Send the link below via email or IMCopy
Present to your audienceStart remote presentation
- Invited audience members will follow you as you navigate and present
- People invited to a presentation do not need a Prezi account
- This link expires 10 minutes after you close the presentation
- A maximum of 30 users can follow your presentation
- Learn more about this feature in our knowledge base article
Do you really want to delete this prezi?
Neither you, nor the coeditors you shared it with will be able to recover it again.
Make your likes visible on Facebook?
Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.
Transcript of Puzzle
Enjoy the results
according to the continuously increasing of population number which causes the overloading in mobile communications..
Simple and fast installation
Low operating costs
• Maximizes capacity minimizes cost per bit
• Improves user experience and loyalty
• SECURED authentication across 3G and Wi-Fi
• Reduce investment in mobile networks.
• DECREASE traffic overload on 3G networks
1. The 802.11a will transmit data at a frequency level of 5GHz. The Orthogonal Frequency-Division Multiplexing (OFDM) used enhances reception by dividing the radio signals into smaller signals before reaching the router. You can transmit a maximum of 54 megabits of data per second.
2. The 802.11b will transmit data at a frequency level of 2.4GHz, which is a relatively slow speed. You can transmit a maximum of 11 megabits of data per second.
3. The 802.11g will transmit data at 2.4GHz but can transmit a maximum of 54 megabits of data per second as it also uses an OFDM coding.
4. The more advanced 802.11n can transmit a maximum of 140 megabits of data per second and uses a frequency level of 5GHz.
The proposed application measures the POWER OF SIGNAL on both Wi-Fi and 3G networks simultaneously.
After comparing the results,
the device gets switched to the best network. This enables operators to manage their networks more adequately
The second generation (GSM)
The third generation (UMTS)
The fourth generation (LTE)
Network structure .
Authentication Process (AUC).
Authentication Process (AUC).
TCP & UDP
TCP, which is responsible for the end-to-end control of the data for the retransmission of packets that got lost .
TCP is too slow for voice transmission in real-time.
User Datagram Protocol is used for real-time and time- critical data.
important differences shorter header of UDP and missing packets are not retransmitted but abandoned by UDP.
Advantages of VoIP
• A unique Network:
less investment, less techniques
less efforts for maintenance
Charging can be independent from the distance
Charging can be independent from the duration
Session Initiation protocol
Authentication Request from UE
Transfer of Authentication Vector(s) from HSS to MME
Mutual Authentication by UE and MME
OBSERVATION & conclusion.
GSM Technical specifications.
FDMA and TDMA.
8 TS or 16 TS / Carrier.
Frequency band “900MHZ, 1800MHZ, and 1900MHZ”.
TS duration= 0.577 msec.
Frame Duration =8*0.577 Ms = 4.615 msec.
Applications: voice, SMS, FAX, data rate 9.6kpbs.
UMTS Network structure.
UMTS Technical specification.
Channel bandwidth= 5 MHz
Frequency band 2100 MHz
Chip rate= 3.84 MCPc.
CS + PS.
Uses orthogonal codes.
bit rate up to 2 mbps.
LTE Technical specifications.
-OFDMA DL & sc-ofdma UL.
-FDD or TDD.
-channel BW up to 20 MHZ.
-BW on demand.
-TS duration =0.5 ms.
-frame duration =10 ms.
signaling protocol used to create, manage and terminate sessions in an IP based network.
LTE Network structure.
Data process via Wi-Fi and 3G
Commands of SIP
INVITE :Invites a user to a call.
ACK : facilitate reliable message exchange .
BYE :Terminates a connection between users.
CANCEL :Terminates a request.
OPTIONS : information about a server's.
REGISTER :Registers a user's current location.
project system diagram
Any attempt at any level cannot be satisfactorily completed without the will of God and the support and guidance of learned people. We would like to express our immense gratitude to Dr. Talat El-Garf for his constant support and motivation that has encouraged us to come up with this project.
Authentication process (AUC).
(Real-time Transport Protocol)
aim of RTP is to provide a uniform means of transmitting data subject to real time
principal role of RTP is to implement the sequence numbers of IP packets to reform voice or video information even if the underlying network changes the order of the packets.
that makes the mobile operators suffer from busy channels and lower probability of making sufficient calls.
• Manufacturer dependent
• Product dependent
• Standard dependent
• Dependent on external conditions.
(building geometry ,building material ,weather)
• INSIDE buildings : approx 20-50 m.
• Up to max. of 500m outdoors
G.7xx: Describe the formats for voice data
H.26x: Describe the formats for video data
voice and data transmission networks
Advantages of SIP.
• Easy implementation.
• Easy integration of internet protocol.
• Modular architecture.
Sip connection set-up via proxy server
• Codec : coding – decoding.
• Sampling rate.
• Processing time.
