployment of the IMS system are delineated in
section 4, followed by the testing of our system using a simple Sip Client (X-Lite) and an IMS
Client (UCT IMS Client) respectively in section 5. Section 6 highlights the deployment of the
presence server. In section 7, an example of a third party application, developed using SIP JAIN,
is presented.Finally, we conclude in Section 8.
2. 4G Mobile Networks
Mobile communications are rapidly changing from being an expensive communications
technology used by few people to a ubiquitous technology used by most people in the planet.
Mobile communications started with the first generation (1G) in 1980s which were analog; This
wasborrowed from the military. The second generation (2G) appeared in early 1990s (GSM, IS-
95 CDMA), and it was the first digital mobile communication system. This introduced, for the
first time, data services, e.g., text messaging. However, these data services were still carried over
the circuit-switched network. Data over packet-switched networks became a reality in the second
half of 1990s with the introduction of GPRS (General Packet Radio Systems) and EDGE
(Enhanced Data for GSM Evolution). This was referred to by 2.5G. The migration towards 3G
(e.g., IMT-2000, UMTS) happened in early 2000s, and it carried data over packet-switched
networks while voice carrier remained over circuit-switched networks. 4G, which is the next
generation of mobile networks, adoptedLTE as the new wireless broadband access technology;
this will allow users to access networks with rate up to 1 Gbps (This will enable watching TV and
movies from a cellular phone), a fact that will render mobile technology more and more
attractive. 4G will have both data and voice carried over packet-switched, thus becoming an
ALL-IP network.
Indeed, and thanks to the success of IP networks, next generation of mobile networks will be all
connected to the packet-switched IP network, i.e., the Internet, and this will pave the path towards
interoperability between the different operators networks, which are currently using different core
networks, e.g., X25, Frame Relay, etc.
Once interoperable, the different operators’ networks can develop richer applications rendering
the end-used more and more attached to use his/her handset in connecting to the world. A typical
goal, is to allow a seamless roaming between all operators while having a multi-device-access
feature, e.g., a user can use his WiFi-enabled device to call his/her partner who is using a mobile
phone or setting in front of his/her desktop PC.
Providing such inter-operability is not an easy task since it involves multiple operators who are
using different technologies, and multiple end-user equipment vendors that are loosely coupled to
3. International Journal of Next-Generation Networks (IJNGN) Vol.4, No.3,September 2012
33
the underlying network technology. 3GPP is actively working to finalize the standardization
process that will cope with the interoperability issue. The main 3GPP main standard axes are [2]:
• LTE (Long Term Evolution): The Wireless Access technology.
• EPC (Evolved Packet Core): The All-IP core network that will provide all the
functionalities that was realized through the two separate sub-domains of circuit-switched
for voice, and packet-switched for data in previous generations (2G, 3G).
• IMS (IP Multimedia Subsystem): The signaling core that is responsible for establishing
sessions/connections between end-users. The next section introduces IMS.
3. IMS - IP Multimedia Subsystem
In the telecommunications realm, locating called parties and initiating/maintaining connections
are the first major tasks to provide. H.323 is the most prevalent protocol for session initiation, and
it was largely adopted in PSTNs (Public Switched Telephone Networks) and other networks as
well, e.g., ISDN and ATM. Even if some operators are still using it for IP networks as well, it has
been proved that H.323 is not very suitable and efficient simply because it was initially designed
and shaped for non-IP networks; and since 4G networks are converging to an All-IP network, the
need for an initiation protocol that fits the IP stack appears crucial. In this context, 3GPP
designated SIP (Session Initiation Protocol) as the standard initiation protocol for 4G networks.
IMS is the 3GPP standard architecture for delivering multimedia services in next generation
networks. IMS is a logical layer that runs over IP and uses SIP for sessions’ initiation. Besides,
sessions’ initiation and multimedia delivery, IMS will provide very efficient accounting and
charging services for operators. The major strength of IMS is that it is a multi-operator and multi-
handset-vendor platform that will allow end users to connect regardless of their location (i.e.,
operator) and their handset type. This will exponentially increase the connections establishments
among users in the world which will generate an enormous return on investment for industry and
for developers.
