In 1984, when Marconi had seen practical reality, he had also seen the commercial possibility for a system of telegraphy, which is absolutely free from the limitations of wires. The invention of transistor a century later has led to the ability for everyone to communicate while on the move. Today, it is purely a matter of convenience; to make and receive calls at your leisure, any place and any time. This thesis report on “Horizontal and Vertical Handover in Wireless and Cellular environment – Prone to Failures” reflects a paradigm shift towards the next generation of wireless and cellular environment to ensure seamless connectivity and also a better quality of service (QoS).
If you need assistance with writing your essay, our professional essay writing service is here to help!Essay Writing Service
The two major modern telecommunication networks are Mobile cellular network and wireless local area network (WLAN). WLANs in a small coverage area provide high data rates, whereas Cellular networks with large coverage area provide a limited data rate. Hence to overcome these limitations of cellular networks, WLANs can be used in the hotspot areas. In the combined network of cellular and WLAN, the major difficult task is providing best quality of service and also to make the system available when the mobile user is moving randomly from one network to the other. Telecommunication has prospered by integration of these two heterogeneous networks, and has hence attracted significant research.
There are two types of handoffs that take place in an integrated network. The horizontal handoff between the same networks and vertical handoff between different networks. Handoff decision, radio link transfer and channel assignment are the three typical stages in a handoff . There are vertical handoffs in two directions, for an integrated cellular/WLAN network, from WLAN to cellular network and the other from cellular network to WLAN. When the cellular network gets into the area of WLAN, to obtain larger bandwidths, it would fancy changing the connection to WLAN. But, on the other hand when user is server by WLAN and moves towards cellular network, coverage is abrupt and hence leading to unwanted voice and data call dropping thus affecting the quality of service (QoS). Now to make sure the communication is seamless, the user must be switched to the cellular network before the WLAN link breaks while reducing the dropping probability of ongoing calls.
This report discusses about two vertical handoff schemes in cellular and WLAN networks, Integrated service based handoff (ISH) and Integrated service based handoff with queue capabilities (ISHQ) . These schemes are considered with comprehensive set of properties for the system like dynamic information on the ongoing calls, mobility of user, vertical handoffs in two directions and various other features of voice and data services. Mean queue length and quality of service are the two most important attributes of these schemes. A mathematical basis to understand and predict systems behaviour is provided by mean queue length.
In these proposed schemes, the code division multiple access (CDMA) cellular network and IEEE 802.11e WLAN are considered. A simulation model is developed for M/M/1 and M/M/C queuing models using OPNET, a very powerful simulation tool, simulation is conducted to get the results for performance. These results are compared with analytical modelling results. Also, two M/M/1 queuing models are virtualized as one machine, the performance of this virtualised machine is calculated by simulation techniques and is compared with analytical results.1.1 A brief summary of the remaining chapters
Chapter 2 gives the required outline of Integrated systems. The basics structure of the system is explained in detail. Introduction to Horizontal and Vertical handovers is given and they are explained for integrated system. A brief description is given on previous research works in the same field. ISH and ISHQ are the two proposed vertical handover schemes that are explained. A brief explanation is given on why the proposed schemes are better than the previous ones. Performance modelling and the reasons for preferring for Simulation modelling are also given. The basics of OPNET and advantages of using OPNET modeller is explained. An introduction is given on M/M/1 and M/M/C queuing models, along with Virtualization and benefits of virtualization.
Chapter 3 explains about Research and modelling of M/M/1 and M/M/C systems in OPNET. Also the simulation methodology is explained. Modelling and simulation of two M/M/1 systems as a single virtualized machine is explained. The scenario for virtualization in given in this chapter
Finally, Chapter 4 presents conclusions on the results obtained, graphs represented and comparison with analytical results. It also emphasise on the future work in this area.
