Do you want to publish a course? Click here

TCP protocols evaluation in LTE

تقييم أداء بروتوكولات ال TCP في LTE

1051   2   52   0.0 ( 0 )
 Publication date 2018
and research's language is العربية
 Created by sleman khadoor




Ask ChatGPT about the research

Research paper on the TCP protocol and its handling of bottlenecks, with a simple comparison between several copies of the protocol.

References used
3GPP, ―TS 25.211 Technical Specification Group Radio Access Network; Physical channels and mapping of transport channels onto physical channels (FDD)(Release 7),‖ March 2006, v7.0.0.
rate research

Read More

The low cost, ease of deployment has exposed WSNs an attractive choice for numerous applications,like environmental monitoring applications , security applications, real time tracking, and so on. But in reality, these networks are operated on batte ry with limitations in their computation capabilities, memory, bandwidth ,so they called networks with resource constrained nature, and this impels various challenges in its design and its performance. Limited battery capacity of sensor nodes makes energy efficiency a major and challenge problem in wireless sensor networks. Thus, the routing protocols for wireless sensor networks must be energy efficient in order to maximize the network lifetime. In this paper we simulated LEACH,SEP,DEEC,TEEN routing protocols and evaluated their performance by comparing with DT routing protocol in Homogeneous and Heterogeneous Wireless Sensor Networks on MATLAB.
This paper focuses on mobility management issue. It investigates the evaluation of mobility management protocols via a generic mathematical model and evaluates some sample protocols using the mentioned protocols.
LTE’s success as a high throughput, and umbrella technology for wireless networks is highly affected by the researchers’ capability of solving its current security vulnerabilities. Mutual authentication was adopted by mobile networks to overcome v ulnerabilities exploited by “IMSI catcher” and other active attacks. 3GPP’s mutual authentication implementation in EPS AKA succeeded in enhancing the network’s security, but failed to cover weaknesses inherited from its predecessor (UMTS). One of those vulnerabilities is the passive capturing of IMSIs during user identification in the Authentication and Key Agreement protocol. Many researchers tried over the past years, to propose an alternative for EPS AKA, able to ensure high levels of security and offer acceptable QoS performance. In this paper, we will crypt-analyze (SPAKA and PBKP) which was claimed to solve EPS AKA’s privacy and mutual authentication weaknesses, then we will compare its QoS performance to EC-AKA and EPS AKA. Our proposed protocol “EC-AKA” is a real candidate to replace the current authentication and Key Agreement protocol, because of its excellent performance in all the studied parameters.
This research includes an amendment to a TCP-Peach+ protocol to improve the performance of the TCP over satellite links, Where the protocol has been proposed based on splitting the connecting path between the source and target, in order to obtain a n adjusted protocol of the kind of Satellite transport protocol (STP) specialized in the space segment only, and that by proposing a new algorithm for this protocol which is located under the satellite transport layer (STL). We have focused in our research on a comparison between the proposed protocol and TCP-Peach+ protocol.
Several new technologies had been presented in LTE system standards in order to achieve higher performance and more reliability than Previous cellular communications systems. The added new standards describe advanced technologies that integrated into the system environment so that we can meet subscribers Growing requirements. in this study we'll discuss in details the different patterns of modulation schemes, which are adopted in (3 GPP) standards for (LTE) system downlink.

suggested questions

comments
Fetching comments Fetching comments
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا