UMTS 3G SYSTEMS Research Papers (original) (raw)

I investigate the field of tension between the national and the local level in spatial planning from a decision-making perspective. In doing so, I analyse the legal regulation for a large-scale 3G mobile infrastructure development in... more

I investigate the field of tension between the national and the local level in spatial planning from a decision-making perspective. In doing so, I analyse the legal regulation for a large-scale 3G mobile infrastructure development in Sweden with a focus on how participation is expressed both in terms of the ‘law in books’ as well as empirically, ‘in action’. Theoretically, a model of decision making is elaborated, based on two axes: one concerning the decision level on a central or national to local scale, and one concerning what type of knowledge is regarded as the most legitimate in terms of a calculating approach versus a communicative approach. These two issues or approaches to decision making—who decides and based on what knowledge—are of direct importance for understanding the frameworks as well as the practical outcomes of public participation. The case of 3G in Sweden demonstrates how different types of knowledge are perceived as legitimate at different levels in the planning system. For example, appeals against building permits rarely change the outcome of permits issued, and appeals based on fear of electromagnetic radiation are always rejected. The juridification of a given mast conflict meant a development from a deliberative approach, where any concern is heard, to a calculating and expert-based one, where the general stance on a particular topic (such as whether or not the electromagnetic radiation from mobile masts is hazardous) is applied. This means that what knowledge is legitimate depends on where in the permit process it is presented.

The environmental performance of presently operated GSM and UMTS networks was analysed concentrating on the environmental effects of the End-of-Life (EOL) phase using the Life Cycle Assessment (LCA) method. The study was performed based... more

The environmental performance of presently operated GSM and UMTS networks was analysed concentrating on the environmental effects of the End-of-Life (EOL) phase using the Life Cycle Assessment (LCA) method. The study was performed based on comprehensive life cycle inventory and life cycle modelling. The environmental effects were quantified using the IMPACT2002+ method. Based on technological forecasts, the environmental effects of forthcoming mobile telephone networks were approximated.
The results indicate that a parallel operation of GSM and UMTS networks is environmentally detrimental and the transition phase should be kept as short as possible. The use phase (i.e. the operation) of the radio network components account for a large fraction of the total environmental impact. In particular, there is a need to lower the energy consumption of those network components. Seen in relation to each other, UMTS networks provide an environmentally more efficient mobile communication technology than GSM networks. In assessing the EOL phase, recycling the electronic scrap of mobile phone networks was shown to have clear environmental benefits. Under the present conditions, material recycling could help lower the environmental impact of the production phase by up to 50%.

The authentication and key agreement (AKA) protocol of the Universal Mobile Telecommunication System (UMTS) was proposed to solve the vulnerabilities found in the Global System for Mobile Communications (GSM) systems. The UMTS-AKA... more

The authentication and key agreement (AKA) protocol of the Universal Mobile Telecommunication System (UMTS) was proposed to solve the vulnerabilities found in the Global System for Mobile Communications (GSM) systems. The UMTS-AKA provides mutual authentication, but is still vulnerable to redirection attack, denial of service attack, and man-in-the-middle attack. Apart from various attacks possibilities, the UMTS-AKA has a problem of counter synchronization, generates huge overhead, and utilizes more bandwidth and message exchanges during the authentication. An intruder may apply these attacks to impersonate the network or mischarge the mobile users. In this paper, we propose an efficient and secure AKA protocol namely ES-AKA to prevent the UMTS network against these problems and attacks. This protocol also solves the synchronization problem occurred between a mobile station MS and its home network HLR. The ES-AKA protocol generates lesser communication overhead as compared to UMTS-AKA, EXTAKA, COCKTAIL-AKA, SKA-AKA, AP-AKA, X-AKA, EURASIP-AKA, Full-AKA, and U-AKA protocols. In addition, it also generates less computation overhead than the UMTS-AKA, EXT-AKA, COCKTAIL-AKA, S-AKA, Full-AKA, and U-AKA protocols. On an average, the ES-AKA protocol reduces 62 % of the bandwidth, which is the maximum reduction of the bandwidth by any AKA protocol referred in the paper. This protocol is also able to reduce 6 % of the messages exchanged (in terms of computations) during the authentication in comparison to UMTS-AKA.

This paper presents a preliminary study of quality of experience (QoE) of VoIP that are provided as social network services using Perceptual Evaluation of Speech Quality (PESQ) with Thai and Chinese speech samples. This study focuses on... more

This paper presents a preliminary study of quality of experience (QoE) of VoIP that are provided as social network services using Perceptual Evaluation of Speech Quality (PESQ) with Thai and Chinese speech samples. This study focuses on VoIP quality of the free call feature from Facebook and LINE, which are the popular social network site and the popular social network application for Thai users respectively. From this study, it has been found no significant difference between VoIP quality from Facebook and LINE when connected Internet via WLAN. However, it has been found that LINE trends to provide better VoIP quality than Facebook with significant difference (p-value < 0.05) when connected 3G networks in three forth test conditions, including two test conditions with Thai speech.

This paper presents a study of VoIP - Quality of Experience (VoIP-QoE) of a well-known VoIP application and three modern ones, Skype, LINE, Tango and Viber, using Perceptual Evaluation of Speech Quality (PESQ) with English speech samples.... more

This paper presents a study of VoIP - Quality of Experience (VoIP-QoE) of a well-known VoIP application and three modern ones, Skype, LINE, Tango and Viber, using Perceptual Evaluation of Speech Quality (PESQ) with English speech samples. From this study, it has been found that Skype and LINE tend to provide better VoIP quality than Tango and Viber, particularly when used over good stabile 3G networks. Although, with slight differences between Skype and LINE, it has been found that there is no significant difference between VoIP quality from Skype and LINE over four 3G networks(p-values = 0.291-0.840). Therefore, Skype and LINE are good options for free VoIP calls over most 3G networks in Bangkok, the capital city of Thailand. Nevertheless, it has been found that, referring to instability or low speed 3G networks, there is no significant difference among VoIP quality from Skype, LINE, Tango and Viber.

This paper briefly presents the study of VoIP quality from two popular social network applications over 3G and 4G in Bangkok, covering both stationary and mobility. It has been found that, based-on stationary tests, 4G does not provide... more

This paper briefly presents the study of VoIP quality from two popular social network applications over 3G and 4G in Bangkok, covering both stationary and mobility. It has been found that, based-on stationary tests, 4G does not provide better VoIP quality than 3G, although the downlink speed of 4G is faster that 3G by about 5-7 times. However, based on mobility tests called semi-dynamic tests, it can be seen that 4G provides better VoIP quality than 3G obviously.

This paper compares the effect of send-side music and environmental noise as background noise in a telephone communication. The study focuses on the quality experienced by the end user in the context of NB, WB and SWB mobile speech... more

This paper compares the effect of send-side music and environmental noise as background noise in a telephone communication. The study focuses on the quality experienced by the end user in the context of NB, WB and SWB mobile speech communication. The subjective test procedure defined in ITU-T Rec. P.835 is followed in this study. The results show that music as background noise in telephone conversation deteriorates the overall quality experienced by the end user. Moreover, the impact of music background noise on the quality is similar to that of the environmental noise. Furthermore it is shown that the music background noise seems to be slightly less intrusive than the environmental noise, especially when it comes to the lower SNR.

3G telecommunications systems use microcellular radio coverage, where a high capacity is requested. The usage of these, so called, hotspot has its advantages, because the smaller the cell the higher the bit rate, but it also carries some... more

3G telecommunications systems use microcellular radio coverage, where a high capacity is requested. The usage of these, so called, hotspot has its advantages, because the smaller the cell the higher the bit rate, but it also carries some disadvantages like the higher interference level and the larger average number of handover. The latter is particularly perceived by vehicular users, because it can cause serious degradations in the provided quality of service. To exploit microcellular coverage advantages and, at the same time, limiting its disadvantages, this paper presents two algorithms which work on users’ mobility behaviour profile, in order to estimate their recurrent movements and allocate on the future traversed microcells the requested resources in advance. These algorithms introduce remarkable improvements in the Grade of Service] of vehicular users.

In this paper, we propose an improved and efficient AKA protocol named “NS-AKA” to prevent the 3G UMTS networks from various attacks like man-in-the-middle attack, redirection attack, replay attack and active attacks in the corrupted... more

In this paper, we propose an improved and efficient
AKA protocol named “NS-AKA” to prevent the 3G UMTS
networks from various attacks like man-in-the-middle attack,
redirection attack, replay attack and active attacks in the
corrupted UMTS networks. This protocol completely eliminates
the need of synchronization between a mobile station and its
home network, and protects the actual identity of each user in the
networks, (i.e., IMSI) by generating a temporary identity for each
user during the authentication. The NS-AKA protocol generates
minimum communication and computation overheads compared to UMTS-AKA, S-AKA, AP-AKA, and EURASIP-AKA
protocols. On an average the NS-AKA protocol reduces 67% of
the bandwidth consumption during the authentication process as compared to UMTS-AKA, which is the maximum reduction of
bandwidth by any AKA protocol referred in the paper.

Cellular communications using High Altitude Platform (HAPs) are studied for next generation broadband wireless network providing also Third Generation (3G) mobile services. The Connection Admission Control (CAC) issue in a HAP-UMTS... more

Cellular communications using High Altitude Platform (HAPs) are studied for next generation broadband wireless network providing also Third Generation (3G) mobile services. The Connection Admission Control (CAC) issue in a HAP-UMTS communication system represents a key problem in order to increase the capacity in terms of admitted users preserving the agreement quality of service. The main problem of a full centralized admission control approach consists in an excessive calls blocking for the traffic sources located in the middle of the aerial platform coverage area, due to the high additive interference level generated by all active users. With the aim of resolving this issue, we propose a novel strategy for the admission procedure, based on dynamic power sharing (DFPS), in order to guarantee a high fairness level to all users of the implemented cellular system, in term of calls blocked in each cell. Furthermore, we compare this approach with a previous one based on full centralized power sharing (FCPS). Simulation results show that the proposed CAC scheme can achieve better performances than the previous one, managing the active connections in a “fair” manner also under high load
conditions.

Cellular communications using High Altitude Platform (HAPs) are studied for next generation broadband wireless network providing also Third Generation (3G) mobile services. The Connection Admission Control (CAC) issue in a HAP-UMTS... more

Cellular communications using High Altitude Platform (HAPs) are studied for next generation broadband wireless network providing also Third Generation (3G) mobile services. The Connection Admission Control (CAC) issue in a HAP-UMTS communication system represents a key problem in order to increase the capacity in terms of admitted users preserving the agreement quality of service. The main problem of a full centralized admission control approach consists in an excessive calls blocking for the traffic sources located in the middle of the aerial platform coverage area, due to the high additive interference level generated by all active users. With the aim of resolving this issue, we propose a novel strategy for the admission procedure, based on dynamic power sharing (DFPS), in order to guarantee a high fairness level to all users of the implemented cellular system, in terms of calls blocked in each cell. Furthermore, we compare this approach with a previous one based on full centralized power sharing (FCPS). Simulation results show that the proposed CAC scheme can achieve better performances than the previous one, managing the active connections in a “fair” manner also under high load conditions.

This paper addresses the design of an innovative scheduling algorithm which optimizes the performance of Multimedia Broadcast Multicast Service (MBMS) in High Speed Packet Access (HSPA) networks. The proposed policy is based on the... more

This paper addresses the design of an innovative scheduling algorithm which optimizes the performance of Multimedia Broadcast Multicast Service (MBMS) in High Speed Packet Access (HSPA) networks. The proposed policy is based on the subgrouping approach which splits multicast members into subgroups and applies a subgroup-based Adaptive Modulation and Coding mechanism. The optimal number of multicast sub- groups with the assigned radio resources is evaluated by solving an optimization problem. The robustness of the proposed approach has been investigated under different pedestrian mobility scenarios. Obtained results demonstrated that user mobility does not meaningfully influence the performance of our policy which allows to minimize the “user dissatisfaction” while increasing the network coverage.

Proliferated needs of the growing market regarding better data packet and voice services is looking to be met by deploying packet data services. This feature involves a complete upgrade of the network. The path to achieve this greatly... more

Proliferated needs of the growing market regarding better data packet and voice services is looking to be met by deploying packet data services. This feature involves a complete upgrade of the network. The path to achieve this greatly differs between GSM and CDMA networks. This paper gives an advanced comparison between the GSM and CDMA networks in the path to deploying packet data with essential features of cost implications, time, infrastructure and compatibility in various handsets, speed and implementation methods. Detailed procedure ofCDMA to 3G CDMA path is mentioned along with critical comparison with GSM path at each and every stage.

This paper presents the performance evaluation of 3G mobile networks for one kind of multimedia application called Voice over IP (VoIP) within Bangkok, the capital city of Thailand, using Line and Skype, two popular VoIP applications.... more

This paper presents the performance evaluation of 3G mobile networks for one kind of multimedia application called Voice over IP (VoIP) within Bangkok, the capital city of Thailand, using Line and Skype, two popular VoIP applications. This study used evaluation of voice quality provided by both applications. The tests have been conducted using stationary scenarios over 5 major 3G mobile networks, served by 5 operators, within 14 universities in the inner city of Bangkok in order to gather data of degraded speech files. Then, the data was measured using Perceptual Evaluation of Speech Quality (PESQ) to find Mean Opinion Score (MOS) before analyzing with ANOVA and T-test, which are statistical tools, so that the discussion and conclusion can be eventually derived.

This paper presents many different challenges related to Intelligent-Building (IB) communication. The purpose of this research is to determine the best network architecture for IB by the integration of mobile intelligent agents, wireless... more

This paper presents many different challenges related to Intelligent-Building (IB) communication. The purpose of this research is to determine the best network architecture for IB by the integration of mobile intelligent agents, wireless and wired networks. IBs need to be adaptable to the demands of people using them. For this reason it is necessary to provide an open network architecture with free conversion between protocols and high-speed communication. This paper justifies the use of open technologies such as the Universal Mobile Telecommunications System (UMTS), Internet Protocol version 6 (IPv6) and open platforms such as CORBA and Jini. In addition it considers wireless technologies such as Bluetooth, Wireless 802.11, etc. The paper concludes by presenting a combination of UMTS and IPv6 mobile environments as possible solutions to the needs of Intelligent-Building.

IEEE 802.11 based mobile communication towers is used very much in many personal and industrial purposes as it provides a continuous connectivity to Mobile Nodes (MNs) and allows them to change their attachment point from old Access Point... more

IEEE 802.11 based mobile communication towers is used very much in many personal and industrial purposes as it provides a continuous connectivity to Mobile Nodes (MNs) and allows them to change their attachment point from old Access Point (A)P to new AP while needed. But one main problem of continuous connectivity is handover latency which consists of scanning, authentication and re-association phases. Scanning is the most time consuming part of handover process. In this paper, we introduce a pre-scanning mechanism using Global Positioning System (GPS) to reduce handover delay. In our method, scanning is completed almost before actual handover starts. From the simulation results, it can be seen that our proposed mechanism reduces handover delay by a great deal.

Quality of Service (QoS) provi sioning in 3rd generation cellular systems is one of the keys for the commercial success of these networks. Radio Resource Management (RRM) is the way to provide users with QoS. The main “building blocks” of... more

Quality of Service (QoS) provi sioning in 3rd generation cellular systems is one of the keys for the commercial success of these networks. Radio Resource Management (RRM) is the way to provide users with QoS. The main “building blocks” of the RRM layer are: Call Admission Control (CAC), packet classification, and packet scheduling. This paper focuses on the packet scheduling for the interactive and background QoS traffic classes delivered over the UMTS Downlink Shared Channel (DSCH). It proposes and analyses five new schemes of scheduling and a new priority allocation parameter. Simulations are executed in order to compare performances in terms of throughput, response time and average page-download time.

