scholarly journals A comparative assessment of GSM and UMTS Networks

2022 ◽  
Vol 13 (1) ◽  
pp. 187-196
Author(s):  
Ukoette Jeremiah Ekah ◽  
Chibuzo Emeruwa

It is common knowledge that the transition of mobile networks from one generation to another is basically for the improvement in the network’s Quality of Service (QoS). Bearing this in mind, we will assumme that the Universal Mobile Telecommunication System (UMTS) will outperform the Global System for Mobile Communication (GSM), hence, the motivation to conduct this study in Calabar, Nigeria, for four mobile networks; MTN, Airtel, Globacom and 9mobile. With the aid of a TEMS investigation software installed in a laptop, a measurement campaign was carried out and log files collected, with focus on Call Setup Success Rate (CSSR), Dropped Call Rate (DCR), Handover Success Rate (HOSR), Call Setup Time (CST), network coverage and network quality. The collected data was analyzed with the aid of a TEMS discovery software. The analyzed data for each Key Performance Indicator (KPI) was compared with the minimum benchmark of the telecommunications regulatory body, the Nigerian Communication Commission (NCC). Result reveal that there was no outright improvement in the QoS and there was fluctuation in the QoS provided by the network operators. We therefore conclude that the network operators, either did not make accurate planning before installing their base stations or do not optimize their networks frequently and this led to poor QoS in most cases.

2011 ◽  
Vol 3 (2) ◽  
pp. 1
Author(s):  
Alfin Hikmaturokhman ◽  
Eka Wahyudi ◽  
Septy Widya Pangestika

Rapidly growing number of network providers in Code Division Multiple Access (CDMA), make service providers to further strength its network and optimization customer service and quality that will be given. In order to better serve our customer with the required network that has good performance. For that we need to be optimization in network, which can reduce the drop call and resource blocking and increasing call success. Network optimization is based on data drive test as for data analysis, including Call Setup Success Rate, Drop call Rate, Resource Blocking, Rx Power, Tx Power, Ec/Io, Forward FER, and Call Setup Time. In the measurement that have been done to the avarage value in accordance with Key Performance Indicator (KPI) obtained Call Setup Success Rate (> 99%), Drop call Rate (< 2%), Resource Blocking (< 2%), Rx Power (-91.7 dBm), Tx Power (11.4 dBm), Ec/Io (-21.38 dB), Forward FER (4.8%), and Call Setup Time (4.832 seconds). Result the performance of the Flexi network for service in Jepara #2 area in poor condition, because for parameters Rx Power, Tx Power, Forward FER, and Ec/Io not suitable with KPI. So do the optimization for the better network quality. Result after optimization of average Call Setup Success Rate (> 99%), Drop call Rate (< 1%), Resource Blocking (< 1%), Rx Power (-99.9 dBm), Tx Power (-27.8 dBm), Ec/Io (-5.45 dB), Forward FER (2.45%), and Call Setup Time (4.902 seconds).  


2011 ◽  
Vol 3 (2) ◽  
Author(s):  
Alfin Hikmaturokhman ◽  
Eka Wahyudi ◽  
Septy Widya Pangestika

