radio mobile network monitoring

Top PDF radio mobile network monitoring:

Radio Link Parameters Based QoE Measurement of Voice Service in GSM Network

Radio Link Parameters Based QoE Measurement of Voice Service in GSM Network

Although those two algorithms have been implemented by equipment manufacturers, with high accuracy if ade- quate enough network parameters are collected, their in- dex values are not very applicable to monitor the QoE of voice service and network quality. That’s because the major parameters such as FER, BER, frame loss and so on which have a great impact on QoE can’t be real-time acquired by operators in the GSM signaling monitoring platform. Besides, the speech index values of SQI and VQI cannot be compared in the network monitoring and optimization because of their private interfaces by dif- ferent manufacturers. The purpose of this paper is to solve the existing problems by proposing a novel QoE mea- suring algorithm especially for GSM network. The algo- rithm inputs are specific network parameters collected in signaling monitoring platform from commercial GSM net- work of China Mobile. Multiple Linear Regression (MLR) based on least squares is adopted to further investigate the relationship between network parameters and QoE of voice service. All of these features make it possible that the real-time algorithm with low complexity is suitable for monitoring QoE of voice service by operators.
Show more

7 Read more

Correlating Real-time Monitoring Data for Mobile Network Management

Correlating Real-time Monitoring Data for Mobile Network Management

The 3G wireless mobile networks support voice service as well as many data services such as video streaming, email and web browsing, messaging and online gaming. With the proliferation of these mobile services, we have witnessed a rapid growth of complexity in wireless mobile networks. UMTS Terrestrial Radio Access Network (UTRAN) is a critical infrastructure for mobile networks and it consists of many Node B base stations and Radio Network Controllers (RNC). UTRAN provides connectivity between User Equip- ments (UE) (e.g. cellular phones) and core networks and its structure is shown in Figure 1. Due to the importance of UTRAN in mobile networks and its growing complexity, UTRAN system is instrumented to generate large amount of monitoring data for performance analysis. For exam- ple, according to 3GPP technical specifications [3], hundreds of performance measurement counters can be collected as performance indicators to track and analyze the operational status of UTRAN system. Number of connection estab-
Show more

8 Read more

Design of Mobile 4G Gateway Based on Zigbee Wireless Sensor Network

Design of Mobile 4G Gateway Based on Zigbee Wireless Sensor Network

problem of using ARM processor S3C2440A to realize protocol conversion between networks [2]. Khan et al. (2016) discussed the idea and scheme of network node design and development. Generally, the combination of processor and radio frequency pro- cessing chip or high integration chip system architecture uses single chip or low-end processor. It also uses the embedded software architecture to implement the transmis- sion network function [3]. Mosterman et al. (2016) studied the two means of the design of embedded software. One is the design idea based on the TinyOS operating system, and another is the solution scheme based on the ZigBee protocol stack. TinyOS can quickly develop component-based architecture, which reduces the code volume oper- ating of the sensing network. The system and library functions are written and designed based on structured concepts and execution models. The solution to the ZigBee stack is to transplant ZigBee protocol stack on the microprocessor or on chip system, and then use the application programming interface function to complete the development of application layer [4]. Khan et al. (2016) studied wireless remote monitoring based on WSN. They used the simple structure, small size, and low cost features of WSN composed of ZigBee technology to realize close range wireless connection, which can ensure the real-time and reliability of data transmission [5]. Nellore et al. (2016) dis- cussed the ZigBee technology and gave the composition of the wireless data acquisition system based on ZigBee. Finally, they completed the node acquisition by using CC2430 chip, designed the hardware and software of the main control unit, and realized data acquisition and wireless transmission [6]. Khan et al. (2016) analyzed the new and open wireless interconnection technology - ZigBee technology, combined sensor technol- ogy, ZigBee technology and routing protocol, and constructed a WSN [7]. Shaikh et al. (2016) studied the ARM9 industrial control motherboard as the core unit, used the om- nidirectional vibration sensor, and designed a set of vibration data acquisition system based on WSN by combining with the ZigBee wireless network technology [8].
Show more

16 Read more

Nokia Siemens Network NetAct For Juniper. Mobile Broadband Ethernet and IP Assurance

Nokia Siemens Network NetAct For Juniper. Mobile Broadband Ethernet and IP Assurance

Juniper Networks support in the NetAct Monitoring & Reporting applications enables the user to build network views that reflect the e2e physical connectivity across the Radio Access, Backhaul and Core networks. This combined with common alarm monitoring processes and tools enables events to be correlated so that fault detection and isolation is expedited enabling faster restoration of service times.

6 Read more

Green Cellular Network Deployment to Reduce RF Pollution

Green Cellular Network Deployment to Reduce RF Pollution

Across the developed and developing world, wireless communications has proven a necessity. There seems no end in sight to the proliferation of mobile communications as over 120,000 new base stations are deployed yearly, and there is growth across every demographic from teenagers to businessmen to the poorest Indian village. The developing world has turned to wireless communications as a leap frog technology past wired communications which spurs its growth even more. Simultaneously, the industrialized world has developed an insatiable demand for broadband data (including internet and multimedia services) delivered through their cellular handset. This meteoric rise in users and data demand alone does not create a crisis; however when one evaluates the communications ecosystem from a carbon footprint and energy cost perspective, the results are startling. A medium sized cellular network uses as much energy as 170,000 homes. While the cost of powering the needed base stations accounts for a staggering 50% of a service provider‘s overall expenses. This impact is magnified by the requirement for expensive ‗dirty‘ diesel fuel for many locations in developing regions. The deteriorating economic landscape combined with the emerging emphasis on stewardship to the environment has made the ‗greening‘ of communications an imperative. R.F. pollution is harmful to mankind and can cause neurological, cardiac, respiratory, ophthalmological,
Show more

6 Read more

QUALITY OF SERVICE SUPPORT MOBILE AD-HOC NETWORKS (MANETS): ITS CHALLENGES AND ASSOCIATED ISSUES

QUALITY OF SERVICE SUPPORT MOBILE AD-HOC NETWORKS (MANETS): ITS CHALLENGES AND ASSOCIATED ISSUES

The benefits and problems of the two main QoS architectures, the Integrated Services model and RSVP keep the state of the reservations per flow; they can provide a greater level of accuracy and a finer level of granularity on the part of the network to respond to service requests. The service requests of each application are used to generate a reservation state within the network. This state-based model is intended to be exclusionary, where other traffic, for example best-effort traffic, is dropped in order to meet the promised service targets [1] . The architecture also poses some challenges to the queuing mechanisms as there is the requirement to allocate absolute levels of egress bandwidth to individual flows while still supporting an unmanaged low priority best effort traffic class. Moreover, keeping accurate information of reservation states may be quite challenging in a dynamic mobile environment. Some people claim that, due to these issues, RSVP is not able to scale with the traffic, and, thus, RSVP would not be a proper solution in current networks.
Show more

10 Read more

Prediction-Based Channel Selection Prediction in Mobile Cognitive Radio Network

Prediction-Based Channel Selection Prediction in Mobile Cognitive Radio Network

CR network (CRN) implements spectrum utilization by allocating low priority unlicensed users (CR) to exploit idle license channels which are used by high priority licensed users (PUs) in an opportunistic manner [4]. However, the CR must vacate the channel prior to PUs return to claim for channels access. A set of procedures called spectrum handoff will be initiated where the system will find any new vacant channel through random channel selection and spectrum sensing to resume their interrupted transmissions. It is seen that the performance of a spectrum handoff operation depends greatly on the performance of spectrum sensing. Many works studies on the decision errors provide by spectrum sensing [5]–[7], quantified in terms of false alarm and misdetection probabilities that are caused by noise and the channel impairments such as shadowing and fading. A false alarm occurs when an idle channel is sensed busy, while misdetection occurs when busy channel is sensed free. These errors will consequently lead to loss of opportunities and collision with PU in the channel respectively.
Show more

12 Read more

2014 NRTRC TELEMEDICINE CONFERENCE

2014 NRTRC TELEMEDICINE CONFERENCE

Case 2: RFID Integration with Mobile Smart Phone, Wireless Sensor Network and Bluetooth [19].  Continuous monitoring and patient[r]

36 Read more

Performance Monitoring Solution. Service Assurance through QoE and QoS insight

Performance Monitoring Solution. Service Assurance through QoE and QoS insight

For over a decade Epitiro has been providing industry leaders such as BT, Vodafone, O2, Ofcom, the GSMA and others with solutions for understanding network quality and true customer experience. More than just tools that collect measurements, our solutions turn data into intelligence with bespoke dashboards, alerting and reporting capabilities.

17 Read more

Land Mobile Radio (LMR) Basics Communications 101 Webinar

Land Mobile Radio (LMR) Basics Communications 101 Webinar

• History of Public Safety Radio • Land Mobile Radio Equipment • Public Safety Radio Spectrum.. • Overview of Pubic Safety Radio Operation and Systems.[r]

29 Read more

Mobile Phone Antenna Performance 2013

Mobile Phone Antenna Performance 2013

that the incoming power to the mobile phone is arriving equally likely from all directions and both polarisations as is commonly the assumption taken in mobile communication [Jak74] it is possible to use the terms Total Isotropic Sensitivity (TIS) as is agree upon by 3GPP and CTIA [CTI13]. The TIS include all the losses in the phone (like impedance matching losses, ohmic and dielectric losses) and can include the losses in the human user of the phone. For the present values the TIS is measured according to the CTIA test plan, 3.3 from October 2013 for speech calls with the SAM head and in the right hand. Releases 3.3 is now public available at the CTIA web page: http://ctia.org/business_resources/certification/index.cfm/AID/11259
Show more