2.1 Introduction to Integrated Systems:
The existing demand to somehow provide higher data rates and seamless connectivity has led to the integration of two major communication networks. The complementary characteristics present in Wireless local area network and cellular network, the integration becomes a promising trend for the future generation wireless networks. 802.11n, 3G are the latest types of technologies in WLAN and Mobile networks respectively, that are widely used. When these technologies are individually considered they have advantages as well as disadvantages. By collective usage of the advantages of these two technologies, i.e. 3G support’s wide coverage area and WLAN support’s high data transfer, quality of service can be improved.
The users in “hot-spot” areas will be provided with high speed wireless networks with the integration of WLAN into Cellular networks and when the user is outside a hot spot coverage area, one can use the cellular network. However, this is not a simple process to implement.
In Figure 1, there are two areas, area A with only the cellular network and the other, area B is covered by both cellular and Wireless Local Area Network (WLAN). Area B has access points for WLAN and in area A, there are base stations for the cellular network. In the study of [Modelling and Analysis of Hybrid Cellular/WLAN System with Integrated Service-Based Vertical Handoff Schemes], a CDMA cellular system is considered along with IEEE 802.11 network. Bandwidths of cellular network and WLAN are Cc and Cw respectively. The total system resources are shared by both data and voice calls in integrated system. Particular channels are assigned to voice calls and hence have more priority over the data calls, in accessing the system resources. The unused bandwidth by current voice calls is shared by the ongoing data calls. Vertical and Horizontal handoffs are also given priority, accordingly as voice and data calls. To prioritize the handovers, the channel reservation approach is used in the cellular network. Vertical handover voice calls are given the highest priority among both the handover calls by limiting the number of accepted horizontal handover calls, when voice calls are greater than or equal to the threshold.
2.2 Horizontal and Vertical Handovers in Integrated Systems:
An essential element of cellular communications is Handoff. This chapter of the thesis gives a summary of handover and mobility among heterogeneous networks. When a mobile station moves from one wireless cell to another wireless cell, it is a Handoff (or handover). It is classified as horizontal (intra-system) and vertical (inter-system). Vertical refers to the overlapping of wireless networks. With the help of a simple tale, the problem of vertical mobility can be illustrated. Consider a relay team of mouse and a rabbit. To carry a carrot as fast as they can is the task. A mouse can go far, but it cannot carry heavy loads. The rabbit, in this example is restricted in the fence. In the fence, it can carry a heavy load of carrots, but it has to give the carrots to the mouse at the fence. The rabbit represents a WLAN, and the mouse a cellular network. The event where the exchange of carrot loads between rabbit and mouse is called handoff, more precisely vertical handoff. This process refers to transition from WLAN to cellular network and vice versa. The carrot represents the payload, which is carried by mouse (cellular network) and the rabbit (WLAN). Payload means data in terms of bits or bytes, which is a part of bigger files. To make the communication seamless, the problem is to make best of mouse and rabbit carrying the carrot together. The access technology changes in vertical handover.
A mobile node moves with the single technology network from one access point to the other one in a horizontal handover. For example, if a mobile user moves from one base station to base station of other area, then the mobile user of GSM network makes a horizontal handover. A horizontal handover is a traditional handover. In other words, the difference between vertical and horizontal handover is that the vertical handover changes the access technology and the latter does not change .
In comparison with micro and macro mobility, they are differentiated into subclasses such as vertical and horizontal micro mobility, vertical and horizontal macro mobility. Vertical micro mobility is the handover within the same domain using different wireless technologies. Horizontal micro mobility is the handover among the same domain using the same wireless technology. Vertical macro mobility is handover among different domains using different wireless technologies and horizontal macro mobility is handovers within various domains, using same wireless technology.
The handoff process can be characterized as hard handoff or soft handoff. Before making a handoff if there is a break in the communication, it is referred as a hard handoff (brake before make) and whereas in soft handoff, there is a connection to both of the base stations for some time before making the handoff (make before break).
To enhance the capacity and QoS of cellular systems, efficient handoff algorithms are cost effective ways. In a horizontal handover, the main concern is to maintain the ongoing service even if the IP address changes because of the movement of the mobile node. The ongoing service is done either by dynamically updating the changed IP address or by hiding the change of IP address. Vertical handover takes place when the mobile node moves over heterogeneous access networks. The used access technology is also changed along with the IP address in the vertical handover, as the mobile nodes moves across different networks which use different access technology. In such cases, the main issue is to maintain the on going service even when there is a change not only in IP address but also in network interfaces, QoS characteristics etc.
Can be changed
Can be changed
Table 2.1: Parameters in Horizontal and Vertical handover.
The main capabilities of Vertical handovers over Horizontal handovers are:
1. Vertical handovers use different access technology.
2. Vertical handovers use multiple network interfaces.
3. Multiple IP addresses are used in Vertical handovers.
4. QoS parameters can be changed in Vertical handovers and multiple parameters are used.
5. Multiple network connections are used in Vertical handovers.
2.3 Previous research work:
“Science is not a mechanism but a human progress; and not a set of findings but the search for them.” – J. Bronowski
Many vertical handoff schemes have been studied and have been proposed for the integrated network of cellular and WLAN. One among the proposed model is WLAN – first handoff (WFH)  In this proposed scheme, the ongoing data and voice calls are always forwarded to WLAN whenever WLAN bandwidth and the coverage are available, and the originating data and voice calls from the overlapping area of Cellular/WLAN are forwarded to the WLAN. This is known as WFS – WLAN first handoff scheme. This scheme is simple but vertical handoff calls and voice and data horizontal calls are treated the same way. Also this scheme was proposed for integrated voice and data services without sufficiently considering the different supporting abilities of the integrated network of cellular and WLAN. Also handoff schemes studied in and  Most of the existing handoff schemes takes account of voice services only, and the resource allocation is done on the basis of user mobility levels, where both macro and micro cells cover the two tire area continuously. Also there was no big progress made between the two handoffs in the analysis of systems performance when a “service-dependent call admission control scheme” was introduced. Few of the other schemes are applicable for indoor environments where, only the voice calls are considered. In this method, the dropping probability of vertical handoffs is minimised by installation of a simple handoff trigger node in the integrated networks transition region. Practical routing protocols are used to implement a multi hop ad hoc relaying handoff (MARH) for vertical handoffs from WLAN to cellular network. In this method, there is more complexity and transmission delay. Also, in this model vertical handoffs are not considered from cellular network to WLAN.[9.]
2.4 ISH and ISHQ Handoff Schemes :
Service dependent handoff schemes are introduced in the integrated system of cellular/WLAN. On the basis of whether the vertical handoff request can be queued or not, the service schemes are of two types. Integrated service based handoff and Integrated service based handoff with queuing capabilities . These two schemes are explained in detail in the section below.
a. ISH Scheme:
In this proposed ISH scheme, the only calls that can request admission to the cellular network are originating voice calls from area A and a handoff voice calls from its neighbouring cells. If < , the originating call from area A is accepted and if â‰¥â‰¥ , the call is rejected. Also if < , the handoff voice call from the neighbouring cell is accepted and when â‰¥â‰¥ , it is rejected. From area B, a voice call will try to access the cellular network, and if < , it is accepted. The call will now go to WLAN when â‰¤ â‰¤ , and in WLAN if < , it accepts the call and rejects if otherwise. For calls moving into B area, no handoff is executed for ongoing voice calls. A vertical handoff would take place, when a voice call which was accepted by the WLAN moves out of B area. In a cellular network, if < , the vertical handoff voice calls can be accepted.
If < , the data call originating from area B will be allowed to access WLAN and if otherwise is rejected. Similarly, if < , the data call moving into area B is handed to the WLAN, and it remains in the cellular network otherwise. And if < , the data call originating from area A and data vertical handover requests to cellular network is accepted and rejected otherwise.
b. ISHQ Scheme:
Voice calls are handled the same way in both the proposed schemes ISHQ and ISH. In ISHQ handover scheme, there are two queues Qc and Qw with and as their respective capacities. The queue Qc is for handling vertical handover requests of data to cellular networks and the queue Qw is for vertical handoff requests and originating data calls that are entering into the WLAN from area B. There may happen three different probabilities depending upon the arrivals to the queue. If < , the vertical handoff requests to the cellular network is accepted. If = , the request will be queued in Qc , and if the queue Qc is full on the arrival of requests, the requests will be dropped. These requests in the queue Qc will be served on the basis of first-in, first-out (FIFO) basis once the channel becomes available. This data call request is then deleted from Qc once it is handed over to the WLAN. Also if < , data vertical handoff requests to WLAN or data calls originating from area B are processed by the WLAN. If = these requests are queued in Qw and when the queue Qw is full on the arrival of many requests, the requests are blocked. The data call request is deleted from queue Qw when the handoff request is granted before the mobile user is out of area B before it can actually acquire a channel or the user passes through the area B.
In figure 2 the traffic flow of the proposed handover schemes can be seen. The voice calls originating from area A , voice calls from area B, horizontal handover voice calls from the neighbouring cells, vertical handoff requests from WLAN, data calls from area A, data vertical handover requests from WLAN are included in the traffic into the cell. They have respective arrival rates of,,,, and . Also , and are respective arrival rates of originating data calls from area B, data vertical handover request from area A and voice calls that are under flowed. This is traffic into the WLAN.
2.5 Performance Modeling:
Performance modelling and performance measurement are classifications of performance evaluation. If the system is available for measurement and all parameters are accessible, performance measurement is possible. When the actual system does not have any test points to measure in detail or if actual systems are not available for measurement, performance modeling is used. Simulation models and analytical models can be used for performance modeling. Simulation models are further classified depending on the mode/level of detail of simulation.
2.6 Why Simulation?
“Simulation refers to the imitation of a real world system over time” – Banks, Carson and Nelson, 1996.
Simulation is a tool for the evaluation of the performance of the system, which is already existing or proposed, in diverse configurations of interest, and also for a long period of real time. It is used before the existing system is changed or new one being built, to reduce failure chances, to eliminate bottlenecks, and to prevent over – under utilization of resources and performance of the system. Lack of accuracy in analytical models for design decisions, is one of the main reason for simulation techniques. It can be used to analyze complex models of any level. If the simulation model is developed, it can answer a wide range of “what if” questions on the real world system.
Our academic experts are ready and waiting to assist with any writing project you may have. From simple essay plans, through to full dissertations, you can guarantee we have a service perfectly matched to your needs.View our services
2.7 Introduction to OPNET:
Optimized Network Engineering Tools (OPNET) is a very powerful network simulator. Performance, availability and optimizing cost are the major purposes of it. OPNET Modelers offers various tools for designing the model, simulating the model, data mining and various analysis, considering the different alternatives. In OPNET Modeler, simulation of a wide variety of various networks that are linked to each other can be done. Simulation using OPNET gives an experience to build networks in the real world and helps in understanding various layering techniques and protocols. OPNET simulates the behaviour of the system as it models each event occurring in it and processes the event as defined by the user. A hierarchical strategy is employed by OPNET to organize the models to build the desired network . It provides programming tools to define various types of packet formats that are used in protocols.
Models in OPNET are hierarchical. The behaviour of a protocol is encoded by a state diagram, which has C-type language code embedded in them. In the middle layer, various functions such as transmitting and receiving packets, buffering and transmitting are performed by each of separate objects. These separate objects are called modules. In the node editor, these modules are created, modified and edited. A higher level node model is formed when modules are connected together. In the highest level, all the node objects are connected by links to form a network model.
2.8 Advantages of OPNET:
OPNET has a number of advantages over analytical modelling for analyzing performance of the system.
1. The basic concept of simulation is easy to comprehend over analytical methods.
2. Simulation in OPNET is more credible because the behaviour is compared to that of the real system.
3. Once the OPNET model is ready and validated, one can run it on various different sets of parameter values to generate the performance measures in each of the cases.