In contrast to current IP networks which only care about the connection (i.e., the IP address), IMS
further focuses on the end-user profiles and on allowing for finding, authenticating, getting the
right end user profile (e.g., presence), then establishing an IP connection. Once the connection is
over, IMS will produce the charging. After all, the operators and service developers do not have
to care about the interoperability between the different networks. In other words, this should be
totally transparent. For instance, in current VoIP solutions, besides the fact that no QoS is
assured, end-users are constrained to use the same software (e.g., Skype, Windows Live), which
constrains connections between users using different platforms.
In conclusion, IMS ensures that the level of complexity induced by handling different operators,
accesses, and handset manufacturers, is not an issue that the developer has to be concerned about.
All above should be transparent to the developer, thus allowing him to concentrate only on the
logic of the service to provide. And the most promising venue for developers is to adapt and
create new applications that fit into handsets as these latter are becoming the most preferable
communication devices,to the extent that this would shape future access to the Internet. Besides,
in contrast to nowadays fixed phones which are attached to a place, handsets are instead attached
to persons; thus we can easily define persons’ profiles rather than places’ profiles.
Besides, nowadays handsets are far more than an ordinary phone; they are a camera, an audio
recorder, a browser, a gaming station, or even a credit card. In other words, future handsets are to
contain quite whatever electronic you can take with you (An ALL-in-one electronic device). This
further highlights the gigantesque existing floor for building new applications.
4. International Journal of Next-Generation Networks (IJNGN) Vol.4, No.3,September 2012
34
4. IMS Deployment
To deploy IMS we started first by investigating existing platforms, and most platforms we found
were realized by companies/operators for commercial purposes mainly. Some of these main
operators that are deploying IMS, considering IMS or have made a decision to deploy an IMS
network are: Alcatel Lucent, Cisco, Nokia Siemens Networks, Tekelec Networks. As we went
deeper into our research we landed at last on the Open IMS Core platform [3] which is developed
by FokusFraunhofer Institute in Germany [4].
4.1. Fokus Open IMS Core
FOKUS is an independent research organization that worked closely with other research institutes
(especially the Technical Institute of Berlin) to develop software for Research and Development
(R&D) purposes. During the 2nd International FOKUS IMS Workshop on November 16, 2006
[3], FOKUS officially launched its Open Source IMS Core project. FOKUS Open IMS Core
project aims to fill the IMS void in the Open Source software landscape, as there were practically
no Open Source platforms to develop an IMS Core. Following the standard IMS architecture set
by 3GPP, Open IMS Core consists of the following components (See Figure 1):
• The Call Session Control Functions (P-CSCF, I-CSCF, S-CSCF): The central
components of the Open IMS Core. These three CSCFs are extensions of the SIP
Expression Router (SER) [5] which is basically a free SIP server developed to act as a
SIP registrar, proxy or redirect server.
• FOKUS Home Subscriber Server (HSS): The database that takes care of managing user
profiles and associated routing rules.
Figure 1: The Fokus Open IMS Core Architecture [3]
4.2. Deployment
The first step was deploying the four Fokus IMS Core components in one station in order to
ensure minimum level of complexity and interdependency between the different IMS Core
components. We went through of prerequisites steps [6, 7], which consisted on installing a Linux
platform, JDK, GCC, MySQL-server, etc. We chose Ubuntu 11.04 to install our test bed for its
availability and compatibility. After setting all the required packages, we began the installation
process. To ease the installation process for readers, we are next highlighting some of the
installation steps that induced problems:
5. International Journal of Next-Generation Networks (IJNGN) Vol.4, No.3,September 2012
35
4.2.1.Pre-requisites:
• Ubuntu 11.04 has by default and Open-JDK that you can use without downloading the JDK
from Sun.
• You can use Ubuntu Software Center to install most of the packages.
• An important package that is mentioned in [7] but not in [6] is the libmysqlclient15-dev.
• In some packages, you may not find the exact version, so you should look for a more recent
one, e.g., JDK 1.5
4.2.2. Source Code:
• Before proceeding, we need to install the Subversion package via this command:
sudo apt-get install subversion
• We downloaded the source files of the IMS Core into two new directories that were made
for this purpose:
~/opt/OpenIMSCore/ser_ims
~/opt/OpenIMSCore/FHoSS
• ser_ims folder is used for storing the configuration files of P-CSCF, I-CSCF, and S-CSCF,
whereas FHoSS stores the HSS configuration files.
