Improving the Efficiency of Call Admission Control in Wireless Cellular Communication Networks by Frequency Sharing Techniques

نویسندگان

  • Vikas Solanki
  • Qasim Rafiq
چکیده

In this paper, a two-tier cellular communication wireless network is characterized by overlapping the service area for managing the new calls users having different mobility speed. The overlapping property of the two-tier system provides the advantages that share the traffic load to improve the efficiency of new calls subscriber with reservation of channels (guard channels) in cell to handle the ongoing old calls (handoff calls). Microcells are used to provide the services to slowspeed, high-intensity traffic area users and macrocells are overlaid over more than one microcells cater mainly too lower density, highspeed users. The two-tier of microcells and macrocells provide the secondary resource which provide the service to new calls as well as handoff calls with guard channels by overflow the slow speed users in macrocell and sharing the frequency in vertical as well as in horizontal directions in the upper layer. In this paper, we tried to optimize use of resources by using advantage of overlapping coverage of two-tier wireless cellular networks and frequency sharing techniques like VDFS and HDFS. The call lose probability of new calls are developed through numerical analysis. The VDFS and HDFS schemes are proposed and compared with the existing schemes of CAC. The result shows the new proposed schemes are more efficient.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Two-Threshold Guard Channel Scheme for Minimizing Blocking Probability in Communication Networks

In this paper, we consider the call admission problem in cellular network with two classes of voice users. In the first part of paper, we introduce a two-threshold guard channel policy and study its limiting behavior under the stationary traffic. Then we give an algorithm for finding the optimal number of guard channels. In the second part of this paper, we give an algorithm, which minimizes th...

متن کامل

Adaptive call admission control and resource allocation in multi server wireless/cellular network

The ever increasing demand of the subscribers has put pressure on the capacity of wireless networks around the world. To utilize the scare resources, in the present paper we propose an optimal allocation scheme for an integrated wireless/cellular model with handoff priority and handoff guarantee services. The suggested algorithm optimally allocates the resources in each cell and dynamically adj...

متن کامل

An Incentive-Aware Lightweight Secure Data Sharing Scheme for D2D Communication in 5G Cellular Networks

Due to the explosion of smart devices, data traffic over cellular networks has seen an exponential rise in recent years. This increase in mobile data traffic has caused an immediate need for offloading traffic from operators. Device-to-Device(D2D) communication is a promising solution to boost the capacity of cellular networks and alleviate the heavy burden on backhaul links. However, dir...

متن کامل

Improving Bandwidth-power Efficiency of Homogeneous Wireless Networks Using On-meet Threshold Strategy (RESEARCH NOTE)

Over two decades, a problem of location dependent has been focused for improving the communication Bandwidth-Power Efficiency of homogeneous networks. The efficiencies of communication links are weakened by the Hidden Terminal Problem.  Thus we propose a Fine – Tune Strategy for analyzing the On-Off communication region. We were observed that the proposed technique had been able to track and mo...

متن کامل

LPKP: location-based probabilistic key pre-distribution scheme for large-scale wireless sensor networks using graph coloring

Communication security of wireless sensor networks is achieved using cryptographic keys assigned to the nodes. Due to resource constraints in such networks, random key pre-distribution schemes are of high interest. Although in most of these schemes no location information is considered, there are scenarios that location information can be obtained by nodes after their deployment. In this paper,...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014