In this paper, a novel hybrid connection admission control (CAC) scheme combining downlink transmission power and aggregate throughput in the case of dedicated and shared connection setup respectively, is presented ("DPTCAC: downlink... more

In this paper, a novel hybrid connection admission control (CAC) scheme combining downlink transmission power and aggregate throughput in the case of dedicated and shared connection setup respectively, is presented ("DPTCAC: downlink power/throughput based CAC algorithm"). The algorithm has special applicability in the case of wireless networks with particular emphasis on 3G UMTS networks (H. Kaaramen et al., 2001) enhanced with new multicasting technologies namely in this case "multimedia broadcast-multicast service (MBMS)". The motivation for introducing this hybrid CAC approach is twofold: the need to use a representative resource metric on which to base CAC decisions and the necessity to take advantage of the particularities of the resource allocation procedure in true multicast environments with connection sharing. We first present the algorithm which is based on previously conducted work in E.S. Elayoubi and T. Chahed (2004, 2005) augment this presentation with description of the hybrid nature of our proposal. We then compare via simulations the performance of the proposed algorithm against a reference "throughput based CAC algorithm (TCAC)" (H. Holma and A. Toskala, 2001). Simulation results show a beneficial effect of DPTCAC's applicability on cell capacity without observable degradation of offered QoS

By using of a new coplanar waveguide feeding (CPW feeding) technique to a planar sleeve monopole, a narrow width antenna with uniplanar structure is proposed for dual band operation at UMTS (1.885-2.200GHz) and HIPERLAN2 (5.470-5.725 GHz)... more

By using of a new coplanar waveguide feeding (CPW feeding) technique to a planar sleeve monopole, a narrow width antenna with uniplanar structure is proposed for dual band operation at UMTS (1.885-2.200GHz) and HIPERLAN2 (5.470-5.725 GHz) bands. Proposed antenna has considerable narrow width (width of 7.8mm) and simple structure. The antenna radiation pattern is almost as the radiation pattern of a monopole antenna and the gain remains nearly constant within UMTS and HIPERLAN2 bands. The antenna is suitable for application to wireless communication systems.

The UMTS network is complementary to GSM and GPRS. The GSM network covers the features required for voice-type services in a circuit mode, the network brings GFPRS the first features to the introduction of services such as packet data,... more

The UMTS network is complementary to GSM and GPRS. The GSM network covers the features required for voice-type services in a circuit mode, the network brings GFPRS the first features to the introduction of services such as packet data, and UMTS networks complement these by
offering voice and data services on an additional packet. UMTS is thus an extension of GPRS and also works in packet mode. The transmission speed offered by UMTS networks to 2Mbit/s. UMTS infrastructure enables expansion of frequencies as well as changes in data coding. In this
paper, the use of OFDM signals in the UMTS access network UTRANFDD and 64QAM modulation allowed us to improve the rate 2Mbit/s to 22.5 Mbit/s. The results, including improved throughput to 22.5Mbit/s, show us that the power frequency spectrum of a
single OFDM signal is centered around the fundamental frequency, but the spectral width of the power spectrum of the OFDM signals is higher than that of the power spectrum is a function that is typically used in UMTS. We also noted that the greater the number of carriers increases, the more important
the spectral width is. The multicarrier modulation was based, in our case, on the choice of the multiplexing of signals without noise and with noise.

In this paper the authors' attention is on the specification of a middleware functionality for dynamic QoS control in multimedia cellular environments, such as UMTS. The functionality implements a soft QoS paradigm, at the same time... more

In this paper the authors' attention is on the specification of a middleware functionality for dynamic QoS control in multimedia cellular environments, such as UMTS. The functionality implements a soft QoS paradigm, at the same time optimising the perceptual QoS provided to the end user according to his/her needs. It will be shown that by exploiting suitable performance indexes and resource redistribution algorithms both an acceptable grade of service and a good degree of user satisfaction can be achieved, without an excessive increase in the network-signalling load.