4.2.3. Environment Configuration
• At this stage, the default configuration of IMS Core is based on default Domain Name
“open-ims.test” and the loop back address: 127.0.0.1
• Ideally, this configuration should be changed to the real IP address and real Domain Name.
• When the default configuration works well, you can change the configuration settings of all
the files, either manually or via ser_ims/cfg/configurator.sh.
• Whenever we change the name server by altering open-ims.dnszone, named.conf,
named.conf.local in the /etc/bind directory, or resolv.conf andhosts in the /etc directory, we
should restart the bind server via the command:
sudo /etc/init.d/bind9 restart.
4.2.4. Booting the Components
• All the 3 shell files (pcscf.sh, icscf.sh, and scscf.sh) should be run in at the same time in
parallel.
• We should run the FHoSS/deploy/startup.sh database shell as well.
• The JAVA_HOME environment will create problems if it is not correctly set:
Export JAVA_HOME=/usr/lib/jvm/your_jdk_version
After installing the four components (HSS, I-CSCF, S-CSCF, P-CSCF) in one station and
assuring no bugs, we deployed each entity in a separate Linux station (Ubuntu 11.04, Kernel:
2.6.38-8-generic).We started by installing IMS core on the four Linux stations taking into
consideration all the prerequisites needed to support Open IMSCore, and we defined the
connections between the four entities: In the configuration files (/etc/hosts, /etc/bind/open-
ims.dnszone, and the configuration files CSCFs and HSS).We assigned to each of the IMS
components the IP address of the local station, and we run the four components in parallel, one
per station. We used the web console (on http://hss IP address:8080) to manage the users stored
in the database, see Figure 2. Finally, to test the deployment we used both a SIP client and an
IMS client, and tracked the exchanged messages using Wireshark [8]. The next section illustrates
the testing phase.
6. International Journal of Next
Figure 2FHoSS Web Interface: Users Management
5. Testing
After a successful installation of the four components of the Open IMS Core (CSCFs and HSS),
we started the testing phase using both a SIP and an IMS client.
5.1. Testing using a SIP Client
We used the X-Lite [9] SIP client which is a free Open Source VoIP softphone that provides all
the standard telephone services to its users and extends them to other services, mainly instant
messaging, voice, three-way audio and video conferenc
protocol.We used X-Lite 4.0 and the first test consisted on using the two default accounts
provided by Open IMS (alice@open
settings accordingly (set proxy to:
instant messaging and then using voice
call between two newly created accounts.
To assess that the installed IMS Core is compliant with
[8] to trace the messages exchanged during Registration and Call establishment between the
different stations involved.The following
SIP messages between two X-Lite softphones. These captions prove the conformance between
our OpenIMSCore and IMS standards.
International Journal of Next-Generation Networks (IJNGN) Vol.4, No.3,September 2012
FHoSS Web Interface: Users Management
After a successful installation of the four components of the Open IMS Core (CSCFs and HSS),
we started the testing phase using both a SIP and an IMS client.
SIP Client
] SIP client which is a free Open Source VoIP softphone that provides all
the standard telephone services to its users and extends them to other services, mainly instant
way audio and video conferencing, presence using the SIMPLE
Lite 4.0 and the first test consisted on using the two default accounts
alice@open-ims.test and Bob@open-ims.test ). We updated the account
settings accordingly (set proxy to: pcscf.open-ims.test: 4060) and established our first call,
messaging and then using voice. The second step was testing the system by establishing a
wo newly created accounts.