4. OPNET models are very flexible and have a range that can be simulated and details can be obtained.
5. In OPNET, fewer simplifying assumptions are used and hence true characteristics of the system under study are captured.
6. Bottlenecks in information can be identified, test options to increase flow rates can be identified.
7. Time can be controlled in OPNET. Hence, the system can be operated for several months or years of experience in a matter of few seconds, which allows the user to look at a longer time horizons, or can even slow down the process.
8. The greatest strength of OPNET is its ability to work with new and unfamiliar situations, and hence can answer “what if” questions.
2.9 Queuing Models:
A queuing model is used to represent a queuing system in real situation, so that the behaviour of the queue can be mathematically analysed. Queuing models are represented using Kendall’s notation.
A denotes the inter arrival time distribution
B denotes the service time distribution
C denotes number of servers in the system
K denotes capacity of the system
M is the population calling
Z denotes the service discipline.
In general, K = âˆž, M = âˆž and Z is First-in-first -out (FIFO).
The name “M/M/1” is from the Kendall’s notation for general queuing systems. Packet arrival distribution is denoted by the first symbol, service distributions by the second and the number is for the number of servers. The Markov Processes (M in M/M/1) denoting the packets arrival and departure will be Poisson processes. The inter arrival time follows exponential distribution for Poisson arrivals. M/M/1 refers to the negative exponential arrivals and service times in a single server system.
The simplest queuing system consists of two major components – Queue and Server, along with two attributes – inter arrival time and service time. Randomly arriving customers from an infinite source at the queue have mean inter arrival time. These customers are served at a random amount of time but have mean service time. The service times are independent and are exponentially distributed.
M/M/C model is a multi server queuing model, where arrivals follow Poisson process, the service time is exponentially distributed and infinite waiting queue, and also the population of users is infinite. An M/M/C queue consists of a first-in-first-out (FIFO) buffer with randomly arriving packets in accordance with Poisson process, and the processors, called as servers, retrieves the packets from the infinite buffer at a specified service rate. The performance of M/M/C queue system depends on three major parameters: packet size, packet arrival rate and capacity of the servers. Queue size will grow indefinitely, if the combined effect of average packet size and average packet arrival rate exceeds the service capacity. By varying packet arrival rates, packet sizes and service capacities, the performance of the queuing system can be clearly observed.
l,1/m, and C represents the mean packet arrival rate, mean packet size and the server capacity, respectively.
A promising approach to consolidate multiple services onto a smaller number or resources is Virtualization. To improve the efficiency and availability of resources, applications of the system, Virtualization is used. The resources of the system are underutilized under “one server, one application” model. Virtualization allows one to run multiple virtual machines on a single physical machine. Resources of the single computer can be shared by all the multiple virtualized machines. The virtual environments can be called as virtual private servers or can be called as guests or emulations. Server virtualization can be achieved in three popular approaches: virtualization at the OS layer, the paravirtual machine method and virtual machine model.
Virtualization at OS layer is different from paravirtual machine method and virtual machine method. The guests and host use the same OS. The host runs a single kernel as the core and can take the OS functionality of the guests. Common libraries and binaries can be shared on same physical layer. In this method, one OS level virtual server can host up to thousands of guests at the same time. 
Host/guest paradigm is the basis for Virtual machine method. In this approach, the guest operating system can run without any modifications. Guests that use different OS can be created by the administrator. The guest does not know about the OS being used by the host.
The PVM model, like the Virtual machine model is based on host/guest paradigm. In the PVM model, the virtual machine model actually changes the guest OS code. This changing of guest OS code is known as porting. Virtual machines and paravirtual machines can run on multiple OS.
2.11 Why Virtualization?
Virtualization allows the user to reduce the IT costs while boosting up the efficiency, utilization and ensuring flexibility of assets. The benefits of adapting to virtualization are:
1. To get more out of the existing resources. The legacy of “one server one application” model can be stopped. All common infrastructure resources can be pooled together with server consolidation.