• Standard-codec G.711 (must be supported by all VOIP devices).
Android is a mobile operating system developed by Google.
Android is a free and open operating system
Based on Linux kernel and designed primarily for touchscreen mobile devices.
Android is available in 70 languages.
Written in C (core), C++, Java.
Android version History
How does android manage applications?
• Multiple applications can run at same time.
• Only one instance of an application runs at a time.
• Similar to minimizing a window .
• Similar to closing a window .
Components of Implementation
Register to the server create users as in normal network.
Application simulate 3G availability and wi-fi availability.
Application notify the server with the available network.
Server stablish a channel between two devices.
LTE Authentication Procedures.
Data throughput with WLAN
Range of WLAN
TASKS OF VARIOUS layers
Differences of voice codes
 Anna Hac, "Mobile Telecommunicatios Protocols for Data Networks", John Wiley & Son, Ltd, 2003.
 Wifi. “Wifi Network”. [Online]. Internet:
 Yi-Bing Lin, ImrichChlamtac," Wireless and Mobile Network Architectures," Wiley, October 2000.
 H. Schulzrinne, S. Casner, R. Frederick, and V. Jacobson, RTP: A transport protocol for real-time applications, 1996: IETF RFC 1889
 Cisco.”WhatisVoipeoverIP?TheBasics".[Online].Internet: http://www.cisco.com/cisco/web/solutions/small_business/resource_cente/articles/be_ more_productive/what_is_voip/index.html
 Tutorialspoint. “JavaBasics”.[Online].Internet: http://www.tutorialspoint.com/java/
 KalmeshYadav. “Android Tutorials”.[Online]. Internet: http://www.learn-androideasily.com
 VNR groups.”Android Tutorial”.[Online].Internet: https://www.youtube.com/user/VNRGroups ,May.17,2013
 Elastix.org. “VoIPTutorial”.[Online]. Internet: http://www.elastix.org/index.php/en/
 VoIP supply. “VoIPTutorial”.[Online]. Internet: http://www.voipsupply.com/downloads/dl/file/id/14061/elastix_user_manual.pdf.
 Tutorial Elastix. “VoIPTutorial”.[Online]. Internet: ,May.1,2013
 JavaBasics. “Java Tutorial”.[Online]. Internet:
 D2D GRADUTAION PROJECT 108
K. Doppler, K. Rinne, Wijting, Ribeiro and Hugl, "Device-to-Device Communication as an Underlay to LTE-Advanced Networks," in IEEE Communications Magazine, pp: 42 - 49 , Dec 2009.
 M. Zulhasnine, C. Huang and A. Srinivasan, "Efficient Resource Allocation for Device-to-Device Communication Underlaying LTE Network," in 6th IEEE International Conference on Digital Object Identifier: 10.1109/WIMOB.2010.5645039, 2010.
 K. Doppler and M. P. Rinne, "Device-to-Device Communications; Functional Prospects for LTE-Advanced Networks," in IEEE International Conference on Communications Workshops, 2009.
 C.H. Yu, O. Tirkkonen and K. Doppler, "On the Performance of Device-to-Device Underlay Communication with Simple Power Control," in IEEE 69th Vehicular Technology Conference, 2009.
 "3GPP statement on LTE-Advanced status," www.3gpp.org, April 8, 2013.
 Mark Elo, "Orthogonal Frequency Division Multiplexing," Keithley Instruments Inc, www.keithley.com, 2008.
 DebbahMérouane, "Short introduction to OFDM," Alcatel-Lucent France, www.flexible-radio.org.
 J. York, Digital Communications, New York: McGraw-Hill, 2001.
OVER VIEW OF CODECS
CONTINOUS INCREASE IN THE NUMBER OF USERS.
DECREASE IN THE CAPACITY.
LIMITED BAND WIDTH.
OPERATORS COULD BE ABLE TO OFFLOAD MOST OF THE TRAFFIC DATA BY MODIFIY THE CURRENT 3G NETWORK WITH A WIFI NETWORK WHICH WILL INCREASE THE BAND WIDTH LEADING TO INCREASE THE OPERTINUITY FOR MORE USERS TO HAVE THERE CALLS EASILY IN THE RUSH HOUR AT SAME TIME DECREASE THE COAST BY 60%.
3G CUSTOMER JOIN WITH WI-FI CUSTOMER.
DECREASE HOLDING TIME OF CALL WHILE SWAPPING.
INCREASE FUNCTIONS LIKE : HD VIDEO CALLS & HIGH SPEED INTERNET ACCESS.
ELIMINATE THE USAGE OF POWER DURING UPLINK PROCESS
LOOKING FORWARD TO FIND AN INTEGREATION WITH LI-FI.
CONFIGIRATION IN ADRIOAD APPLICATION
Steps of Implementation