To assess that the installed IMS Core is compliant with the IMS standards, we used Wire
] to trace the messages exchanged during Registration and Call establishment between the
The following figures(Figure 3 and Figure 4) illustrate the exchange of
Lite softphones. These captions prove the conformance between
our OpenIMSCore and IMS standards.
tember 2012
36
After a successful installation of the four components of the Open IMS Core (CSCFs and HSS),
] SIP client which is a free Open Source VoIP softphone that provides all
the standard telephone services to its users and extends them to other services, mainly instant
ing, presence using the SIMPLE
Lite 4.0 and the first test consisted on using the two default accounts
). We updated the account
and established our first call, using
. The second step was testing the system by establishing a
the IMS standards, we used WireShark
] to trace the messages exchanged during Registration and Call establishment between the
illustrate the exchange of
Lite softphones. These captions prove the conformance between
7. International Journal of Next
Figure 3 exchange of SIP messages between two users
Figure 4 Flow
International Journal of Next-Generation Networks (IJNGN) Vol.4, No.3,September 2012
exchange of SIP messages between two users
Flow-diagram of SIP messages between two users
tember 2012
37
8. International Journal of Next
5.2. Testing using an IMS Client
To further assess the IMS testbed compliance to the IMS standards, we used an IMS client for
testing as well. We downloaded UCT IMS Client version 1.0.14 from [
developed by a team from University of Cape Town, South Africa (UCT
on May30Th
, 2012.In order to identify the main differences between SIP client
client (UCT IMS Client), we had recourse to WireShark, again. A brief analysis of the packets
exchanged between IMS client and P
CSCF on the other hand showed that this difference consist
process that the IMS client goes through. Unlike SIP clients, IMS users need to go through
authentication and authorization so as to access the applications [
difference:
Figure 5 REGISTER Request
6. Presence Server
Becoming one the most powerful and important applications in telecommunication, presence is
the dynamic profile of the user that is shared with others. One may think that presence is limited
exclusively to sharing statuses and availability information (ava
its services go beyond this scope and provide information about the “application status”
whether it is provided by client or by server and information
to telling which service it provides,
and so on), and about “dynamic network status” as well(i.e.
being on or off). As a consequence, presence will mold a
which will lead to a presence-based mobile communication. Presence represents, in addition to
this, a promising field for businesses because it can be used in many lucrative ways such as
advertising using means that consumer
At the very beginning, presence
first introduced to IMS by OMA (Open Mobile Alliance)
OMA Presence Architecture, which was
powerful and useful applications were, then, those that make use of the various pieces of
information provided by the presence service. This latter enables the applications to do so by
implementing some methods using SIP. In this context, PUBLISH was implemented to enable a
International Journal of Next-Generation Networks (IJNGN) Vol.4, No.3,September 2012
IMS Client
To further assess the IMS testbed compliance to the IMS standards, we used an IMS client for
testing as well. We downloaded UCT IMS Client version 1.0.14 from [10]; an IMS Client
developed by a team from University of Cape Town, South Africa (UCT), and recently released
In order to identify the main differences between SIP client (X-lite) and IMS
client (UCT IMS Client), we had recourse to WireShark, again. A brief analysis of the packets
exchanged between IMS client and P-CSCF, on the one hand, and between SIP client and P
CSCF on the other hand showed that this difference consists of an additional authentication
the IMS client goes through. Unlike SIP clients, IMS users need to go through
authentication and authorization so as to access the applications [11]. Figure 5
REGISTER Request - IMS Client vs. SIP Client
Becoming one the most powerful and important applications in telecommunication, presence is
the dynamic profile of the user that is shared with others. One may think that presence is limited
exclusively to sharing statuses and availability information (available, busy, absent …). However,
its services go beyond this scope and provide information about the “application status”
whether it is provided by client or by server and information), about “device capability”
to telling which service it provides, i.e.Push-To-Talk over a data network, MMS, video sharing
dynamic network status” as well(i.e. the use of 2G or 3G and the terminal
. As a consequence, presence will mold all the facets of mobile communication
based mobile communication. Presence represents, in addition to
this, a promising field for businesses because it can be used in many lucrative ways such as
nsumer are comfortable with.
At the very beginning, presence appeared as a standalone application in 3GPP release 6; it was
first introduced to IMS by OMA (Open Mobile Alliance) [12] creating what was called later:
, which was composed of eight main building blocks. The most
powerful and useful applications were, then, those that make use of the various pieces of
information provided by the presence service. This latter enables the applications to do so by
using SIP. In this context, PUBLISH was implemented to enable a
tember 2012
38
To further assess the IMS testbed compliance to the IMS standards, we used an IMS client for
]; an IMS Client
), and recently released
lite) and IMS
client (UCT IMS Client), we had recourse to WireShark, again. A brief analysis of the packets
CSCF, on the one hand, and between SIP client and P-
s of an additional authentication
the IMS client goes through. Unlike SIP clients, IMS users need to go through
5 depicts this
Becoming one the most powerful and important applications in telecommunication, presence is
the dynamic profile of the user that is shared with others. One may think that presence is limited
ilable, busy, absent …). However,
its services go beyond this scope and provide information about the “application status” (i.e.
about “device capability” (similar
, MMS, video sharing
the use of 2G or 3G and the terminal
ll the facets of mobile communication
based mobile communication. Presence represents, in addition to
this, a promising field for businesses because it can be used in many lucrative ways such as
a standalone application in 3GPP release 6; it was
creating what was called later:
main building blocks. The most
powerful and useful applications were, then, those that make use of the various pieces of
information provided by the presence service. This latter enables the applications to do so by
using SIP. In this context, PUBLISH was implemented to enable a
9. International Journal of Next-Generation Networks (IJNGN) Vol.4, No.3,September 2012
39
user to share his/her status and availability information with other people called watchers. This
request is sent to the S-CSCF through the P-CSCF so as to be forwarded to the right presence
server. Another important method is SUBSCRIBE; this latter allows a user to register to the
watchers' list of a specific user. For example, if Alice wants to get presence information of Bob,
she needs to send a SUBSCRIBE. Finally, another very used command if NOTIFY which
delivers presentity's presence state.
During our surveying of the common presence server platforms,we first investigated Mobicents
SIP Presence Service [13]. This was the first alternative, but we did not go for it because of all the
necessary components for a presence server are merged in one package, which is not practical
with regards to debugging and to configuration. In addition to this, it limits flexibility. We finally
decided to use OpenSips [14] combined with OpenXCAP [15] along with two other components
which are OpenSips-mi-proxy and soap-simple-proxy. OpenSips was introduced under the name
openSER [5]and was enhanced; its main role is handling the presence statuses of users and
communicating with the S-CSCF. On the other hand, OpenXCAP is the component that stores the
watchers' list and takes care of the privacy rules. Figure 6 depicts the way IMS servers are linked
to the presence. The interface between the end-user and XCAP server was meant to avoid the
overload on the presence server. Besides, XCAP and Presence Server are linked through sharing
the same database.
Figure 6 Presence Server Architecture [7]
After installing OpenSips first, we moved to installing openXCAP. However, since we were
using Ubuntu 12.04 we discovered that there is no version of openXCAP compatible with this
version of Ubuntu, so we had to switch to Ubuntu 11.04. After a successful installation, we
configuredopenXCAP in addition to OpenSips, soap-simple-proxy, and OpenSips-mi-proxy. Still,
when we tried first to start OpenSips, there were some errors in the configuration files. Those
errors were stated in “syslog” file located in /var/log. Basically, there were some missing load-
modules as well as some inconsistencies in the “route” function. For instance, an extra curly
bracket of the function route was added in line 329 of the configuration file of OpenSips
(opensips.cfg) as soon as OpenSips was up and running.We used FHoSS web interface to set the
new value of the IP address of the presence server as shown in the figure below.
10. International Journal of Next-Generation Networks (IJNGN) Vol.4, No.3,September 2012
40
Figure 7FHoSS Web Interface: Setting Presence Server IP Address
At this stage, we used WireSharkto ascertain the connection between the presence server and IMS
was established in the right way. We connected to the network using UCT IMS Client, and we
enabled presence in this latter. The packets sniffed by WireShark and displayed were the
messages we were expecting; that is to say, the requests exchanged were: SUBSCRIBE,
PUBLISH and NOTIFY. Figure 8 illustrates the messages:
Figure 8 Exchanged messages between the Presence Server and the IMS Core
7. A Third Party Application using JAIN SIP
SIP is a standard communication protocol for controlling communication sessionssuch as voice
and video calls over Internet Protocol (IP). The Java Community Process (JCP) [16] developed an
API for telecommunications that was named the Java API for Integrated Networks (JAIN). Later,
JAIN SIP was released as the Java interface to SIP for desktop and server applications. It is also
considered to be the first attempt to enhance the development of SIP-based multimedia
applications. As it is a high level API, JAIN SIP provides abstractions for SIP Protocol, dialog
handling, etc.