After tightening up network perimeter for dealing with external threats, organizations have woken up to the threats from inside Local Area Networks (LAN) over the past several years. It is thus important to design and implement LAN... more

After tightening up network perimeter for dealing with external threats, organizations have woken up to the threats from inside Local Area Networks (LAN) over the past several years. It is thus important to design and implement LAN security strategies in order to secure assets on LAN by filtering traffic and thereby protecting them from malicious access and insider attacks. Banking Financial Services and Insurance (BFSI) industry is one such segment that faces increased risks and security challenges. The typical architecture of this segment includes several thousands of users connecting from various branches over Wide Area Network (WAN) links crossing national and international boundaries with varying network speed to access data center resources. The objective of this work is to deploy LAN security solution to protect the data center located at headquarters from the end user machines. A LAN security solution should ideally provide Network Access Control (NAC) along with cleaning (securing) the traffic going through it. Traffic cleaning itself includes various features like firewall, intrusion detection/prevention, traffic anomaly detection, validation of asset ownership etc. LANenforcer (LE) is a device deployed in front of the data center such that the traffic from end-user machines necessarily passes through it so that it can enforce security. The goal of this system is to enhance the security features of a LANenforcer security system with Intrusion Prevention System (IPS) to enable it to detect and prevent malicious network activities. IPS is plugged into the packet path based on the configuration in such a way that the entire traffic passes through the IPS on LE.

The proportional fair (PF) scheduling algorithm compromises between cell throughput and fairness. Many research findings have been published by various researchers about PF algorithm based on mathematical model and simulations. In this... more

The proportional fair (PF) scheduling algorithm compromises between cell throughput and fairness. Many research findings have been published by various researchers about PF algorithm based on mathematical model and simulations. In this paper we have taken the practical route to analyse the algorithm based on three types of subscription. In this benchmarking study, the user subscriptions are differentiated as
Gold, Silver and Bronze schemes and they are provisioned with certain throughputs. Apart from subscriptions plans, the channel condition also plays a major role in determining the throughput. So in order to ensure fairness among different subscriptions even in the bad channel conditions and to deliver the provisioned
throughputs certain priorities are attached with the subscriptions. As per the subscription plans Gold subscribers are assigned with 50% of the speed offered by the network as maximum based on CAT3 speed (100 Mbps in DL and 50 Mbps in UL), Silver is assigned with 25% of the max speed and Bronze is assigned with 12% of the max speed. The priorities assigned to subscribers determines the fairness in
the unfavourable channel conditions - Bronze (high), Silver and Gold (medium). In this paper, an benchmarking tests have been performed with all of three types of subscribers for nearly two hours in the live single cell network without any heterogeneous cells influencing it. Furthermore, the results are
compared with the simulation results.

The research and communications for detecting mobile security threats with the best protection practices of applications have become essential goals nowadays due to the continuous discoveries of new vulnerabilities. The internet and... more

The research and communications for detecting mobile security threats with the best protection practices of applications have become essential goals nowadays due to the continuous discoveries of new vulnerabilities. The internet and web-based activities have been increased drastically in recent times by users of all categories. Users have extensively started involved in gaming, banking, frequent bill payment, entertainment, and other network and online activities that are requiring a large number of mobile phone protection and security mechanisms in response to advancements in full-stack applications and wireless networks. The goal of this paper is to uncover the best-applied practices in the domain of mobile security to protect smartphone devices. The main advantages of smartphones are small size with easiness in carrying anywhere and can be a replacement for computing devices in some ways for example emails. Unfortunately, the convenience of using smartphones to do the private task is the loophole cyber attackers need to gain access to personal data. Thus, this paper proposed eight best practices to protect and secure smart mobile phones.

The cellular networks have experienced a rocket change from the first generation to the fifth. Analog communications was quickly replaced by digital in the 80s, and nowadays we talk abot mobile broadband and high connectivity in 5G... more

The cellular networks have experienced a rocket change from the first generation to the fifth.
Analog communications was quickly replaced by digital in the 80s, and nowadays we talk abot
mobile broadband and high connectivity in 5G systems. This is a proof that mobile
communications has increased its needs from subscribers, such as high data rates and high
media sharing. A lot of applications are being done today, from SMS and voice to VoIP, vide o
streaming and IoT. However, it is crucial to understand the previous generations as they serve
as backbone to the latter ones, and also because some areas around the globe have not yet fully
deployed the 4G and 5G technologies.
This project work has for goal to be a mastery guide in understanding the 3G UMTS system
and to plan and optimize the network for a case study of the country of Morocco. Several factors
need to be taken into consideration for proper radio network planning and optimization.
Keywords : 3G, UMTS, WCDMA, RNP, Atoll, Optimization

Antenna systems are critical components of any radio system operating at any frequency. The antenna and associated system comprising coaxial transmission line (commonly known as feeder cable) and any power amplifiers, RF combiners, duplex... more

Antenna systems are critical components of any radio system operating at any frequency. The antenna and associated system comprising coaxial transmission line (commonly known as feeder cable) and any power amplifiers, RF combiners, duplex filters and so on significantly impacts on radio performance if not correctly specified, installed and operated. This paper explores the evolution of cellular antenna systems from GSM through UMTS and LTE to 5G.