<p>Berkembang pesatnya jumlah penyedia layanan pada jaringan <em>Code Division Multiple Access </em>(CDMA), membuat operator penyedia layanan untuk semakin memperkokoh jaringan dan mengoptimalkan layanan serta kualitas yang akan diberikan. Agar dapat melayani pelanggan dengan baik maka dibutuhkan jaringan yang mempunyai kinerja baik. Untuk itu perlu dilakukan optimalisasi pada jaringan, sehingga dapat mengurangi<em> drop call</em> dan <em>resource blocking</em> serta meningkatkan <em>success call</em>. Optimalisasi jaringan dilakukan berdasarkan analisis data hasil pengukuran <em>drive test</em>, adapun data yang dianalisis meliputi <em>Call Setup Success Rate</em>, <em>Drop call Rate</em>, <em>Resource Blocking</em>, <em>Rx Power</em>, <em>Tx Power</em>, Ec/Io, <em>Forward </em>FER dan <em>Call Setup Time</em>. Pada pengukuran yang telah dilakukan untuk nilai rata-rata yang sesuai dengan <em>Key Performance Indicator</em> (KPI) didapat <em>Call Setup Success Rate</em> (&gt; 99%), <em>Drop call Rate</em> (&lt; 2%), <em>Resource Blocking</em> (&lt; 2%), <em>Rx Power</em> (-91.7 dBm), <em>Tx Power</em> (11.4 dBm), Ec/Io (-21.38 dB), <em>Forward </em>FER (4.8%), dan <em>Call Setup Time</em> (4.832 detik). Hasil ini menunjukkan kinerja jaringan Flexi untuk daerah Jepara #2 masih kurang maksimal, karena untuk parameter <em>Rx Power</em>,<em> Tx Power</em>, <em>Forward </em>FER, dan Ec/Io tidak sesuai dengan KPI. Sehingga dilakukan optimalisasi agar kualitas jaringan semakin baik. Untuk hasil pengukuran setelah dilakukan optimalisasi didapat dengan rata-rata untuk <em>Call Setup Success Rate</em> (&gt; 99%), <em>Drop call Rate</em> (&lt; 1%), <em>Resource Blocking</em> (&lt; 1%), <em>Rx Power</em> (-99.9 dBm), <em>Tx Power</em> (-27.8 dBm), Ec/Io (-5.45 dB), <em>Forward </em>FER (2.45%), dan <em>Call Setup Time</em> (4.902 detik).</p> <p> </p> <p><strong>Kata Kunci</strong> : CDMA 2000 1X, <em>Call Setup Success Rate</em>, <em>Drop call Rate</em>, <em>Resource Blocking</em>, <em>Rx Power</em>, <em>Tx Power</em></p>


Author(s):  
Rana M. Zaki ◽  
Hala Bahjat Abdul wahab

<p class="0abstractCxSpFirst">Long Term Evolution (LTE) of (Universal Mobile Telecommunication System) is one of the modern steps in series of mobile telecommunications systems. That appears to be a strong technology that meets the requirements of fourth-generation (4G) mobile networks and supports authentication and encryption mechanisms between User Equipment (UE) and Message Management Entity (MME). This paper provides an overview of the three most important algorithms that are considered the heart of LTE cryptographic algorithms (SNOW3G, AES, and ZUC) and a comparison between cipher key length and initial vector length to generate keystream depending on the structure used for each algorithm as each algorithm has a time of complexity and space of complexity that differs from the other security algorithm.</p><p class="0abstractCxSpLast"><strong> </strong></p>


Author(s):  
Qusay Jalil Kadhim ◽  
Ali M. Alsahlany ◽  
Ahmed Hassan Hadi

Many researchers have discussed various topics in universal mobile telecommunication system (UMTS) networks: the process of switching from one cell to another for the subscriber and the impact of the quality of the connection during the transition process, quality of services (QoS), the quality of the uplink and downlink carrier line, the various types of code for the voice transmitted through the Internet, especially the research that discussed voice over internet protocol (VoIP) technology as voice travels from cell to cell in mobile networks, depending on the type of delivery. In this paper, a proposed scenario of a UMTS network was implemented to evaluate the multicellular VoIP movement; the proposed UMTS network was simulated using the OPNET 14.5 simulator. The calculation and analysis of the different parameters of the user while moving from one cell to another with different movement speeds considered, the best mean opinion score (MOS) value (3.19) registered for the scenario (soft handover) comparing with another type of handover (3.00).


Author(s):  
Christos Xenakis

This chapter analyzes the security architecture designed for the protection of the universal mobile telecommunication system (UMTS). This architecture is built on the security principles of second generation (2G) systems with improvements and enhancements in certain points in order to provide advanced security services. The main objective of the third generation (3G) security architecture is to ensure that all information generated by or relating to a user, as well as the resources and services provided by the serving network and the home environment are adequately protected against misuse or misappropriation. Based on the carried analysis the critical points of the 3G security architecture, which might cause network and service vulnerability are identified. In addition, the current research on the UMTS security and the proposed enhancements that aim at improving the UMTS security architecture are briefly presented and analyzed.