The JAIN SIP API [17] is composed of the following main packages:
11. International Journal of Next
• javax.sip:This package contains the main interfaces that model the architecture from both
an application developer and a stack vendor view. Main interfaces of this package are
ListeningPoint, ServerTransaction
• javax.sip.address: this package contains interfaces that represent the Addressing
components of the SIP protocol.
AddressFactory.
• javax.sip.message: This package contains the interfaces representing SIP messages.
Interfaces of this package are Message, MessageFactory, Request, and Response.
• javax.sip.header: This package contains all the headers
specification.
To gain a better understanding of JAIN SIP API, we
Messaging application [18]. The application is built over three main classes:
and MessageProcesso. The TextClient
address, and a port number (by default, the IP address is set to the
changed itinthe source code in order to allow running Instant Messaging
different stations). TextClient pr
between the two user agents (or the two
TextClient level, it first creates a
of the SIP implementation: instances of
MessageFactory. The SipStack
used to create a SipProvider instance. All of these steps happen at the
Constructor.
Thus, after creating two user agents from the
a message, the user should specify the URI of the other user device, and it has the following
format: sip:username@ip_address:port
Figure
8. Conclusion and Future Work
In this paper, we presented a detailed blueprint for the deployment of a real
using open source software. Encountered problems as well as detailed steps are highlighted.
operation of the testbed is checked to conform to
International Journal of Next-Generation Networks (IJNGN) Vol.4, No.3,September 2012
This package contains the main interfaces that model the architecture from both
an application developer and a stack vendor view. Main interfaces of this package are
ServerTransaction, SipListener, SipProvider, and SipStack.
this package contains interfaces that represent the Addressing
components of the SIP protocol. The main interfaces of this package are Address, and
This package contains the interfaces representing SIP messages.
Interfaces of this package are Message, MessageFactory, Request, and Response.
This package contains all the headers’ interfaces supported by this
better understanding of JAIN SIP API, we refer the reader to an open source Instant
The application is built over three main classes: TextClient
TextClient class declares a SipLayer instance given a username, IP
address, and a port number (by default, the IP address is set to the Localhost address, but we
the source code in order to allow running Instant Messaging application
prompts a graphical interface to output the messages exchanged
between the two user agents (or the two TextClient instances).When SipLayer is instantiated at the
level, it first creates a SipFactory instance that would allow for creating the backb
of the SIP implementation: instances of SipStack, HeaderFactory, AddressFactory
instance serves for creating a ListeningPoint instance, which is
instance. All of these steps happen at the level of the
Thus, after creating two user agents from the TextClient class, we started testing. In order to send
a message, the user should specify the URI of the other user device, and it has the following
sip:username@ip_address:port, see Figure 9.
Figure 9 Customized JAIN SIP Application
Conclusion and Future Work
In this paper, we presented a detailed blueprint for the deployment of a real-world IMS testbed
using open source software. Encountered problems as well as detailed steps are highlighted.
stbed is checked to conform to the 3GPP specifications.
tember 2012
41
This package contains the main interfaces that model the architecture from both
an application developer and a stack vendor view. Main interfaces of this package are
this package contains interfaces that represent the Addressing
ain interfaces of this package are Address, and
This package contains the interfaces representing SIP messages.
Interfaces of this package are Message, MessageFactory, Request, and Response.
interfaces supported by this
an open source Instant
TextClient, SipLayer,
instance given a username, IP
address, but we
application between two
a graphical interface to output the messages exchanged
is instantiated at the
instance that would allow for creating the backbone
AddressFactory, and
instance, which is
level of the SipLayer
class, we started testing. In order to send
a message, the user should specify the URI of the other user device, and it has the following
world IMS testbed
using open source software. Encountered problems as well as detailed steps are highlighted. The
12. International Journal of Next-Generation Networks (IJNGN) Vol.4, No.3,September 2012
42
The testbed will help the research community to establish an IMS core and thus set an important
component in the establishment of future next generation networks. Once set, third party
applications can be developed using common APIs. In this paper, we used JAIN SIP, and we
showed how to build a simple messaging application on top of the deployed IMStestbed. More
sophisticated applications can be developed, e.g., using the presence state.
As a future work, we are intending to extend the deployed IMS testbed to cover the whole
university campus by using powerful stations, deploying multiple domains, and resolving NAT
problems. Once installed, advanced applications for mobile handsets will be deployed, especially
VoIP applications accounting for presence and user profiles.A future step is to acquire 4G
femtocells, interface them to the IMS core, and thus paving a sold floor towards promoting richer
4G mobile applications.
References
[1] 3GPP Long Term Evolution, http://www.3gpp.org/LTE.
[2] P. Miikka, N. Aki, K. Hishamand M. Georg.The IMS: IP Multimedia Concepts and Service, 2nd ed.
UK: John Wiley & Sons Ltd, 2006.
[3] Fraunhofer FOKUS NGNI. Open IMS Core Welcome to Open IMS Core's Homepage [Online].
Available: http://www. openimscore.org.
[4] The FokusFraunhofer Institute, http://www.fokus.fraunhofer.de/en.
[5] Opensips. (2012, August 15).More about OpenSIPS [Online].Available: http://www.opensips.org/.
[6] FOKUS. Open IMS Core Installation Guide[Online]. Available:http:
//www.openimscore.org/installation _guide.
[7] W. Dave, O. Vitalis, and E. Asma. (2012, June 25)."UCT IMS Client." UCT IMS Client.University of
Cape Town, South Africa, n.d.[Online].Available:
http://uctimsclient.berlios.de/openimscore_on_ubuntu_howto.html.
[8] Wireshark, http://www.wireshark.org/.
[9] Counterpath Corporation, X-Lite Softphone. (2003).http://www.counterpath.com/x-lite.htm.
[10] BerliOS. (2012, May 13). UCT IMS Client [Online].Available:http://uctimsclient.berlios.de/.
[11] P. Dubravko and Miljenko.M. (2008).Security risks of pre-IMS AKA access security
solutions[Online].Available: http://www.ericsson.com/hr/etk/dogadjanja/mipro_2008/1227.pdf.
[12] Open Mobile Alliance Organization, http://www.openmobilealliance.org/.
[13] Mobicents. (2008). SIP Presence Service Introduction [Online]. Available:
http://www.mobicents.org/sip-presence/intro.html.
[14] OpenSips. (2012, February 22). OpenSIPS 1.7.2 [Online].Available: http://opensips.org/pub/opensips
/1.7.2/.
[15] L. J. Philippe. (2011, June 9). OpenXCAP Installation [Online]. Available:
http://openxcap.org/projects/openxcap/wiki/Installation.
[16] JCP: The JAVA Community Process, http://jcp.org/.
[17] P. O. Doherty and R. Mudumbai.NIST-SIP: The Reference Implementation for JAIN-SIP
1.2[Online].Available:http://hudson.jboss.org/hudson/job/jainsip/lastSuccessfulBuild/artifact/javadoc/
overview-summary.html.
[18] P. Emmanuel. (2007, October 17). Introduction to JAIN SIP [Online].Available:
http://www.oracle.com/technetwork/articles/entarch/introduction-jain-sip-090386.html.
13. International Journal of Next-Generation Networks (IJNGN) Vol.4, No.3,September 2012
43
Authors
Sara EL ALAOUI is a senior student at the Computer Science program [ABET
Accredited] at Alakhawayn University in Ifrane, Morocco
Fatima Zohra SMAILI is a senior student at the Computer Science program
[ABET Accredited] at Alakhawayn University in Ifrane, Morocco
Omar BOUGAMZA is a senior student at the Computer Science program [ABET
Accredited] at Alakhawayn University in Ifrane, Morocco
Mohamed Riduan ABID received a Ph.D in Computer Science in 2010 from Auburn
University,USA. He received in 2006 the Excellence Fulbright Scholarship. He is
currently an Assistant Professor of Computer Science at Alakhawayn
University,Morocco.