14 Read more

Toward Information-Centric Software-Defined Cellular Networks

Toward Information-Centric Software-Defined Cellular Networks

In this paper, we present a novel ICN protocol for SDN based cellular networks. The proposed approach can be easily implemented on SDN controllers that operate at both RAN and MCN levels. We design and implement two important network functions, namely the request resolution function and the content routing function, according to the ICN paradigm. We evaluate our solution by means of computer simulations and perform a comparison with the traditional host-centric approach as implemented in the current LTE networks. Our extensive experimental results show significant reductions of response times when a large number of MUs request a high- definition video streaming service. We also study the impact of the cluster size on the network performance and identify optimal clustering for the chosen scenario. Further studies are required, however, to design an optimal clustering algorithm for the general case. In our future work we plan to design and evaluate an ICN based mobility management function. We also plan to extend our approach to support multi-source content delivery.
Show more

8 Read more

REMOTE MONITORING OF ER PROBES USING A 900MHZ MESH NETWORK

REMOTE MONITORING OF ER PROBES USING A 900MHZ MESH NETWORK

At Alaska’s North Slope, existing fields span a large geographic area where three phase production fluids can cause severe corrosion. To monitor corrosion and provide feedback for the chemical mitigation program, electrical resistance probes connected to remote data collectors are installed at approximately 80 locations. Measurements are made on a four hour interval at each location, and data are collected during weekly site visits. A wireless remote monitoring unit utilizing a mesh network of 900 MHz spread spectrum radios was developed to collect data from the existing hardware and transmit it to a central location. In a pilot project, five remote monitoring units and one central unit were successfully deployed in the summer of 2005.
Show more

9 Read more

Case 1:13-cv UNA Document 1 Filed 01/04/13 Page 1 of 11 PageID #: 1 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF DELAWARE

Case 1:13-cv UNA Document 1 Filed 01/04/13 Page 1 of 11 PageID #: 1 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF DELAWARE

13. Defendants are properly joined under 35 U.S.C. §299(a)(1) because a right to relief is asserted against the parties jointly, severally, and in the alternative with respect to the same transactions, occurrences, or series of transactions or occurrences relating to the making, using, importing into the United States, offering for sale, and/or selling the same accused products. Specifically, as alleged in detail below, Defendants are alleged to infringe the ‘834 Patent with respect to the same free-standing mobile hotspot devices including, but not limited to, AT&T Mobile Hotspot Elevate 4G.
Show more

11 Read more

A Lightweight Technique to Prevent Wormhole Attacks in AODV

A Lightweight Technique to Prevent Wormhole Attacks in AODV

of the initial SBBNs, they enter a sleeping mode and can be used only in an emergency or to periodically perform random security check on the trust values of higher level BBNs. When all SBBNs enter the sleeping mode, the technique will depend only on the new constructed trustable, mobile, powerful, dynamic and high coverage backbone network that is constructed from regular MANET nodes. In this case the proposed backbone network will be close to be an ideal one. The nodes of the backbone network monitor each other as well as the regular nodes that are located in their transmission range and set them MTVs which represent the reliability of each node in the network. The status of backbone network nodes can change ups and downs from level to level based on MTV as will be shown in the next section. Except the initial seeds, no backbone node is considered trusted forever. Increasing the number of BBNs and CBBNs helps in facing the dynamics of MANET, increases the coverage, increases the reliability, distributes the control, saves the nodes recourses, speeds up the detection and the removal process. High levels (most trusted) nodes of the backbone network can guide vital decisions like changing the status of lower level nodes based on their trust value to be higher, lower, regular nodes or even malicious nodes then, isolating them from the network which is described in details in the next section. The proposed multi-level backbone network is mobile, dynamic, trusted, powerful, has high coverage, reliable, distributes the control, saves the nodes recourses, and robust can face nodes failure. Besides, its construction process consumes low overhead because all of the exchanged control data between the backbone network nodes is added to the AODV HELLO message as additional fields to reduce the control packets overhead.
Show more

9 Read more

Reyee Series Product Overview. Redefine your easy network

Reyee Series Product Overview. Redefine your easy network

RG-EG105G RG-EG105G-P RG-EG105GW Cloud Service Self-organizing Network Real Topology Delivery Report Mobile Provisioning Mobile Monitoring & Alarm Mobile maintenance Remotely.. Acces[r]

61 Read more

Customized Services over Virtual Wireless Networks: The Path towards Networks without Borders

Customized Services over Virtual Wireless Networks: The Path towards Networks without Borders