Overload traffic is a load condition traffic that exceed certain threshold limit is caused by use quantity traffic (information traffic) in certain channel. Because of that, a telecommunication service operator is said to give service... more

Overload traffic is a load condition traffic that exceed certain threshold limit is caused by use quantity traffic (information traffic) in certain channel. Because of that, a telecommunication service operator is said to give service level when every customer success in hold calling in every moment, belong at the time of busy hours. Occupancy is comparison traffic moment busy hour (BH) towards network capacity that appropriate target designs GoS certain. Value ever greater occupancy, so needed channel capacity last for get customer more increase so that doesn't cause block call ever greater or increase calling probability value that aversed (GoS). That because it, needed technology increasing DCS 1800 to subsidize performance of GSM 900 technology that exist. To observe the differences before and after the addition of DCS 1800 was observed by the method of data collection in PT. XXXX Purwokerto branch for analysis. However, the addition of DCS 1800 technology by using a higher frequency is 1800 MHz can not ensure the absence of a high block call on BTS Purwosari. After the addition of DCS 1800 BTS values Bobosan blocking probability in sector 1 still reached 39.35%. Whereas the standard value of GoS in PT. XXXX is only 2%. In addition to the use of higher frequencies of GSM 900 frequency range is 1800, resulting in the shorter radius of the coverage area of the cell to the sector Bobosan DCS 1 DCS Purwosari 2.87 km and 1,423 km. ABSTRAK Overload traffic merupakan suatu kondisi beban trafik yang melebihi batas ambang tertentu yang disebabkan oleh banyaknya pemakaian trafik (lalu-lintas informasi) pada kanal tertentu. Itu sebabnya, suatu operator layanan telekomunikasi dikatakan memberikan tingkat pelayanan yang cukup baik apabila setiap pelanggan berhasil dalam mengadakan panggilan pada setiap saat, termasuk pada saat jam sibuk. Occupancy merupakan perbandingan trafik saat Busy Hour (BH) terhadap kapasitas jaringan yang disediakan sesuai target disain GoS tertentu. Semakin besar nilai occupancy-nya, maka dibutuhkan kapasitas kanal yang cukup untuk menerima pelanggan yang semakin bertambah sehingga tidak mengakibatkan block call yang semakin besar atau meningkatkan nilai probabilitas panggilan yang ditolak (GoS). Itu sebabnya dibutuhkan penambahan teknologi DCS 1800 untuk menunjang kinerja GSM 900 yang sudah ada. Untuk mengamati adanya perbedaan sebelum dan sesudah penambahan DCS 1800 dilakukan metode observasi dengan melakukan pengumpulan data di PT. XXXX cabang Purwokerto untuk dilakukan analisis. Akan tetapi penambahan teknologi DCS 1800 dengan menggunakan frekuensi yang lebih tinggi yaitu 1800 MHz belum bisa menjamin tidak terjadinya block call yang tinggi di BTS Purwosari. Setelah penambahan DCS 1800 nilai probabilitas blocking di BTS Bobosan sektor 1 masih mencapai 39,35%. Sedangkan standar nilai GoS di PT. XXXX hanya sebesar 2 %. Selain itu dengan penggunaan frekuensi yang lebih tinggi dari GSM 900 yaitu range frekuensi 1800, mengakibatkan semakin pendek jari-jari sel untuk daerah cakupannya yaitu pada DCS Bobosan sektor 1 2,87 km dan DCS Purwosari 1,423 km.

One of the most important multimedia applications is Internet protocol TV (IPTV) for next-generation networks. IPTV provides triple-play services that require high-speed access networks with the functions of multicasting and quality of... more

One of the most important multimedia applications is Internet protocol TV (IPTV) for next-generation
networks. IPTV provides triple-play services that require high-speed access networks with the functions of
multicasting and quality of service (QoS) guarantees. Among 4G mobile ac-cess networks, LTE networks are regarded as among the best solutions to meet higher bandwidth demands. In this paper, we propose a new architecture for multicasting live IPTV traffic in 4G LTE networks. The proposed mechanism involves assigning a unique logical link identifier to each IPTV channel. To manage multicasting, a prior storing server in the Base Station and in each mobile network unit, mobile phone, is constructed. In this work, we propose a partial prior storing strategy that considers the changes in the popularity of the video content segments over time and the access patterns of the users to compute the utility of the objects in the prior storage. We also propose to partition the prior storage to avoid the eviction of the popular objects (those
not accessed frequently) by the unpopular ones which are accessed with higher frequency. The popularity distribution and ageing of popularity are measured from two online datasets and use the parameters in simulations. Simulation results show that our proposed architecture can improve the system performance and QoS parameters in terms of packet delay, jitter and packet loss.

Storage networking technology has enjoyed strong growth in recent years, but security concerns and threats facing networked data have grown equally fast. Today, there are many potential threats that are targeted at storage networks,... more

Storage networking technology has enjoyed strong growth in recent years, but security concerns and threats facing networked data have grown equally fast. Today, there are many potential threats that are targeted at storage networks, including data modification, destruction and theft, DoS attacks, malware, hardware theft and unauthorized access, among others. In order for a Storage Area Network (SAN) to be secure, each of these threats must be individually addressed. In this paper, we present a comparative study by implementing different security methods in IP Storage network.

ABSTRAKSI Kebutuhan akan informasi data yang semakin tinggi maka diperlukan mekanisme agar data informasi dapat sampai ke tujuan dengan cepat. Penggunaan ethernet merupakan salah satu cara untuk peningkatan kapasitas jaringan data.... more

ABSTRAKSI
Kebutuhan akan informasi data yang semakin tinggi maka diperlukan mekanisme agar data informasi dapat sampai ke tujuan dengan cepat. Penggunaan ethernet merupakan salah satu cara untuk peningkatan kapasitas jaringan data. Carrier Ethernet dapat didukung untuk berbagai macam jaringan transport fisik yang berbeda. Selain itu Carrier Ethernet juga mendukung untuk jaringan backhaul untuk semua jenis teknologi generasi bergerak karena dengan Carrier Ethernet dapat diperoleh bandwidth yang fleksible, terukur, efektif dan murah. Carrier Ethernet dapat digunakan untuk backhaul di jaringan teknologi bergerak dengan meletakkan Carrier Ethernet di RAN (Random Access Network) untuk WCDMA .
Metodologi penelitian ini meliputi studi literatur, pengukuran dan observasi di lapangan. Hasil ukur jaringan backhaul 3G (WCDMA) menggunakan metro ethernet di layer 2 akan dimanfaatkan untuk kebutuhan industri telekomunikasi.
Hasil akhir dari penelitian ini berupa analisis hasil ukur kinerja layer 2 metro ethernet yang diterapkan dalam jaringan backhaul 3G. Parameter ukur meliputi throughput, frame loss dan latency diperoleh bahwa sistem dapat bekerja dengan baik.
Kata Kunci : metro ethernet,jaringan backhaul 3G, frame loss, throughpt, dan latency
ABSTRACT
The need of data information is growing fast, so networks needs to deliver data with good quality. Implement Ethernetin the network is one of way to improve the network quality. Carrier ethernet can support transport network on different network. Carrier ethernet can be used on mobile network backhaul. It can gives better bandwidth with flexible, efective and cheap. Carrier Ethernet can be implemented on RAN (Random Access Network) for WCDMA/3G backhaul network.
Research methodology for this network included literature study, industry measurement and observation. This resuls would be used for telecom industry.
The results of this research was analyze of measurement which gives backhaul 3G network in good condition. The parameter were throughput, frame loss and latency. Those parameter showed that the network was in good condition.
Key words: metro ethernet 3Gbackhaul network , frame loss, throughput , and latency