An analysis of the video capabilities of multiple antenna LTE networks

MACRo 2015 ◽  
2017 ◽  
Vol 2 (1) ◽  
pp. 87-95
Author(s):  
Radu Curpen ◽  
Titus Balan ◽  
Fabian Socea ◽  
Florin Sandu

AbstractLTE technology has been designed to serve high data traffic and to withstand occasional traffic bursts caused by various events that arise when live video streams are watched. LTE will have to manage its resources judiciously since video traffic is not constant, and at the same time it will have to seek to offer highest quality experience. This paper demonstrates the benefits of using MIMO technique with 4 transmitters instead 2 when requesting live video streams. It also displays mobility cases each with a different subscriber moving speed, and with different gains, respectively.

2020 ◽  
Vol 12 (1) ◽  
Author(s):  
Nida Nurvira ◽  
Anggun Fitrian Isnawati ◽  
Achmad Rizal Danisya

Increasing user requirements for LTE networks, data traffic from eNodeB to core network is also increases, therefore, the recommended solution for meeting this high data traffic is to use a backhaul network design. Backhaul is the path or network used to connect eNodeB with the core network. In this research, backhaul technology used is wi-fi 802.11ac backhaul and microwave backhaul. In this study begins by collecting existing data, then perform capacity calculations to find out the number of eNodeB needed and to find out the capacity of the backhaul links to be designed, then determine the antenna height to achieve LOS conditions, then calculate the desired performance standards and calculate the backhaul network link budget on microwave and wi-fi technologies. Based on the calculation results in terms of capacity, the total user target is 90,167 users and has a throughput capacity per eNodeB of 61 Mbps. In the link-capacity calculation, the total link capacity is 427 Mbps. From the simulation results that using microwave technology, the average RSL value is -30.90 dBm, the value meets the -57 dBm threshold standard and the value of availability does not meet the standard of 99.999% because the average value obtained is 99.998095%. Whereas for wi-fi technology, the average RSL value is -39.24 dBm and meet the -72 dBm threshold standard, for the average availability value meets 99.999% standard, with a value of 100%. From the results of the two technologies, can be conclude that the wi-fi technology is more suitable for the use of backhaul network design in Ciputat Sub-district.


Author(s):  
Ondřj Texler ◽  
David Futschik ◽  
Michal Kučera ◽  
Ondřej Jamriška ◽  
Šárka Sochorová ◽  
...  

Author(s):  
Muhammad Faheem Mustafa ◽  
Ayaz Ahmad ◽  
Raheel Ahmed

With the rapid increase in data traffic and high data rate demands from cellular users, conventional cellular networks are becoming insufficient to fulfill these requirements. Femto cells are integrated in macro cellular network to increase the capacity, coverage, and to fulfill the increasing demands of the users. Time required for handoff process between the cells became more sensitive and complex with the introduction of femto cells in the network. Public internet which connect the femto base station with the mobile core network induces higher latency if conventional handoff procedures are also employed in macro-femto cell network. So, handoff process will become slower and network operation will become insufficient. Some standards, procedures, and protocols should be defined for macro-femto cell network rather than using existing protocols. This chapter presents a comprehensive survey of handoff process, types of handoff in macro-femto cell network, and proposed methods and schemes for frequent and unnecessary handoff reduction for efficient network operation.


2019 ◽  
Vol 19 (2) ◽  
pp. 56-61
Author(s):  
Mohanad Abdulhamid ◽  
Singoee Sheshai

AbstractAs a critical constituent of many associations’ protection and security precedence, video surveillance has set up its importance and benefits numerous instances with the aid of imparting immediate supervising of possessions, people, surroundings and property. This paper deals with the diagram strategy of an embedded real-time surveillance gadget based totally on Raspberry-Pi single board computer (SBC) for intruder detection which is reinforcing technology of surveillance to supply fundamental security to our life and associated control and alert operations. The suggested safety solution is hinging on our novel integration of cameras and action detectors into application of web. Raspberry-Pi is operating and controlling action detectors and video cameras for far flung sensing and surveillance, streams live video and files it for future playback. Also, this paper is focusing on growing a surveillance machine that detects strangers and to response speedily through taking pictures and relaying photos to proprietor based totally wireless module. This Raspberry-Pi based clever surveillance machine presents the concept of monitoring a region in a far-flung area. The suggested solution offers a fee advantageous ubiquitous surveillance solution, environment friendly and convenient to implement. Furthermore, the paper presents the idea of motion detection and tracking using image processing. This type of technology is of great importance when it comes to surveillance and security. Live video streams therefore be used to show how objects can be detected then tracked. The detection and tracking process are based on pixel threshold.


2013 ◽  
Vol 30 (1) ◽  
pp. 45-58 ◽  
Author(s):  
Zhan Yu ◽  
Xuan Yu ◽  
Christopher Thorpe ◽  
Scott Grauer-Gray ◽  
Feng Li ◽  
...  
Keyword(s):  

2009 ◽  
Vol 43 (2) ◽  
pp. 109-129
Author(s):  
Rodrigo Fernandes de Mello ◽  
Rudinei Goularte ◽  
Evgueni Dodonov ◽  
Laurence T. Yang ◽  
Jong Hyuk Park ◽  
...  
Keyword(s):  

2019 ◽  
Vol 8 (4) ◽  
pp. 7197-7201

The current problems raising as a horizon in the computational and networking sector is based on the unimaginable increase of high numbers of users which in turn results in high data traffic, limitations over products which are vendor specific, incurring high expenses in maintaining the existing network. This dilutes a major part of the beneficiaries in the sector to move towards Cloud Networks. All these happenings in the past has quietly increased the risks and challenges in the aspect of security considering both data and the infrastructure accommodating the data. In an attempt to address almost a major portion of the existing above said problems, Software Defined Networking was highly anticipated, however, it was considered as a theoretical approach. After the implementation of SDN networks by industrial giants like Google, the SDN concepts again managed to reach the safer hands of the researchers in the movement of enhancement. A very rapid and high speed research work has been initiated by researchers all around the globe in analysing the risk factors and implementation barricades stated in the Software Defined Networking architecture. The research work focus on adding values to the Quality of Service, Latency, Load Balancing and most importantly the security aspects in various metrics of the Software Defined Networking Architecture. The odd man out architecture of Software Defined Networking by decoupling data and control plane allows the network to be configured and maintained in a real time scenario pertaining to pose a complete view of the network and its flow. The fact that is considered as an advantage itself is a factor of question in the case of security in the overall SDN architecture. This paper focuses on a detailed view of SDN architecture with the existing security feature and continues with the expected threats and classifying the weak points in the SDN. This paper also briefs about the pros and cons of the existing applications in the SDN architecture.


Sign in / Sign up

Export Citation Format

Share Document