Virtualization of wireless networks comes with its own set of challenges, due to their operation in a medium that is inherently shared. In the research arena, the GENI program in the US relies on virtualization to explore new network architectures, slicing the network resources in space and time. This requires support for independent experiments to run concurrently while sharing a common set of devices and frequency bands. The approaches to achieve virtualization in GENI wireless experiments (e.g., [5]) provide a path to experiments on virtualization in other large wireless testbeds, and may eventually evolve to support the large scale virtualization and resource aggregation we envision in NwoBs. With a similar motivation but focusing on switching and routing elements within the network, OpenFlow [6] provides a solution to run networking experiments in the production network deployed in research labs and universities, again achieving resource virtualization. The ability to run large-scale testbed experiments is crucial to advance research on new wireless network architectures such as NwoBs, and we expect initiatives such as GENI and the testbed federations deployed under the European Commission’s Future Internet Research and Experimentation (FIRE) program to be important assets in this work.
Show more

10 Read more

Paradigms for Mobile Agent-Based Active Monitoring of Network Systems

Paradigms for Mobile Agent-Based Active Monitoring of Network Systems

Only the new generation of IDS, like Emerald [14], Grid [16], are hierarchical, can support both host and network based monitoring, and provides some extensibil- ity of adding new data analysis and reporting modules. However, they are difficult to reconfigure or add new capabilities and functionalities. These IDS usually have to be restarted to make any changes to take effect. Our monitoring system can be dynam- ically reconfigured or new functionalities can be added in the system by creating and launching new agents with added functionalities to co-exist with the old ones. More- over, Emerald and Grid do not provide mechanism for detecting what events need to be monitored and where such events should be collected [19]. Correlator agents in our mobile agent based monitoring framework can move to the event publishing hosts for efficiency.
Show more

14 Read more

Radio Access Network and Spectrum Sharing in Mobile Networks: A Stochastic Geometry Perspective

Radio Access Network and Spectrum Sharing in Mobile Networks: A Stochastic Geometry Perspective

The first thing we analyze is the comparative coverage result for various sharing scenarios, when networks of sharing operators are evenly sized. In Fig. 2(a) we immediately see that infrastructure sharing provides superior coverage over the no sharing and spectrum sharing. This comes from the fact that infrastructure sharing increases the number of transmitters that a user can attach to without affecting the interference in the network. Spectrum sharing significantly increases interference, as there may be active transmitters of another operator lo- cated arbitrarily close to the user; this results in the lowest coverage across the four sharing scenar- ios. When the shared spectrum bands experience frequency-selective fading (see Fig. 2(b)), we see the coverage performance in each spectrum sharing scenario being significantly improved, due to diver- sity gains, with full sharing faring very closely to infrastructure sharing. Interestingly, there exists a cross-over point between the full and infrastructure sharing cases. Full sharing provides better coverage at low SIR values, as users experiencing strong inter- ference are very susceptible to having unfavourable fading conditions, and, due to frequency-selective fading, coverage to such users may be significantly improved by simply transmitting over a number of spectrum bands. While high SIR users also benefit from the aggregation of multiple bands, it is still more beneficial for them to simply change their point of attachment.
Show more

17 Read more

Online Full Text

Online Full Text

profile the mobile devices location and movement by access points and antennas to raise accuracy. The Location determination method was implemented on the basis of signal strength, using various factors to raise accuracy and the triangular surveying ability. Our method utilised the profile data of our laboratories server to correct the signal strength variation which is very large according to determination environments. The main task of the experiment was to collect location data in order to examine the overall performance of the positioning model under optimum to adverse operating conditions e.g. noise and interference. Several types of location data were collected and stored in different files. The organization of the experimental testing was carefully designed taking into consideration dynamic and static user measurement scenarios in urban, rural and open space navigation environments. In order to evaluate our Geofencing Security model, a dataset of a user’s movement is required. Our experiment will focus on the movement of a wireless laptop attached to an RFID tag whose movement together with that of its user is monitored through a wireless controller system. Our experiment will probably typically be used as a service in an office therefore the ideal dataset will be that from a room with office measurements, say like that of an open floor plan were hot desking can take place. Our experiment aims to generate movement on a pre-defined line within a pre-defined parameter. The environment in which the monitoring takes place is a Wi-Fi enabled open plan office (test bed) and has the necessary components for a laptop to connect to a wireless controller system. Our Geofencing Security Trust Model was developed as a result of the challenges that wireless networks face from the leakage of radio waves which they use to transmit their data. The project used Airetrak’s Huntingdon laboratory as its test bed and proved that Geofencing can be used as a security access measure for securing wireless networks. The Geofencing Security Trust Model is the result of two years work from concept to implementation. Funds were provided for the project by the Haberdashers Fund and the Emerald Fund and the project collaborated with Airetrak (An independent Wi-Fi tracking solutions company) to obtain Proof of Concept.
Show more

6 Read more

Show all 10000 documents...