2019 ◽  
Vol 9 (2) ◽  
pp. 28-32
Author(s):  
Nidya Suroyya

The implementation of LTE in Indonesia has experienced problems, especially in maintaining the performance of radio networks due to the increasing number of users and less than optimal coverage quality. This research will conduct an analysis of the performance of the 4G LTE network with a case study in the area around Jalan Jend. Basuki Rachmat and Malang City Station. The Key Performance Indicator (KPI) parameters used to measure the performance of the 4G LTE network in this study include RRC setup success rate, ERAB setup success rate, and Call setup success rate Accessibility, call drop rate (VoiP), service drop rate (all). Retainability, handover, Throughput and Radio Frequency (RF), data obtained from drive tests and statistical data.From the standard KPI data for the Drive test area, Jend.basuki Rachmat has a value above -100 dBm, the percentage of power transmitted is 100% with a download value of 98.83% throughput of more than 265 Mbps and an upload value of 100% throughputI of more than 265 Mbps. As well as the Malang City Station area has a value above -100 dBm, the percentage of transmitted power is 92.39% with a download value of 96.12% throughput of more than 265 Mbps and an upload value of 100% throughputI of more than 265 Mbps. The parameters of Accessibility, Retainability, Mobility, integrity and Radio Frequency (RF) must comply with KPI standards in order to get maximum performance according to user needs.


Sensors ◽  
2020 ◽  
Vol 20 (11) ◽  
pp. 3270 ◽  
Author(s):  
Baris Satar ◽  
Gokhan Soysal ◽  
Xue Jiang ◽  
Murat Efe ◽  
Thiagalingam Kirubarajan

Conventional methods such as matched filtering, fractional lower order statistics cross ambiguity function, and recent methods such as compressed sensing and track-before-detect are used for target detection by passive radars. Target detection using these algorithms usually assumes that the background noise is Gaussian. However, non-Gaussian impulsive noise is inherent in real world radar problems. In this paper, a new optimization based algorithm that uses weighted l 1 and l 2 norms is proposed as an alternative to the existing algorithms whose performance degrades in the presence of impulsive noise. To determine the weights of these norms, the parameter that quantifies the impulsiveness level of the noise is estimated. In the proposed algorithm, the aim is to increase the target detection performance of a universal mobile telecommunication system (UMTS) based passive radars by facilitating higher resolution with better suppression of the sidelobes in both range and Doppler. The results obtained from both simulated data with α stable distribution, and real data recorded by a UMTS based passive radar platform are presented to demonstrate the superiority of the proposed algorithm. The results show that the proposed algorithm provides more robust and accurate detection performance for noise models with different impulsiveness levels compared to the conventional methods.


Author(s):  
Naglaa Kamel Bahgaat ◽  
Nariman Abdel Salam ◽  
Monika Mady Roshdy ◽  
Sandy Abd Elrasheed Sakr

Rapid growth in mobile networks and the increase of the number of cellular base stations requires more energy sources, but the traditional sources of energy cause pollution and environmental problems. Therefore, modern facilities tend to use renewable energy sources instead of traditional sources. One renewable source is the photovoltaic panel, which made from semiconductor materials which absorb sunlight to generate electricity. This article discusses the importance of using solar panels to produce energy for mobile stations and also a solution to some environmental problems such as pollution. This article provides a design for a solar-power plant to feed the mobile station. Also, in this article is a prediction of all loads, the power consumed, the number of solar panels used, and solar batteries can be used to store electrical energy. Finally, an estimation of the costs of all components will be presented. Good discussion and conclusion will be presented about the results obtained. The results obtained are promising. In addition, a future plan is described to complete this important study.


Sign in / Sign up

Export Citation Format

Share Document