scholarly journals Analysis And Performance Comparison of Microwave And WiFi 802.11ac Based Backhaul For Long Term Evolution Network In Urban Area

2020 ◽  
Vol 12 (1) ◽  
Author(s):  
Nida Nurvira ◽  
Anggun Fitrian Isnawati ◽  
Achmad Rizal Danisya

Increasing user requirements for LTE networks, data traffic from eNodeB to core network is also increases, therefore, the recommended solution for meeting this high data traffic is to use a backhaul network design. Backhaul is the path or network used to connect eNodeB with the core network. In this research, backhaul technology used is wi-fi 802.11ac backhaul and microwave backhaul. In this study begins by collecting existing data, then perform capacity calculations to find out the number of eNodeB needed and to find out the capacity of the backhaul links to be designed, then determine the antenna height to achieve LOS conditions, then calculate the desired performance standards and calculate the backhaul network link budget on microwave and wi-fi technologies. Based on the calculation results in terms of capacity, the total user target is 90,167 users and has a throughput capacity per eNodeB of 61 Mbps. In the link-capacity calculation, the total link capacity is 427 Mbps. From the simulation results that using microwave technology, the average RSL value is -30.90 dBm, the value meets the -57 dBm threshold standard and the value of availability does not meet the standard of 99.999% because the average value obtained is 99.998095%. Whereas for wi-fi technology, the average RSL value is -39.24 dBm and meet the -72 dBm threshold standard, for the average availability value meets 99.999% standard, with a value of 100%. From the results of the two technologies, can be conclude that the wi-fi technology is more suitable for the use of backhaul network design in Ciputat Sub-district.

Author(s):  
Muhammad Faheem Mustafa ◽  
Ayaz Ahmad ◽  
Raheel Ahmed

With the rapid increase in data traffic and high data rate demands from cellular users, conventional cellular networks are becoming insufficient to fulfill these requirements. Femto cells are integrated in macro cellular network to increase the capacity, coverage, and to fulfill the increasing demands of the users. Time required for handoff process between the cells became more sensitive and complex with the introduction of femto cells in the network. Public internet which connect the femto base station with the mobile core network induces higher latency if conventional handoff procedures are also employed in macro-femto cell network. So, handoff process will become slower and network operation will become insufficient. Some standards, procedures, and protocols should be defined for macro-femto cell network rather than using existing protocols. This chapter presents a comprehensive survey of handoff process, types of handoff in macro-femto cell network, and proposed methods and schemes for frequent and unnecessary handoff reduction for efficient network operation.


2021 ◽  
Vol 4 (1) ◽  
pp. 8
Author(s):  
Sulthan Kharisma Akmal ◽  
Aji Gautama Putrada ◽  
Febri Dawani

Multimedia services are one of the internet needs with high data traffic network count since 2019. Two of the multimedia services, Web Real-Time Communications (WebRTC) and Session Initiation Protocol (SIP), have been widely used in applications for conducting video conferencing. The main objective of this research is to analyze network performance by an application with a client-server for audio and video communications developed with WebRTC and SIP protocols. The SIP system uses the FreePBX server, and the softphone application uses Bria. Whereas WebRTC uses JavaScript with servers on Ubuntu using Node.js. The analysis application uses a star topology and runs on a local network using Wi-Fi. After testing, the results show that the throughput, jitter, and packet loss of WebRTC are better than SIP. This result is caused by several factors including the type of codec, the type of platform, and the way of signaling and routing of each protocol.


MACRo 2015 ◽  
2017 ◽  
Vol 2 (1) ◽  
pp. 87-95
Author(s):  
Radu Curpen ◽  
Titus Balan ◽  
Fabian Socea ◽  
Florin Sandu

AbstractLTE technology has been designed to serve high data traffic and to withstand occasional traffic bursts caused by various events that arise when live video streams are watched. LTE will have to manage its resources judiciously since video traffic is not constant, and at the same time it will have to seek to offer highest quality experience. This paper demonstrates the benefits of using MIMO technique with 4 transmitters instead 2 when requesting live video streams. It also displays mobility cases each with a different subscriber moving speed, and with different gains, respectively.


Author(s):  
Faried Effendy ◽  
Taufik ◽  
Bramantyo Adhilaksono

: Substantial research has been conducted to compare web servers or to compare databases, but very limited research combines the two. Node.js and Golang (Go) are popular platforms for both web and mobile application back-ends, whereas MySQL and Go are among the best open source databases with different characters. Using MySQL and MongoDB as databases, this study aims to compare the performance of Go and Node.js as web applications back-end regarding response time, CPU utilization, and memory usage. To simulate the actual web server workload, the flow of data traffic on the server follows the Poisson distribution. The result shows that the combination of Go and MySQL is superior in CPU utilization and memory usage, while the Node.js and MySQL combination is superior in response time.


2019 ◽  
Vol 0 (0) ◽  
Author(s):  
Yan Wang ◽  
Shangya Han ◽  
Panke Qin ◽  
Yaping Li ◽  
Yanmei Shen

AbstractFor the effective bearer of P2P-type services, a P2P service bearer reorientation method for passive optical network for long-distance wide access based on P2P protocol message and wire-speed message identification is proposed. However, the reorientation method still has the possibility of relocation failure, so it is modified – that is, an improved P2P service bearer reorientation method based on optical line terminal (OLT) and optical network unit (ONU) cooperation. And the tool NS2 is used for network simulation analysis. Through simulation analysis, it is verified that the modified reorientation method improves the data traffic burden at the core network and at the OLT.


2019 ◽  
Vol 8 (4) ◽  
pp. 7197-7201

The current problems raising as a horizon in the computational and networking sector is based on the unimaginable increase of high numbers of users which in turn results in high data traffic, limitations over products which are vendor specific, incurring high expenses in maintaining the existing network. This dilutes a major part of the beneficiaries in the sector to move towards Cloud Networks. All these happenings in the past has quietly increased the risks and challenges in the aspect of security considering both data and the infrastructure accommodating the data. In an attempt to address almost a major portion of the existing above said problems, Software Defined Networking was highly anticipated, however, it was considered as a theoretical approach. After the implementation of SDN networks by industrial giants like Google, the SDN concepts again managed to reach the safer hands of the researchers in the movement of enhancement. A very rapid and high speed research work has been initiated by researchers all around the globe in analysing the risk factors and implementation barricades stated in the Software Defined Networking architecture. The research work focus on adding values to the Quality of Service, Latency, Load Balancing and most importantly the security aspects in various metrics of the Software Defined Networking Architecture. The odd man out architecture of Software Defined Networking by decoupling data and control plane allows the network to be configured and maintained in a real time scenario pertaining to pose a complete view of the network and its flow. The fact that is considered as an advantage itself is a factor of question in the case of security in the overall SDN architecture. This paper focuses on a detailed view of SDN architecture with the existing security feature and continues with the expected threats and classifying the weak points in the SDN. This paper also briefs about the pros and cons of the existing applications in the SDN architecture.


2018 ◽  
Vol 12 (2) ◽  
pp. 26-37
Author(s):  
Geetanjali Rathee ◽  
Hemraj Saini

Recently, Wireless Mesh Network is deliberated as a significant technology due to its self-healing, self-configuring and self-organizing features. The Multi-hop nature of WMN nodes has the potential to forward the data traffic to their intended destination node without the involvement of source node. One of the factors that impact the WMN performance is secure communication process. Various secure authentication mechanisms have been projected however, authentication delay and communication overheads are listed as the main security issues of these approaches. In this article, an efficient and fast authentication protocol have been proposed to reduce the response time, computation overhead during encryption/decryption process of the routing messages. Further various simulations with erratic nodes have been conducted to endorse the enhancement of proposed solution against existing protocols. Moreover, performance comparison between existing and proposed schemes have been analyzed in detail showing that proposed approach has achieved better outcome against convinced consequences.


Sign in / Sign up

Export Citation Format

Share Document