2. Availability of applications and hardware can be increased for improved business continuity. Virtualization transforms the applications and data in the virtual environment with higher accessibility and no time delays.
3. Operational flexibility can be achieved. Better management of resources is possible along with better application usage and faster server provisioning.
4. Can run multiple operating systems on a single machine.
5. Disaster recovery and Dynamic load balancing is possible. Virtualization provides the ability for the virtual machines that are over utilizing the system resources and moved to the under utilized servers. This is known as dynamic load balancing, which creates efficient utilization of the resources. Virtualization technology also enables a virtual image on a machine to be re images on another server if failure occurs in one server.
6. Security is the other major advantage of virtualization. With compartmentalizing the environments, one is able to select the OS of guest and tools that could be more appropriate in each of the environments. Because of the isolation, attacking on virtual machine can never compromise the others.
Research and Modelling
3.1 Modelling and simulation of M/M/1 and M/M/C systems in OPNET:
The model requires a means of generating, queuing and serving the packets. All of these mentioned capabilities are provided by the existing modules and models supplied by OPNET. Ideal generator module in OPNET is used to create packets. The M/M/C queue’s Poisson process is expressed as the mean number of arriving packets/second. Exponential distribution of packet inter arrivals is an alternate form of specifying this process. This alternate form is used in the model, as the generator module features the arrival process using the inter arrival distributions. The M/M/C model also requires a distributed service time which is exponential. Assigning exponential distributed packet lengths to the packets is a suitable method. This is an attribute of the generator module. OPNET also provides many queue process models, each with varying capabilities. For M/M/C queue, the packets must follow FIFO discipline with specific rate in bits/second, in order to get exponential distribution of service times. A queue model, acb_fifo_ms process model provides this function. The name acb_fifo_ms, indicates the major queuing characteristics: ‘a’ indicates an active server; ‘c’ indicates that multiple incoming packet streams can be concentrated into its single internal queue; ‘b’ indicates that service time is bit oriented; and service ordering discipline is denoted by ‘fifo’ and ‘ms’ indicates that it is a multi server model. If the queuing model is other than a multi server, say M/M/1, then the queue model to be opted for would be acb_fifo. The process module has OPNET supplied sink process model, which is used to dispose the serviced packets. Packet streams are paths via which the packets are transferred between generator module, the acb_fifo_ms, and the sink. These modules i.e. generator module, process module acb_fifo_ms, and sink takes care of sending and receiving the packets on the stream.
A Node Editor is used to create node models. These node models are then used to create nodes within Project Editor Networks. Each of the modules in the node serves a particular purpose, as in creating packets, queuing of the packets, processing, transmitting and receiving of packets. OPNET models have modular structure. A node can be defined by connections various modules, packet streams and statistic wires. Hence, packets and status information can be exchanged between the modules, with help of these connections between the packets.
Project editor is the main performing area for creating a network simulation. It is used to create network models, collect the statistics from each network object, execute and run the simulation and view the results. Using the specialized editors from project editor, creating a node and process models, creating filters and parameters to it, building packet formats is easy.
The Process Model Editor:
A process editor is used to create process models, which control the functionality of node models in the Node editor. Finite state machines (FSMs) are used to represent the process models. They are created with icons which represent states and lines that show the transitions between the states. Embedded C or C++ code blocks are used to show operations performed in each state.
The Link Model Editor:
New type of link objects can be created with this editor. There are different attribute interfaces and different representations for each new type of link.
The Path Editor:
It is used to create new path objects, where a traffic route can be defined. ATM, Frame Relays, MPLs etc or logical connections which use protocol model can use path to route the traffic.
The Probe Editor:
The statistics to be collected are specified in this editor. Different types of statistics can be collected using different probes, which include node statistics, various types of animation statistics, node and link statistics and global statistics.
The Probe Editor:<
Cite This Work
To export a reference to this article please select a referencing stye below:
Related ServicesView all
DMCA / Removal Request
If you are the original writer of this essay and no longer wish to have your work published on UKEssays.com then please: